Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5 Hits in 2.1 sec

MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems

Aditi Roy, Nasir Memon, Arun Ross
2017 IEEE Transactions on Information Forensics and Security  
This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints of a user are enrolled.  ...  In this regard, we expose a potential vulnerability of partial fingerprint-based authentication systems, especially when multiple impressions are enrolled per finger.  ...  APPENDIX The size of the window was decided to approximately match the size of the fingerprint image captured by the Apple Touch ID sensor which is composed of an 8 x 8 millimeter (0.3" x 0.3") capacitive  ... 
doi:10.1109/tifs.2017.2691658 fatcat:unbxxvzcf5at5nmdjqr76cllhu

Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage [article]

M Charity, Nasir Memon, Zehua Jiang, Abhi Sen, Julian Togelius
2022 arXiv   pre-print
This system uses quality diversity evolutionary algorithms to generate dictionaries of artificial prints with a focus on increasing coverage of users from the dataset.  ...  This work expands on previous advancements in genetic fingerprint spoofing via the DeepMasterPrints and introduces Diversity and Novelty MasterPrints.  ...  INTRODUCTION Recent work has demonstrated that user authentication systems based on biometrics can be potentially vulnerable to dictionary attacks [?] .  ... 
arXiv:2209.04909v1 fatcat:hl427vgafrgizgwku2fmm3fbwe

Image Generation with Gans-based Techniques: A Survey

Shirin Nasr Esfahani, Shahram Latifi
2019 International Journal of Computer Science & Information Technology (IJCSIT)  
We provide a detailed review of current GANs-based image generation models with their advantages and disadvantages.The results of the publications in each section show the GANs based algorithmsAREgrowing  ...  In this article, we discuss five applicable and fascinating areas for image synthesis based on the state-of-theart GANs techniques including Text-to-Image-Synthesis, Image-to-Image-Translation, Face Manipulation  ...  In their work, specific approaches were presented to generate Master Print at the feature level, then the vulnerability of fingerprint systems that use partial prints for authentication was carefully analysed  ... 
doi:10.5121/ijcsit.2019.11503 fatcat:yvmn5dcmdvgdjfth2vbcvfin54

Synthetic Data in Human Analysis: A Survey [article]

Indu Joshi, Marcel Grimmer, Christian Rathgeb, Christoph Busch, Francois Bremond, Antitza Dantcheva
2022 arXiv   pre-print
We conduct a survey that summarises current state-of-the-art methods and the main benefits of using synthetic data.  ...  However, the performance of such networks scales with the available training data.  ...  of Education and Research and the Hessian Ministry of Higher Education, Research, Science and the Arts within their joint support of the National Research Center for Applied Cybersecurity ATHENE.  ... 
arXiv:2208.09191v1 fatcat:664lxnbjezcifev6cewkripjze

Activity-Based User Authentication Using Smartwatches [article]

Neamah Hasan AL-Naffakh, Plymouth University, Faculty Of Science And Engineering
2020
Therefore, this study remedies these past problems by training and evaluating the smartwatch-based biometric system on data from different days, using large dataset that involved the participation of 60  ...  For comparison, a more selective set of features was used and significantly maximize the system performance under the cross day scenario, at best EERs of 0 [...]  ...  The possible explanation of this vulnerability is that the captured sample/s does not contain enough distinctive features due to the limited image size of the user's fingerprint, which is partially captured  ... 
doi:10.24382/758 fatcat:ihjhhqq2trgdhp72in7bx5b7ua