A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems
2017
IEEE Transactions on Information Forensics and Security
This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints of a user are enrolled. ...
In this regard, we expose a potential vulnerability of partial fingerprint-based authentication systems, especially when multiple impressions are enrolled per finger. ...
APPENDIX The size of the window was decided to approximately match the size of the fingerprint image captured by the Apple Touch ID sensor which is composed of an 8 x 8 millimeter (0.3" x 0.3") capacitive ...
doi:10.1109/tifs.2017.2691658
fatcat:unbxxvzcf5at5nmdjqr76cllhu
Diversity and Novelty MasterPrints: Generating Multiple DeepMasterPrints for Increased User Coverage
[article]
2022
arXiv
pre-print
This system uses quality diversity evolutionary algorithms to generate dictionaries of artificial prints with a focus on increasing coverage of users from the dataset. ...
This work expands on previous advancements in genetic fingerprint spoofing via the DeepMasterPrints and introduces Diversity and Novelty MasterPrints. ...
INTRODUCTION Recent work has demonstrated that user authentication systems based on biometrics can be potentially vulnerable to dictionary attacks [?] . ...
arXiv:2209.04909v1
fatcat:hl427vgafrgizgwku2fmm3fbwe
Image Generation with Gans-based Techniques: A Survey
2019
International Journal of Computer Science & Information Technology (IJCSIT)
We provide a detailed review of current GANs-based image generation models with their advantages and disadvantages.The results of the publications in each section show the GANs based algorithmsAREgrowing ...
In this article, we discuss five applicable and fascinating areas for image synthesis based on the state-of-theart GANs techniques including Text-to-Image-Synthesis, Image-to-Image-Translation, Face Manipulation ...
In their work, specific approaches were presented to generate Master Print at the feature level, then the vulnerability of fingerprint systems that use partial prints for authentication was carefully analysed ...
doi:10.5121/ijcsit.2019.11503
fatcat:yvmn5dcmdvgdjfth2vbcvfin54
Synthetic Data in Human Analysis: A Survey
[article]
2022
arXiv
pre-print
We conduct a survey that summarises current state-of-the-art methods and the main benefits of using synthetic data. ...
However, the performance of such networks scales with the available training data. ...
of Education and Research and the Hessian Ministry of Higher Education, Research, Science and the Arts within their joint support of the National Research Center for Applied Cybersecurity ATHENE. ...
arXiv:2208.09191v1
fatcat:664lxnbjezcifev6cewkripjze
Activity-Based User Authentication Using Smartwatches
[article]
2020
Therefore, this study remedies these past problems by training and evaluating the smartwatch-based biometric system on data from different days, using large dataset that involved the participation of 60 ...
For comparison, a more selective set of features was used and significantly maximize the system performance under the cross day scenario, at best EERs of 0 [...] ...
The possible explanation of this vulnerability is that the captured sample/s does not contain enough distinctive features due to the limited image size of the user's fingerprint, which is partially captured ...
doi:10.24382/758
fatcat:ihjhhqq2trgdhp72in7bx5b7ua