Vai al contenuto principale della pagina

Biometric Presentation Attack Detection : Towards Securing Biometric Authentication Systems



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Chatterjee Amit Visualizza persona
Titolo: Biometric Presentation Attack Detection : Towards Securing Biometric Authentication Systems Visualizza cluster
Pubblicazione: Bristol : , : Institute of Physics Publishing, , 2023
©2023
Edizione: 1st ed.
Descrizione fisica: 1 online resource (229 pages)
Soggetto topico: Biometric identification
Security systems
Nota di contenuto: Intro -- Acknowledgements -- Author biography -- Amit Chatterjee -- List of acronyms -- Chapter Biometrics -- 1.1 Introduction -- 1.2 Types of biometrics -- 1.2.1 Physiological identifiers -- 1.2.2 Behavioral identifiers -- 1.3 Applications -- 1.3.1 Generic applications -- 1.3.2 Specific applications -- 1.4 Biometrics authentication architecture -- 1.5 ISO standards -- 1.6 Databases -- References -- Chapter Presentation attack detection in biometrics -- 2.1 Introduction -- 2.2 Historical survey -- 2.3 Types of presentation attacks -- 2.4 Preparation of spoofed specimen -- 2.4.1 2D fake -- 2.4.2 3D fake -- 2.5 Existing PA detection technologies -- 2.6 International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) standards -- 2.7 Databases -- References -- Chapter Fringe projection-based secure biometrics -- 3.1 Introduction -- 3.2 Theory -- 3.2.1 Basic configuration -- 3.2.2 Calibration -- 3.3 Processing strategy -- 3.3.1 Phase shifting -- 3.3.2 Fourier transform -- 3.3.3 Unwrapping -- 3.4 Experiments and results -- 3.4.1 Fingerprint -- 3.4.2 Palmprint -- 3.4.3 Face -- 3.4.4 Photo and video attack -- 3.4.5 Ear: a simulation experiment -- 3.5 Discussion -- References -- Chapter Biometric presentation attack detection using speckle metrology -- 4.1 Introduction -- 4.2 Theory -- 4.2.1 Speckle -- 4.2.2 Biospeckle -- 4.2.3 Quality parameters -- 4.3 Processing strategy -- 4.3.1 Numerical indexing -- 4.3.2 Visual analysis -- 4.3.3 Automated region of interest (ROI) selection -- 4.4 Experimental and results -- 4.4.1 Generalized configuration -- 4.4.2 Fingerprint -- 4.4.3 Retina -- 4.4.4 Palmprint and face -- 4.5 Discussion -- References -- Chapter Presentation attack detection using fringe projection and biospeckle analysis -- 5.1 Introduction -- 5.2 Processing strategies -- 5.2.1 Fringe projection.
5.2.2 Biospeckle analysis -- 5.3 Experimental descriptions and results -- 5.3.1 Fingerprint anti-spoofing -- 5.3.2 Palmprint anti-spoofing -- 5.3.3 Ear anti-spoofing -- 5.4 Discussion -- References -- Chapter Presentation attack detection using optical coherence tomography -- 6.1 Introduction -- 6.2 Theory -- 6.2.1 Skin physiology -- 6.2.2 OCT imaging -- 6.3 Experimental descriptions and results -- 6.3.1 TD-OCT-based PA detection -- 6.3.2 FD-OCT-based PA detection -- 6.3.3 FF-OCT-based PA detection -- 6.4 Discussion -- 6.4.1 Balancing sensitivity and imaging speed -- References -- Chapter Thermography-based presentation attack detection -- 7.1 Introduction -- 7.2 Theory -- 7.3 Experiments and results -- 7.3.1 Thermal-only approach -- 7.3.2 Multispectral approach -- 7.4 Discussion -- References -- Chapter Miscellaneous -- 8.1 Introduction -- 8.2 Topography-based techniques -- 8.2.1 Color texture analysis -- 8.2.2 Motion detection -- 8.2.3 Laser triangulation -- 8.2.4 Stereo vision -- 8.3 Internal property-based techniques -- 8.3.1 Pulse oximetry -- 8.3.2 Ultrasound sensor -- 8.3.3 Impedance-based technique -- 8.4 Hybrid techniques -- 8.4.1 Fringe projection thermography -- 8.4.2 Multimodal biometrics -- References -- Chapter Patents: basics and selected descriptions -- 9.1 Introduction -- 9.2 Patent process flow -- 9.3 Criteria for patent grant -- 9.4 Selected patents for biometric presentation attack detection -- 9.5 Patentability-an example -- References -- Chapter Preliminary experiments and research ideas -- 10.1 Introduction -- 10.2 Fringe projection -- 10.3 Speckle metrology -- 10.4 Speckle projection -- 10.5 Multiwavelength analysis -- 10.6 Extreme attacks -- References.
Sommario/riassunto: This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction.
Titolo autorizzato: Biometric Presentation Attack Detection  Visualizza cluster
ISBN: 9780750352048
0750352043
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910915784703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: IOP Ebooks Series