Biometric presentation attack detection :towards securing biometric authentication systems /
"Version: 20231101"--Title page verso.Includes bibliographical references.1. Biometrics -- 1.1. Introduction -- 1.2. Types of biometrics -- 1.3. Applications -- 1.4. Biometrics authentication architecture -- 1.5. ISO standards -- 1.6. Databases2. Presentation attack detection in biometrics -- 2.1. Introduction -- 2.2. Historical survey -- 2.3. Types of presentation attacks -- 2.4. Preparation of spoofed specimen -- 2.5. Existing PA detection technologies -- 2.6. International Organization for Standardization (ISO)/International -- 2.7. Databases3. Fringe projection-based secure biometrics -- 3.1. Introduction -- 3.2. Theory -- 3.3. Processing strategy -- 3.4. Experiments and results -- 3.5. Discussion4. Biometric presentation attack detection using speckle metrology -- 4.1. Introduction -- 4.2. Theory -- 4.3. Processing strategy -- 4.4. Experimental and results -- 4.5. Discussion5. Presentation attack detection using fringe projection and biospeckle analysis -- 5.1. Introduction -- 5.2. Processing strategies -- 5.3. Experimental descriptions and results -- 5.4. Discussion6. Presentation attack detection using optical coherence tomography -- 6.1. Introduction -- 6.2. Theory -- 6.3. Experimental descriptions and results -- 6.4. Discussion7. Thermography-based presentation attack detection -- 7.1. Introduction -- 7.2. Theory -- 7.3. Experiments and results -- 7.4. Discussion8. Miscellaneous -- 8.1. Introduction -- 8.2. Topography-based techniques -- 8.3. Internal property-based techniques -- 8.4. Hybrid techniques9. Patents : basics and selected descriptions -- 9.1. Introduction -- 9.2. Patent process flow -- 9.3. Criteria for patent grant -- 9.4. Selected patents for biometric presentation attack detection -- 9.5. Patentability--an example10. Preliminary experiments and research ideas -- 10.1. Introduction -- 10.2. Fringe projection -- 10.3. Speckle metrology -- 10.4. Speckle projection -- 10.5. Multiwavelength analysis -- 10.6. Extreme attacks.Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, and we are therefore at higher risk of spoofing attacks from fraudsters and hackers. This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.Academic and industrial R&D engineers and scientists.Also available in print.Mode of access: World Wide Web.System requirements: Adobe Acrobat Reader, EPUB reader, or Kindle reader.Amit Chatterjee has several years of research experience of working on developing various anti-spoof biometric sensors using optical techniques and has published around 40 Journal and international conference papers and has filed 7 patents.Title from PDF title page (viewed on January 4, 2024).
No copy data
No other version available