Journal articles on the topic 'Spoofed fingerprints'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 45 journal articles for your research on the topic 'Spoofed fingerprints.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nastasiu, Dragoș, Răzvan Scripcaru, Angela Digulescu, Cornel Ioana, Raymundo De Amorim, Nicolas Barbot, Romain Siragusa, Etienne Perret, and Florin Popescu. "A New Method of Secure Authentication Based on Electromagnetic Signatures of Chipless RFID Tags and Machine Learning Approaches." Sensors 20, no. 21 (November 9, 2020): 6385. http://dx.doi.org/10.3390/s20216385.
Full textNIKAM, SHANKAR BHAUSAHEB, and SUNEETA AGARWAL. "CO-OCCURRENCE PROBABILITIES AND WAVELET-BASED SPOOF FINGERPRINT DETECTION." International Journal of Image and Graphics 09, no. 02 (April 2009): 171–99. http://dx.doi.org/10.1142/s0219467809003393.
Full textF.W. Onifade, Olufade, Paul Akinde, and Folasade Olubusola Isinkaye. "Circular Gabor wavelet algorithm for fingerprint liveness detection." Journal of Advanced Computer Science & Technology 9, no. 1 (January 11, 2020): 1. http://dx.doi.org/10.14419/jacst.v9i1.29908.
Full textAgarwal, Rohit, A. S. Jalal, and K. V. Arya. "A review on presentation attack detection system for fake fingerprint." Modern Physics Letters B 34, no. 05 (February 3, 2020): 2030001. http://dx.doi.org/10.1142/s021798492030001x.
Full textBabikir Adam, Edriss Eisa, and Sathesh. "Evaluation of Fingerprint Liveness Detection by Machine Learning Approach - A Systematic View." Journal of ISMAC 3, no. 1 (March 1, 2021): 16–30. http://dx.doi.org/10.36548/jismac.2021.1.002.
Full textLee, Fu-Yuan, and Shiuhpyng Shieh. "Defending against spoofed DDoS attacks with path fingerprint." Computers & Security 24, no. 7 (October 2005): 571–86. http://dx.doi.org/10.1016/j.cose.2005.03.005.
Full textLeghari, Mehwish, Shahzad Memon, Lachhman Das Dhomeja, Akhtar Hussain Jalbani, and Asghar Ali Chandio. "Deep Feature Fusion of Fingerprint and Online Signature for Multimodal Biometrics." Computers 10, no. 2 (February 7, 2021): 21. http://dx.doi.org/10.3390/computers10020021.
Full textSekulska-Nalewajko, Joanna, Jarosław Gocławski, and Dominik Sankowski. "The Detection of Internal Fingerprint Image Using Optical Coherence Tomography." Image Processing & Communications 22, no. 4 (December 1, 2017): 59–72. http://dx.doi.org/10.1515/ipc-2017-0022.
Full textVerma, Akhilesh, Vijay Kumar Gupta, Savita Goel, Akbar, Arun Kumar Yadav, and Divakar Yadav. "Modeling Fingerprint Presentation Attack Detection Through Transient Liveness Factor-A Person Specific Approach." Traitement du Signal 38, no. 2 (April 30, 2021): 299–307. http://dx.doi.org/10.18280/ts.380206.
Full textChugh, Tarang, and Anil K. Jain. "Fingerprint Spoof Detector Generalization." IEEE Transactions on Information Forensics and Security 16 (2021): 42–55. http://dx.doi.org/10.1109/tifs.2020.2990789.
Full textIula, Antonio. "Ultrasound Systems for Biometric Recognition." Sensors 19, no. 10 (May 20, 2019): 2317. http://dx.doi.org/10.3390/s19102317.
Full textShidik, Guruh Fajar, Edi Jaya Kusuma, Safira Nuraisha, and Pulung Nurtantio Andono. "Heuristic vs Metaheuristic Method: Improvement of Spoofed Fingerprint Identification in IoT Devices." International Review on Modelling and Simulations (IREMOS) 12, no. 3 (June 30, 2019): 168. http://dx.doi.org/10.15866/iremos.v12i3.17330.
Full textArunalatha, G., and M. Ezhilarasan. "Fingerprint Spoof Detection Using Quality Features." International Journal of Security and Its Applications 9, no. 10 (October 31, 2015): 83–94. http://dx.doi.org/10.14257/ijsia.2015.9.10.07.
Full textBalaji, Aadhithya, Varun. H.S., and Sikha. O.K. "Multimodal Fingerprint Spoof Detection Using White Light." Procedia Computer Science 78 (2016): 330–35. http://dx.doi.org/10.1016/j.procs.2016.02.066.
Full textYassin, Ali A. "Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing." International Scholarly Research Notices 2014 (September 24, 2014): 1–13. http://dx.doi.org/10.1155/2014/351696.
Full textDarlow, Luke Nicholas, Leandra Webb, and Natasha Botha. "Automated spoof-detection for fingerprints using optical coherence tomography." Applied Optics 55, no. 13 (April 22, 2016): 3387. http://dx.doi.org/10.1364/ao.55.003387.
Full textChugh, Tarang, Kai Cao, and Anil K. Jain. "Fingerprint Spoof Buster: Use of Minutiae-Centered Patches." IEEE Transactions on Information Forensics and Security 13, no. 9 (September 2018): 2190–202. http://dx.doi.org/10.1109/tifs.2018.2812193.
Full textJiang, Yujia, and Xin Liu. "Spoof Fingerprint Detection based on Co-occurrence Matrix." International Journal of Signal Processing, Image Processing and Pattern Recognition 8, no. 8 (August 31, 2015): 373–84. http://dx.doi.org/10.14257/ijsip.2015.8.8.38.
Full textBarsky, Tatiana, Ariel Tankus, and Yehezkel Yeshurun. "Classification of fingerprint images to real vs. spoof." International Journal of Biometrics 4, no. 1 (2012): 1. http://dx.doi.org/10.1504/ijbm.2012.044289.
Full textKho, Jun Beom, Wonjune Lee, Heeseung Choi, and Jaihie Kim. "An incremental learning method for spoof fingerprint detection." Expert Systems with Applications 116 (February 2019): 52–64. http://dx.doi.org/10.1016/j.eswa.2018.08.055.
Full textRattani, Ajita, Walter J. Scheirer, and Arun Ross. "Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials." IEEE Transactions on Information Forensics and Security 10, no. 11 (November 2015): 2447–60. http://dx.doi.org/10.1109/tifs.2015.2464772.
Full textPereira, L. F. A., H. N. B. Pinheiro, G. D. C. Cavalcanti, and Tsang Ing Ren. "Spatial surface coarseness analysis: technique for fingerprint spoof detection." Electronics Letters 49, no. 4 (February 2013): 260–61. http://dx.doi.org/10.1049/el.2012.4173.
Full textNikam, Shankar Bhausaheb, and Suneeta Agarwal. "Local binary pattern and wavelet-based spoof fingerprint detection." International Journal of Biometrics 1, no. 2 (2008): 141. http://dx.doi.org/10.1504/ijbm.2008.020141.
Full textALTUN, A. ALPASLAN, H. ERDINC KOCER, and NOVRUZ ALLAHVERDI. "GENETIC ALGORITHM BASED FEATURE SELECTION LEVEL FUSION USING FINGERPRINT AND IRIS BIOMETRICS." International Journal of Pattern Recognition and Artificial Intelligence 22, no. 03 (May 2008): 585–600. http://dx.doi.org/10.1142/s0218001408006351.
Full textSoum, Veasna, Sooyoung Park, Albertus Ivan Brilian, Yunpyo Kim, Madeline Y. Ryu, Taler Brazell, F. John Burpo, Kevin Kit Parker, Oh-Sun Kwon, and Kwanwoo Shin. "Inkjet-Printed Carbon Nanotubes for Fabricating a Spoof Fingerprint on Paper." ACS Omega 4, no. 5 (May 16, 2019): 8626–31. http://dx.doi.org/10.1021/acsomega.9b00936.
Full textJia, Xiaofei, Xin Yang, Kai Cao, Yali Zang, Ning Zhang, Ruwei Dai, Xinzhong Zhu, and Jie Tian. "Multi-scale local binary pattern with filters for spoof fingerprint detection." Information Sciences 268 (June 2014): 91–102. http://dx.doi.org/10.1016/j.ins.2013.06.041.
Full textG., Arunalatha, and M. Ezhilarasan. "Spoof Detection of Fingerprint Biometrics based on Local and Global Quality Measures." International Journal of Computer Applications 124, no. 16 (August 18, 2015): 22–25. http://dx.doi.org/10.5120/ijca2015905804.
Full textLee, Soon-Gyu, Jin-Woo Kim, Kyo-Won Ku, Hee-Chul Hwang, Seung-Hyun Moon, and Won-Jun Choe. "42‐5: Spoof Detection Scheme for Optical Fingerprint Sensors under the Display." SID Symposium Digest of Technical Papers 51, no. 1 (August 2020): 619–21. http://dx.doi.org/10.1002/sdtp.13944.
Full textKumar, Pradeep, Rajkumar Saini, Barjinder Kaur, Partha Pratim Roy, and Erik Scheme. "Fusion of Neuro-Signals and Dynamic Signatures for Person Authentication." Sensors 19, no. 21 (October 28, 2019): 4641. http://dx.doi.org/10.3390/s19214641.
Full textBhardwaj, Ishan, Narendra D. Londhe, and Sunil K. Kopparapu. "A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprint." Pattern Recognition 62 (February 2017): 214–24. http://dx.doi.org/10.1016/j.patcog.2016.09.003.
Full textChatterjee, Amit, Vimal Bhatia, and Shashi Prakash. "Anti-spoof touchless 3D fingerprint recognition system using single shot fringe projection and biospeckle analysis." Optics and Lasers in Engineering 95 (August 2017): 1–7. http://dx.doi.org/10.1016/j.optlaseng.2017.03.007.
Full textAgarwal, Shivang, and C. Ravindranath Chowdary. "A-Stacking and A-Bagging: Adaptive versions of ensemble learning algorithms for spoof fingerprint detection." Expert Systems with Applications 146 (May 2020): 113160. http://dx.doi.org/10.1016/j.eswa.2019.113160.
Full textS. Raju, A., and V. Udayashankara. "A Survey on Unimodal, Multimodal Biometrics and Its Fusion Techniques." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 689. http://dx.doi.org/10.14419/ijet.v7i4.36.24224.
Full textNasiri-Avanaki, Mohammad-Reza, Alexander Meadway, Adrian Bradu, Rohollah Mazrae Khoshki, Ali Hojjatoleslami, and Adrian Gh Podoleanu. "Anti-Spoof Reliable Biometry of Fingerprints Using <i>En-Face</i> Optical Coherence Tomography." Optics and Photonics Journal 01, no. 03 (2011): 91–96. http://dx.doi.org/10.4236/opj.2011.13015.
Full textHatture, Sanjeeva Kumar M., and Shweta Policepatil. "Masquerade Attack Analysis for Secured Face Biometric System." International Journal of Recent Technology and Engineering (IJRTE) 10, no. 2 (July 30, 2021): 225–32. http://dx.doi.org/10.35940/ijrte.b6309.0710221.
Full text"A Robust Hybrid Biometric Face Recognition Payment System." International Journal of Recent Technology and Engineering 8, no. 6 (March 30, 2020): 5586–91. http://dx.doi.org/10.35940/ijrte.f9771.038620.
Full text"Contactless Fingerprint Recognition and Fingerprint Spoof Mitigation using CNN." International Journal of Recent Technology and Engineering 8, no. 4 (November 30, 2019): 9271–75. http://dx.doi.org/10.35940/ijrte.d9420.118419.
Full text"Fingerprint Detection Technique Using SURF, PHOG & PCA Feature Extraction Process." International Journal of Recent Technology and Engineering 8, no. 3 (September 30, 2019): 7266–69. http://dx.doi.org/10.35940/ijrte.c6341.098319.
Full textKanade, Harshada, Gauri Uttarwar, Shweta Borse, and Archana K. "Fingerprint Distortion Detection." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, July 25, 2020, 559–62. http://dx.doi.org/10.32628/cseit2063204.
Full text"Silicone fingers spoof fingerprint system in Brazil." Biometric Technology Today 2013, no. 4 (April 2013): 3. http://dx.doi.org/10.1016/s0969-4765(13)70067-5.
Full textKumar, Ajay. "Fingerprint spoof detection using blood-flow analysis." SPIE Newsroom, 2009. http://dx.doi.org/10.1117/2.1200909.1794.
Full textLarin, Kirill. "Enhanced spoof proofing of fingerprint readers by optical coherence tomography." SPIE Newsroom, 2007. http://dx.doi.org/10.1117/2.1200701.0596.
Full textAli, Syed Farooq, Muhammad Aamir Khan, and Ahmed Sohail Aslam. "Fingerprint matching, spoof and liveness detection: classification and literature review." Frontiers of Computer Science 15, no. 1 (September 29, 2020). http://dx.doi.org/10.1007/s11704-020-9236-4.
Full textVerma, Akhilesh, Vijay Kumar Gupta, and Savita Goel. "Fingerprint Presentation Attack Detection in Open-Set Scenario using Transient Liveness Factor." Recent Advances in Computer Science and Communications 13 (April 23, 2020). http://dx.doi.org/10.2174/2666255813999200423123033.
Full textSong, Hyoung-Kyu, Ebrahim AlAlkeem, Jaewoong Yun, Tae-Ho Kim, Hyerin Yoo, Dasom Heo, Myungsu Chae, and Chan Yeob Yeun. "Deep user identification model with multiple biometric data." BMC Bioinformatics 21, no. 1 (July 16, 2020). http://dx.doi.org/10.1186/s12859-020-03613-3.
Full text