The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite the long history of automated fingerprint recognition, the state-of-the-art 2D sensors still struggle with abraded, dry, wet or greasy fingers, as well as extra-soft skin of the infant fingerprints. But above all, the current sensors suffer from vulnerabilities to presentation attacks, which greatly limits their applicability in unsupervised scenarios such as border control. Optical Coherence...
In recent years, several advances in fingerprint scanning technology regarding cost efficiency, quality&performance and presentation attack detection (PAD) helped to establish fingerprint biometry in more and more areas of application for mainstream as well as high security/governmental purposes. However, there are still cases where the current state of the art is struggling with the technological...
The performance limitations of the state-of-the-art methods for fingerprint presentation attack detection motivate the application of the Optical Coherence Tomography as the scanning technology capable of capturing all the information necessary for both the fingerprint identification and the presentation attack detection. The previous research has evidenced the need for a reliable technique for assessing...
The ever wider application of automatic fingerprint recognition systems to law enforcement and immigration control purposes has motivated attempts to avoid identification by fingerprint alterations. The subjects can try to change their fingerprint patterns in many ways, varying from fingertip abrading, burning and cutting up to sophisticated surgical procedures, and therefore a necessity exists for...
Nowadays, fingerprint biometrics is widely used in various applications, varying from forensic investigations and migration control to access control as regards security sensitive environments. Any biometric system is potentially vulnerable against a fake biometric characteristic, and spoofing of fingerprint systems is one of the most widely researched areas. The state-of-the-art sensors can often...
The increasing usage of fingerprint biometrics as a security technology requires the biometric systems to be resistant against moderate or even high attack potential. To date, state-of-the-art fingerprint sensors can be deceived by using an accurate imitation of the ridge/valley pattern of an enrolled fingerprint that can be produced utilizing low-cost, commonly available materials and techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.