• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 5
  • Tagged with
  • 11
  • 11
  • 9
  • 8
  • 7
  • 6
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Novel active sweat pores based liveness detection techniques for fingerprint biometrics

Memon, Shahzad Ahmed January 2012 (has links)
Liveness detection in automatic fingerprint identification systems (AFIS) is an issue which still prevents its use in many unsupervised security applications. In the last decade, various hardware and software solutions for the detection of liveness from fingerprints have been proposed by academic research groups. However, the proposed methods have not yet been practically implemented with existing AFIS. A large amount of research is needed before commercial AFIS can be implemented. In this research, novel active pore based liveness detection methods were proposed for AFIS. These novel methods are based on the detection of active pores on fingertip ridges, and the measurement of ionic activity in the sweat fluid that appears at the openings of active pores. The literature is critically reviewed in terms of liveness detection issues. Existing fingerprint technology, and hardware and software solutions proposed for liveness detection are also examined. A comparative study has been completed on the commercially and specifically collected fingerprint databases, and it was concluded that images in these datasets do not contained any visible evidence of liveness. They were used to test various algorithms developed for liveness detection; however, to implement proper liveness detection in fingerprint systems a new database with fine details of fingertips is needed. Therefore a new high resolution Brunel Fingerprint Biometric Database (B-FBDB) was captured and collected for this novel liveness detection research. The first proposed novel liveness detection method is a High Pass Correlation Filtering Algorithm (HCFA). This image processing algorithm has been developed in Matlab and tested on B-FBDB dataset images. The results of the HCFA algorithm have proved the idea behind the research, as they successfully demonstrated the clear possibility of liveness detection by active pore detection from high resolution images. The second novel liveness detection method is based on the experimental evidence. This method explains liveness detection by measuring the ionic activities above the sample of ionic sweat fluid. A Micro Needle Electrode (MNE) based setup was used in this experiment to measure the ionic activities. In results, 5.9 pC to 6.5 pC charges were detected with ten NME positions (50μm to 360 μm) above the surface of ionic sweat fluid. These measurements are also a proof of liveness from active fingertip pores, and this technique can be used in the future to implement liveness detection solutions. The interaction of NME and ionic fluid was modelled in COMSOL multiphysics, and the effect of electric field variations on NME was recorded at 5μm -360μm positions above the ionic fluid.
2

Biometrická detekce živosti pro technologii rozpoznávání otisků prstů / Biometric Liveness Detection for the Fingerprint Recognition Technology

Brabec, Lukáš January 2015 (has links)
This work focuses on liveness detection for the fingerprint recognition technology. The first part of this thesis describes biometrics, biometric systems, liveness detection and the method for liveness detection is proposed, which is based on spectroscopic characteristics of human skin. The second part describes and summarizes performed experiments. In the end, the results are discussed and further improvements are proposed.
3

Liveness Detection in Fingerprint Recognition Systems / Detektering av Artificiella Fingeravtryck vid Användarautentisering

Sandström, Marie January 2004 (has links)
<p>Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today. </p><p>Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments. </p><p>A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc. </p><p>The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.</p>
4

Liveness Detection in Fingerprint Recognition Systems / Detektering av Artificiella Fingeravtryck vid Användarautentisering

Sandström, Marie January 2004 (has links)
Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today. Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments. A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc. The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.
5

Software-based countermeasures to 2D facial spoofing attacks

Komulainen, J. (Jukka) 11 August 2015 (has links)
Abstract Because of its natural and non-intrusive interaction, identity verification and recognition using facial information is among the most active areas in computer vision research. Unfortunately, it has been shown that conventional 2D face recognition techniques are vulnerable to spoofing attacks, where a person tries to masquerade as another one by falsifying biometric data and thereby gaining an illegitimate advantage. This thesis explores different directions for software-based face anti-spoofing. The proposed approaches are divided into two categories: first, low-level feature descriptors are applied for describing the static and dynamic characteristic differences between genuine faces and fake ones in general, and second, complementary attack-specific countermeasures are investigated in order to overcome the limitations of generic spoof detection schemes. The static face representation is based on a set of well-known feature descriptors, including local binary patterns, Gabor wavelet features and histogram of oriented gradients. The key idea is to capture the differences in quality, light reflection and shading by analysing the texture and gradient structure of the input face images. The approach is then extended to the spatiotemporal domain when both facial appearance and dynamics are exploited for spoof detection using local binary patterns from three orthogonal planes. It is reasonable to assume that no generic spoof detection scheme is able to detect all known, let alone unseen, attacks scenarios. In order to find out well-generalizing countermeasures, the problem of anti-spoofing is broken into two attack-specific sub-problems based on whether the spoofing medium can be detected in the provided view or not. The spoofing medium detection is performed by describing the discontinuities in the gradient structures around the detected face. If the display medium is concealed outside the view, a combination of face and background motion correlation measurement and texture analysis is applied. Furthermore, an open-source anti-spoofing fusion framework is introduced and its system-level performance is investigated more closely in order to gain insight on how to combine different anti-spoofing modules. The proposed spoof detection schemes are evaluated on the latest benchmark datasets. The main findings of the experiments are discussed in the thesis. / Tiivistelmä Kasvokuvaan perustuvan henkilöllisyyden tunnistamisen etuja ovat luonnollinen vuorovaikutus ja etätunnistus, minkä takia aihe on ollut erittäin aktiivinen tutkimusalue konenäön tutkimuksessa. Valitettavasti tavanomaiset kasvontunnistustekniikat ovat osoittautuneet haavoittuvaisiksi hyökkäyksille, joissa kameralle esitetään jäljennös kohdehenkilön kasvoista positiivisen tunnistuksen toivossa. Tässä väitöskirjassa tutkitaan erilaisia ohjelmistopohjaisia ratkaisuja keinotekoisten kasvojen ilmaisuun petkuttamisen estämiseksi. Työn ensimmäisessä osassa käytetään erilaisia matalan tason piirteitä kuvaamaan aitojen ja keinotekoisten kasvojen luontaisia staattisia ja dynaamisia eroavaisuuksia. Työn toisessa osassa esitetään toisiaan täydentäviä hyökkäystyyppikohtaisia vastakeinoja, jotta yleispätevien menetelmien puutteet voitaisiin ratkaista ongelmaa rajaamalla. Kasvojen staattisten ominaisuuksien esitys perustuu yleisesti tunnettuihin matalan tason piirteisiin, kuten paikallisiin binäärikuvioihin, Gabor-tekstuureihin ja suunnattujen gradienttien histogrammeihin. Pääajatuksena on kuvata aitojen ja keinotekoisten kasvojen laadun, heijastumisen ja varjostumisen eroavaisuuksia tekstuuria ja gradienttirakenteita analysoimalla. Lähestymistapaa laajennetaan myös tila-aika-avaruuteen, jolloin hyödynnetään samanaikaisesti sekä kasvojen ulkonäköä ja dynamiikkaa irroittamalla paikallisia binäärikuvioita tila-aika-avaruuden kolmelta ortogonaaliselta tasolta. Voidaan olettaa, ettei ole olemassa yksittäistä yleispätevää vastakeinoa, joka kykenee ilmaisemaan jokaisen tunnetun hyökkäystyypin, saati tuntemattoman. Näin ollen työssä keskitytään tarkemmin kahteen hyökkäystilanteeseen. Ensimmäisessä tapauksessa huijausapuvälineen reunoja ilmaistaan analysoimalla gradienttirakenteiden epäjatkuvuuksia havaittujen kasvojen ympäristössä. Jos apuvälineen reunat on piilotettu kameran näkymän ulkopuolelle, petkuttamisen ilmaisu toteutetaan yhdistämällä kasvojen ja taustan liikkeen korrelaation mittausta ja kasvojen tekstuurianalyysiä. Lisäksi työssä esitellään vastakeinojen yhdistämiseen avoimen lähdekoodin ohjelmisto, jonka avulla tutkitaan lähemmin menetelmien fuusion vaikutuksia. Tutkimuksessa esitetyt menetelmät on kokeellisesti vahvistettu alan viimeisimmillä julkisesti saatavilla olevilla tietokannoilla. Tässä väitöskirjassa käydään läpi kokeiden päähavainnot.
6

Liveness Detection on Fingers Using Vein Pattern / Liveness Detection on Fingers Using Vein Pattern

Dohnálek, Tomáš January 2015 (has links)
Tato práce se zabývá rozšířením snímače otisků prstů Touchless Biometric Systems 3D-Enroll o jednotku detekce živosti prstu na základě žil. Bylo navrhnuto a zkonstruováno hardwarové řešení s využitím infračervených diod. Navržené softwarové řešení pracuje ve dvou různých režimech: detekce živosti na základě texturních příznaků a verifikace uživatelů na základě porovnávání žilních vzorů. Datový soubor obsahující přes 1100 snímků jak živých prstů tak jejich falsifikátů vznikl jako součást této práce a výkonnost obou zmíněných režimů byla vyhodnocena na tomto datovém souboru. Na závěr byly navrhnuty materiály vhodné k výrobě falsifikátů otisků prstů umožňující oklamání detekce živosti pomocí žilních vzorů.
7

Detekce živosti prstu pomocí osvětlení různé vlnové délky / Liveness Finger Detection by LEDs with Different Wavelengths

Malý, Tomáš January 2013 (has links)
The goal of this thesis was to study biometrics and focus on liveness detection. Design liveness detection for existing sensor with LEDs using different wavelength.
8

Biometrické rozpoznání živosti prstu / Biometric fingerprint liveness detection

Váňa, Tomáš January 2015 (has links)
This master‘s thesis deals with biometric fingerprint liveness detection. The theoretical part of the work describes fingerprint recognition biometric systems, fingerprint liveness detection issues and methods for fingerprint liveness detection. The practical part of the work describes proposed set of discriminant features and preprocessing of fingerprint image. Proposed approach using neural network to detect a liveness. The algorithm is tested on LivDet database comprising real and fake images acquired with tree sensors. Classification performance approximately 93% was obtained.
9

Detekce šířky papilární linie u otisku prstu / Detection of Papillary Line Width by Fingerprints

Homola, Antonín January 2011 (has links)
This work outlines a method of detection of the papillary line width in fingerprints. This method is one of the possible methods of liveness detection. The first part of the work with deals defining of the fingerprint, attacks on today's systems and possibilities to improve security. The next section detection describes of the papillary line width. During the process of resolving, the first thing to do was to start operation of the scanning device and to read the database for tests and experiments. An independent application was created on this purpose. Further, there were projected methods for detection and measuring of the papillary line width. Use of the Canny edge detector with the Sobel operator and the Gaussian filter proved the best. Then, there is described implementation of individual methods. The next part of the work describes and assesses the results of the tests. The last chapter summarizes the work and proposes further possibilities of development.
10

Detekce živosti prstu na základě změn papilárních linií / Liveness Detection of a Finger Based on Changes of Papillary Lines

Lichvár, Michal January 2008 (has links)
There are several frauds against biometric systems (BSs) and several techniques exist to secure BSs against these frauds. One of the techniques is liveness detection. To fool fingerprint sensors, latent fingerprints, dummy fingers and wafer-thin layer attached to the finger are being used. Liveness detection is being used also when scanning fingerprints. Several different characteristics of the live finger can be used to detect liveness, for example sweat, conductivity etc. In this thesis, new approach is examined. It is based on the expandability of the finger as an effect of heartbeats/pulsation. As the skin is expanding, also the distances between papillary lines are expanding. Whole finger expands approximately in range of 4,5 ľm , the distance between two neighbor papillary lines in 0,454 ľm . This value collides with wavelength of blue and green light. The result from this work is following. The resolution of the capturing device is not high enough to capture the expandability on distance between two neighbor papillary lines. Also, because of collision with wavelength, the diffraction effect is presented and the result images are influenced by this error.

Page generated in 0.0981 seconds