• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

存在有能力的入侵者时的指纹活体检测。

Fingerprint Liveness Detection in the Presence of Capable Intruders.

作者信息

Sequeira Ana F, Cardoso Jaime S

机构信息

INESC TEC-INESC Technology and Science, Campus da FEUP, Rua Dr. Roberto Frias, Porto 4200-465, Portugal.

Departamento de Engenharia Eletrotécnica e de Computadores, Faculdade de Engenharia da Universidade do Porto, Rua Dr. Roberto Frias, Porto 4200-465, Portugal.

出版信息

Sensors (Basel). 2015 Jun 19;15(6):14615-38. doi: 10.3390/s150614615.

DOI:10.3390/s150614615
PMID:26102491
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC4507655/
Abstract

Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

摘要

指纹活体检测方法的开发旨在克服指纹生物识别系统易受伪造攻击的弱点。传统方法对入侵者的行为相当乐观,假定其使用的是先前已知的材料。这种假设导致使用监督技术来评估方法的性能,使用真实样本和伪造样本训练预测模型,并分别评估每种类型的伪造样本。此外,样本表示中常常包含背景,这完全扭曲了决策过程。因此,我们建议应执行自动分割步骤,将指纹与背景分离,从而真正判定指纹的活体性,而非背景的特征。此外,我们认为无法完全对伪造样本进行建模,因为入侵者使用的材料事先未知。我们通过对真实样本的分布进行建模,并将与该模型极不相符的样本预测为伪造样本,来进行设计。我们的实验比较了监督方法与仅依赖真实样本的半监督方法的性能。所得结果与更标准的方法不同,这强化了我们的信念,即文献中的结果误导性地估计了生物识别系统的真正脆弱性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/555272b52b90/sensors-15-14615f6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/0863ed0301d7/sensors-15-14615f1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/3ae5201e7bfa/sensors-15-14615f2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/c726e2ee4b64/sensors-15-14615f3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/7962df13adfd/sensors-15-14615f4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/d67369423ca6/sensors-15-14615f5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/555272b52b90/sensors-15-14615f6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/0863ed0301d7/sensors-15-14615f1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/3ae5201e7bfa/sensors-15-14615f2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/c726e2ee4b64/sensors-15-14615f3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/7962df13adfd/sensors-15-14615f4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/d67369423ca6/sensors-15-14615f5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6e20/4507655/555272b52b90/sensors-15-14615f6.jpg

相似文献

1
Fingerprint Liveness Detection in the Presence of Capable Intruders.存在有能力的入侵者时的指纹活体检测。
Sensors (Basel). 2015 Jun 19;15(6):14615-38. doi: 10.3390/s150614615.
2
Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.用于假生物特征检测的图像质量评估:在虹膜、指纹和人脸识别中的应用。
IEEE Trans Image Process. 2014 Feb;23(2):710-24. doi: 10.1109/TIP.2013.2292332.
3
Risk evaluation for spoofing against a sensor supplied with liveness detection.针对具有活体检测功能的传感器的欺骗风险评估。
Forensic Sci Int. 2011 Jan 30;204(1-3):162-8. doi: 10.1016/j.forsciint.2010.05.025. Epub 2010 Jul 1.
4
Feasibility of correlation mapping optical coherence tomography (cmOCT) for anti-spoof sub-surface fingerprinting.相关映射光学相干断层扫描(cmOCT)用于反欺诈亚表面指纹识别的可行性。
J Biophotonics. 2013 Sep;6(9):663-7. doi: 10.1002/jbio.201200231. Epub 2013 Apr 25.
5
Efficient internal and surface fingerprint extraction and blending using optical coherence tomography.利用光学相干断层扫描技术进行高效的内部和表面指纹提取与融合。
Appl Opt. 2015 Nov 1;54(31):9258-68. doi: 10.1364/AO.54.009258.
6
A new antispoofing approach for biometric devices.一种新的生物识别设备反欺骗方法。
IEEE Trans Biomed Circuits Syst. 2008 Dec;2(4):328-37. doi: 10.1109/TBCAS.2008.2003432.
7
Proactive forensic science in biometrics: Novel materials for fingerprint spoofing.主动取证生物识别技术:用于指纹伪造的新型材料。
J Forensic Sci. 2022 Mar;67(2):534-542. doi: 10.1111/1556-4029.14908. Epub 2021 Oct 7.
8
Vulnerabilities of fingerprint reader to fake fingerprints attacks.指纹读取器易受假指纹攻击的影响。
Forensic Sci Int. 2011 Jan 30;204(1-3):41-9. doi: 10.1016/j.forsciint.2010.05.002. Epub 2010 Jun 17.
9
The Effectiveness of Depth Data in Liveness Face Authentication Using 3D Sensor Cameras.使用3D传感器相机的深度数据在活体面部认证中的有效性
Sensors (Basel). 2019 Apr 24;19(8):1928. doi: 10.3390/s19081928.
10
Generating cancelable fingerprint templates.生成可取消的指纹模板。
IEEE Trans Pattern Anal Mach Intell. 2007 Apr;29(4):561-72. doi: 10.1109/TPAMI.2007.1004.

引用本文的文献

1
Enhancing Fingerprint Liveness Detection Accuracy Using Deep Learning: A Comprehensive Study and Novel Approach.使用深度学习提高指纹活体检测准确性:全面研究与新方法
J Imaging. 2023 Aug 7;9(8):158. doi: 10.3390/jimaging9080158.
2
On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection.基于阻抗的指纹呈现攻击检测的有效性。
Sensors (Basel). 2021 Aug 24;21(17):5686. doi: 10.3390/s21175686.
3
Spoof Detection for Finger-Vein Recognition System Using NIR Camera.利用近红外相机进行指静脉识别系统的欺骗检测。

本文引用的文献

1
Estimating the support of a high-dimensional distribution.估计高维分布的支撑集。
Neural Comput. 2001 Jul;13(7):1443-71. doi: 10.1162/089976601750264965.
Sensors (Basel). 2017 Oct 1;17(10):2261. doi: 10.3390/s17102261.