Detection of PARD Attack Using Key Based Biometric Authentication System Based on Fingerprint Impression
Abstract
Full Text:
PDFReferences
Y. Han, C. Ryu, J. Moon, H. Kim, H. Choi. A study on evaluating the uniqueness of fingerprints using statistical analysis, Int Conf Inform Secur Cryptol. 2004; 467–77p. [2] Zwiesele, A. Munde, C. Busch, H. Daum. BioIS study. Comparative study of biometric identification systems, In: Proceedings. IEEE 34th Annual 2000 International Carnahan Conference on Security and Technology. 2000; 60–3p. [3] M. Espinoza, C. Champod, P Margot. Vulnerabilities of fingerprint reader to fake fingerprints attacks, Forensic Sci Int. 2011; 204(1): 41–9p. [4] M. Espinoza, C. Champod. Risk evaluation for spoofing against a sensor supplied with liveness detection, Forensic Sci Int. 2011; 204(1): 162–8p. [5] J. Galbally, J. Fierrez, F. AlonsoFernandez, M. Martinez-Diaz. Evaluation of direct attacks to fingerprint verification systems, Telecommun Syst. 2011; 47(3-4): 243–54p. [6] H. Kang, B. Lee, H. Kim, D. Shin, J. Kim. A study on performance evaluation of the liveness detection for various fingerprint sensor modules, In: International Conference on Knowledge-Based and Intelligent Information and
Engineering Systems. Sep 32003, 1245–53p. [7] T. Van der Putte, J. Keuning. Biometrical fingerprint recognition: don’t get your fingers burned, Smart Card Res Adv Appl. 2000, 289–303p. [8] T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino. Impact of artificial gummy fingers on fingerprint systems, Electron Imaging. 2002. 275–89p. [9] Wiehe, T. Søndrol, O.K. Olsen, F. Skarderud. Attacking Fingerprint Sensors. Gjøvik University College; 2004. [10] S. Memon, M. Sepasian, W Balachandran. Review of fingerprint sensing technologies, Proc INMIC. 2008, 8p. [11] S. Prabhakar, A. Jain, S. Pankanti. Learning fingerprint minutiae location and type Number 8, 2003, 1847–57p. [12] S. Prabhakar, A. Jain, J. Wang, S. Pankanti, R. Bolle. Minutiae verification and classification for fingerprint maching, In: International Conference on Pattern. 2000, Vol. 1. [13] C.-Y. Wen, C.-C. Yu. Fingerprint enhancement using am-fm reaction diffusion systems, J Forensic Sci. 2003; 48(5). [14] K. Nilsson, J. Bigun. Localization of corresponding points in fingerprints by complex filtering, Pattern Recognit Lett. 2003; 24p. [15] T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino. Impact of artificial gummy fingers on fingerprint systems, In: Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques IV. 2002; 8577. [16] D. Maio, D. Maltoni, A.K. Jain, S. Prabhakar. Handbook of Fingerprint Recognition. Springer Verlag; 2003. [17] T. Jea, V.K. Chavan, V. Govindaraju, J.K. Schneider. Security and matching of partial fingerprint recognition systems, In: Proceeding of SPIE. number 5404, 2004, 39–50p. [18] Jain, S. Prabhakar, L. Hong, S. Pankanti. Filterbank-based fingerprint matching, Trans Image Process. 2000; 9: 846–59p. [19] J. Gu, J. Zhou. A novel model for orientation field of fingerprints, In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2003. [20] M.D. Garris, C.I. Watson, R.M. McCabe, C.L. Wilson. Users guide to
nist fingerprint image software (nfis), Technical Report NISTIR 6813. National Institute of Standards and Technology, 2002. [21] S. Prabhakar, S. Pankanti, A.K. Jain. Biometric recognition: security and privacy concerns, IEEE Secur Privacy Mag. 2003; 1(2): 33–42p. [22] P. Ramo, M. Tico, V. Onnia, J. Saarinen. Optimized singular point detection algorithm for fingerprint images, IEEE Trans Image Process. 2001; 3: 242–5p.
DOI: https://doi.org/10.37628/ijoippr.v3i1.207
Refbacks
- There are currently no refbacks.