Results 41 to 50 of about 2,062 (252)
Attention Map Is All We Need for Lightweight Fingerprint Liveness Detection
To counter the security threats posed by presentation attacks on fingerprint authentication systems, various deep learning-based fingerprint liveness detection methods have been proposed.
Hyun Jun Yook +5 more
doaj +1 more source
Image quality assessment for fake biometric detection: Application to Iris, fingerprint, and face recognition [PDF]
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works ...
Fiérrez, Julián +2 more
core +2 more sources
First International Fingerprint Liveness Detection Competition [PDF]
Fingerprint recognition systems are vulnerable to artificial spoof fingerprint attacks, like molds made of silicone, gelatin or Play-Doh. “Liveness detection”, which is to detect vitality information from the biometric signature itself, has been proposed to defeat these kinds of spoof attacks.
MARCIALIS, GIAN LUCA +7 more
openaire +3 more sources
How far did we get in face spoofing detection?
The growing use of control access systems based on face recognition shed light over the need for even more accurate systems to detect face spoofing attacks.
Oliveira, Luciano +3 more
core +2 more sources
Developing coercion detection solutions for biometrie security [PDF]
Biometric security depends on its accuracy and efficiency, but is especially vulnerable to spoof attacks. Currently liveness detection has become the standard method of reducing the impact of spoof attacks, however whilst this protects against spoof ...
Anderson, M., Matthew, P.
core +1 more source
In this study, we found that human cervical‐derived adipocytes maintain intracellular iron level by regulating the expression of iron transport‐related proteins during adrenergic stimulation. Melanotransferrin is predicted to interact with transferrin receptor 1 based on in silico analysis.
Rahaf Alrifai +9 more
wiley +1 more source
Biometric verification systems have become prevalent in the modern world with the wide usage of smartphones. These systems heavily rely on storing the sensitive biometric data on the cloud.
Milad Salem +2 more
doaj +1 more source
Biometric presentation attack detection is gaining increasing attention. Users of mobile devices find it more convenient to unlock their smart applications with finger, face or iris recognition instead of passwords.
El-Din, Yomna Safaa +2 more
core +1 more source
A Framework for Biometric and Interaction Performance Assessment of Automated Border Control Processes [PDF]
Automated Border Control (ABC) in airports and land crossings utilize automated technology to verify passenger identity claims. Accuracy, interaction stability, user error, and the need for a harmonized approach to implementation are required. Two models
Elliott, Stephen J. +3 more
core +2 more sources
Raman‐based label‐free microscopic analysis of the pancreas in living zebrafish larvae
Forward stimulated Raman scattering (F‐SRS) and epi coherent anti‐Stokes Raman scattering (E‐CARS) allow label‐free discrimination of distinct subcellular structures in the pancreas of living zebrafish larvae. Given the straightforward applicability, we anticipate broad implementation of Raman microscopy in other organs and across various biomedical ...
Noura Faraj +3 more
wiley +1 more source

