1 option
Biometric presentation attack detection : towards securing biometric authentication systems / Amit Chatterjee.
- Format:
- Book
- Author/Creator:
- Chatterjee, Amit (Ph. D. in electrical engineering), author.
- Series:
- IOP (Series). Release 23.
- IOP ebooks. 2023 collection.
- [IOP release $release]
- IOP ebooks. [2023 collection]
- Language:
- English
- Subjects (All):
- Biometric identification.
- Intrusion detection systems (Computer security).
- Physical Description:
- 1 online resource (various pagings) : illustrations (some color).
- Other Title:
- Towards securing biometric authentication systems.
- Place of Publication:
- Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) : IOP Publishing, [2023]
- System Details:
- Mode of access: World Wide Web.
- System requirements: Adobe Acrobat Reader, EPUB reader, or Kindle reader.
- Biography/History:
- Amit Chatterjee has several years of research experience of working on developing various anti-spoof biometric sensors using optical techniques and has published around 40 Journal and international conference papers and has filed 7 patents.
- Summary:
- Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, and we are therefore at higher risk of spoofing attacks from fraudsters and hackers. This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.
- Contents:
- 1. Biometrics
- 1.1. Introduction
- 1.2. Types of biometrics
- 1.3. Applications
- 1.4. Biometrics authentication architecture
- 1.5. ISO standards
- 1.6. Databases
- 2. Presentation attack detection in biometrics
- 2.1. Introduction
- 2.2. Historical survey
- 2.3. Types of presentation attacks
- 2.4. Preparation of spoofed specimen
- 2.5. Existing PA detection technologies
- 2.6. International Organization for Standardization (ISO)/International
- 2.7. Databases
- 3. Fringe projection-based secure biometrics
- 3.1. Introduction
- 3.2. Theory
- 3.3. Processing strategy
- 3.4. Experiments and results
- 3.5. Discussion
- 4. Biometric presentation attack detection using speckle metrology
- 4.1. Introduction
- 4.2. Theory
- 4.3. Processing strategy
- 4.4. Experimental and results
- 4.5. Discussion
- 5. Presentation attack detection using fringe projection and biospeckle analysis
- 5.1. Introduction
- 5.2. Processing strategies
- 5.3. Experimental descriptions and results
- 5.4. Discussion
- 6. Presentation attack detection using optical coherence tomography
- 6.1. Introduction
- 6.2. Theory
- 6.3. Experimental descriptions and results
- 6.4. Discussion
- 7. Thermography-based presentation attack detection
- 7.1. Introduction
- 7.2. Theory
- 7.3. Experiments and results
- 7.4. Discussion
- 8. Miscellaneous
- 8.1. Introduction
- 8.2. Topography-based techniques
- 8.3. Internal property-based techniques
- 8.4. Hybrid techniques
- 9. Patents : basics and selected descriptions
- 9.1. Introduction
- 9.2. Patent process flow
- 9.3. Criteria for patent grant
- 9.4. Selected patents for biometric presentation attack detection
- 9.5. Patentability
- an example
- 10. Preliminary experiments and research ideas
- 10.1. Introduction
- 10.2. Fringe projection
- 10.3. Speckle metrology
- 10.4. Speckle projection
- 10.5. Multiwavelength analysis
- 10.6. Extreme attacks.
- Notes:
- "Version: 20231101"--Title page verso.
- Includes bibliographical references.
- Title from PDF title page (viewed on January 4, 2024).
- Other Format:
- Print version:
- ISBN:
- 9780750352024
- 9780750352017
- OCLC:
- 1415962371
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.