Handbook of biometric anti-spoofing: presentation attack detection

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) ? also known as Biometric Anti-Spoofing. Building on the success of the previous, pioneering edition, this thoroughly updated second edition has been considerably expanded to provide even greater coverage of PAD methods, spanning biometrics systems based on face,  Read more...

Abstract:
This authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) - also known as Biometric Anti-Spoofing.  Read more...

Author(s): Evans, Nicholas; Fierrez, Julian; Marcel, Sébastien; Nixon, Mark S et al. (eds.)
Series: Advances in computer vision and pattern recognition
Edition: Second edition
Publisher: Springer
Year: 2019

Language: English
Pages: 522
Tags: Biometric identification -- Handbooks, manuals, etc.;Impersonation -- Handbooks, manuals, etc.;Biometric identification.;Impersonation.;System Performance and Evaluation.;Biometrics.;Probability and Statistics in Computer Science.

Content: Intro
Foreword
Preface
List of Reviewers
Contents
Contributors
Part I Fingerprint Biometrics
1 An Introduction to Fingerprint Presentation Attack Detection
1.1 Introduction
1.2 Early Works in Fingerprint Presentation Attack Detection
1.3 Fingerprint Spoofing Databases
1.4 A Case Study: Quality Assessment Versus Fingerprint Spoofing
1.5 Approach 1: Fingerprint-Specific Quality Assessment (FQA)
1.5.1 Ridge Strength Measures
1.5.2 Ridge Continuity Measures
1.5.3 Ridge Clarity Measures
1.6 Approach 2: General Image Quality Assessment (IQA)
1.6.1 Full Reference IQ Measures 1.6.2 No-Reference IQ Measures1.7 Results
1.7.1 Results: ATVS-FFp DB
1.7.2 Results: LivDet 2009 DB
1.8 Conclusions
References
2 A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection
2.1 Introduction
2.1.1 Related Works
2.2 Hand-Crafted Texture Descriptors
2.2.1 Local Binary Pattern
2.2.2 Local Phase Qunatization
2.2.3 Binarized Statistical Image Features
2.3 Naturally Learned Features Using Transfer Learning Approaches
2.4 Experiments and Results
2.4.1 Database
2.4.2 Performance Evaluation Protocol 2.4.3 Results on Cooperative Data2.4.4 Results on Non-cooperative Data
2.5 Conclusions
References
3 Optical Coherence Tomography for Fingerprint Presentation Attack Detection
3.1 Introduction
3.2 Background
3.2.1 History and Properties of OCT
3.2.2 Skin Physiology
3.2.3 Presentation Attack Detection
3.3 Existing and Ongoing Research
3.3.1 University of Houston
3.3.2 Bern University of Applied Sciences
3.3.3 University of Delaware
3.3.4 University of Kent
3.3.5 University of California
3.3.6 National University of Ireland
3.3.7 OCT Ingress Project 3.3.8 Council for Scientific and Industrial Research3.4 Other Advantages and Future Work
3.5 Conclusion
References
4 Interoperability Among Capture Devices for Fingerprint Presentation Attacks Detection
4.1 Introduction
4.2 Review of Fingerprint Presentation Attacks Detection Methods
4.2.1 Fingerprint Reproduction Process
4.2.2 Liveness Detection Methods
4.2.3 Software-Based Methods State of the Art
4.3 The Interoperability Problem in FPAD Systems
4.3.1 The Origin of the Interoperability Problem
4.4 Domain Adaptation for the FPAD Interoperability Problem
4.4.1 Problem Definition 4.4.2 Experimental Evidences (PS(X) neqPT(X))4.4.3 Proposed Method
4.5 Experiments
4.5.1 Transformation Using Only Live Samples
4.5.2 Number of Feature Vectors
4.6 Conclusions
References
5 Review of Fingerprint Presentation Attack Detection Competitions
5.1 Introduction
5.2 Background
5.3 Methods and Datasets
5.3.1 Performance Evaluation
5.3.2 Part 1: Algorithm Datasets
5.3.3 Part 2: Systems Submissions
5.3.4 Image Quality
5.3.5 Specific Challenges
5.4 Examination of Results
5.4.1 Trends of Competitors and Results for Fingerprint Part 1: Algorithms