• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于纹理描述符地标生成手指照片变形攻击。

Fingerphoto morphing attack generation using texture descriptors based landmarks.

作者信息

Li Hailin, Ramachandra Raghavendra

机构信息

Norwegian University of Science and Technology (NTNU), 2815, Gjovik, Norway.

出版信息

Sci Rep. 2024 Jul 13;14(1):16182. doi: 10.1038/s41598-024-66790-8.

DOI:10.1038/s41598-024-66790-8
PMID:39003310
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11246451/
Abstract

Smartphone-based biometric authentication has been widely used in various applications. Among several biometric characteristics, fingerphoto biometrics captured from smartphones are gaining popularity owing to their usability, scalability across different smartphones, and reliable verification. However, fingerphoto verification systems are vulnerable to both direct and indirect attacks. In this work, we propose a novel method to generate morphing attacks on fingerphoto biometrics captured using smartphones. We introduce three different image-level fingerphoto morphing attack generation algorithms that can generate high-quality fingerphoto morphing images with minimum distortions. Extensive experiments were conducted on two datasets captured using different smartphones under various environmental conditions. The results demonstrate that the proposed morphing algorithms are highly vulnerable to commercial off-the-shelf and block-directional fingerprint verification systems. To effectively detect morphing attacks on fingerphoto biometrics, we propose the use of fingerphoto morphing attack detection algorithms that utilize both handcrafted and deep features. However, our detection results showed a high error rate in accurately detecting these types of attacks.

摘要

基于智能手机的生物特征认证已在各种应用中广泛使用。在多种生物特征中,从智能手机捕获的手指照片生物特征因其可用性、在不同智能手机上的可扩展性以及可靠的验证而越来越受欢迎。然而,手指照片验证系统容易受到直接和间接攻击。在这项工作中,我们提出了一种新颖的方法来对使用智能手机捕获的手指照片生物特征进行变形攻击。我们介绍了三种不同的图像级手指照片变形攻击生成算法,这些算法可以生成具有最小失真的高质量手指照片变形图像。在不同环境条件下使用不同智能手机捕获的两个数据集上进行了广泛的实验。结果表明,所提出的变形算法对商用现成的和块方向指纹验证系统高度脆弱。为了有效检测对手指照片生物特征的变形攻击,我们建议使用同时利用手工特征和深度特征的手指照片变形攻击检测算法。然而,我们的检测结果显示在准确检测这些类型的攻击方面错误率很高。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/67701b55595a/41598_2024_66790_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/a1931eafcc14/41598_2024_66790_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/8223d3b06bf6/41598_2024_66790_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/64edc2c5538d/41598_2024_66790_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/2c1ea2a008cc/41598_2024_66790_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/752f473f5231/41598_2024_66790_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/cbe923b41b6c/41598_2024_66790_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/b4228c469ff7/41598_2024_66790_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/67701b55595a/41598_2024_66790_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/a1931eafcc14/41598_2024_66790_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/8223d3b06bf6/41598_2024_66790_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/64edc2c5538d/41598_2024_66790_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/2c1ea2a008cc/41598_2024_66790_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/752f473f5231/41598_2024_66790_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/cbe923b41b6c/41598_2024_66790_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/b4228c469ff7/41598_2024_66790_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc40/11246451/67701b55595a/41598_2024_66790_Fig8_HTML.jpg

相似文献

1
Fingerphoto morphing attack generation using texture descriptors based landmarks.基于纹理描述符地标生成手指照片变形攻击。
Sci Rep. 2024 Jul 13;14(1):16182. doi: 10.1038/s41598-024-66790-8.
2
Towards minimizing efforts for Morphing Attacks-Deep embeddings for morphing pair selection and improved Morphing Attack Detection.为最小化变形攻击的工作量——用于变形对选择的深度嵌入和改进的变形攻击检测。
PLoS One. 2024 May 31;19(5):e0304610. doi: 10.1371/journal.pone.0304610. eCollection 2024.
3
Detecting Morphing Attacks through Face Geometry Features.通过面部几何特征检测变形攻击。
J Imaging. 2020 Oct 29;6(11):115. doi: 10.3390/jimaging6110115.
4
A Double Siamese Framework for Differential Morphing Attack Detection.一种用于差分变形攻击检测的双联体框架。
Sensors (Basel). 2021 May 16;21(10):3466. doi: 10.3390/s21103466.
5
Bio-Inspired Presentation Attack Detection for Face Biometrics.用于面部生物识别的生物启发式呈现攻击检测
Front Comput Neurosci. 2019 May 28;13:34. doi: 10.3389/fncom.2019.00034. eCollection 2019.
6
iSignDB: A database for smartphone signature biometrics.iSignDB:一个用于智能手机签名生物识别的数据库。
Data Brief. 2020 Nov 28;33:106597. doi: 10.1016/j.dib.2020.106597. eCollection 2020 Dec.
7
Presentation Attack Face Image Generation Based on a Deep Generative Adversarial Network.基于深度生成对抗网络的人脸图像生成
Sensors (Basel). 2020 Mar 25;20(7):1810. doi: 10.3390/s20071810.
8
MagNet: Detecting Digital Presentation Attacks on Face Recognition.MagNet:检测针对人脸识别的数字呈现攻击。
Front Artif Intell. 2021 Dec 8;4:643424. doi: 10.3389/frai.2021.643424. eCollection 2021.
9
Feature Interaction-Based Face De-Morphing Factor Prediction for Restoring Accomplice's Facial Image.基于特征交互的面部变形因子预测以恢复 accomplice 的面部图像 。 注:这里“accomplice”不太明确在该语境下准确含义,或许结合上下文会更清晰其指代。
Sensors (Basel). 2024 Aug 25;24(17):5504. doi: 10.3390/s24175504.
10
Face morphing attack detection based on high-frequency features and progressive enhancement learning.基于高频特征和渐进增强学习的人脸变形攻击检测
Front Neurorobot. 2023 Jun 5;17:1182375. doi: 10.3389/fnbot.2023.1182375. eCollection 2023.

本文引用的文献

1
A completed modeling of local binary pattern operator for texture classification.完成了用于纹理分类的局部二值模式算子的建模。
IEEE Trans Image Process. 2010 Jun;19(6):1657-63. doi: 10.1109/TIP.2010.2044957. Epub 2010 Mar 8.