Motwakel et al., 2021 - Google Patents
Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A SurveyMotwakel et al., 2021
View PDF- Document ID
- 15178987952783671902
- Author
- Motwakel A
- Hilal A
- Hamza M
- Ghoneim H
- Publication year
- Publication venue
- International Journal of Computer Science & Network Security
External Links
Snippet
The implementation of iris biometrics on smartphone devices has recently become an emerging research topic. As the use of iris biometrics on smartphone devices becomes more widely adopted, it is to be expected that there will be similar efforts in the research …
- 210000000554 Iris 0 title abstract description 331
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sharma et al. | D-NetPAD: An explainable and interpretable iris presentation attack detector | |
| Czajka et al. | Presentation attack detection for iris recognition: An assessment of the state-of-the-art | |
| Bowyer et al. | A survey of iris biometrics research: 2008–2010 | |
| Chakraborty et al. | An overview of face liveness detection | |
| Raghavendra et al. | Robust scheme for iris presentation attack detection using multiscale binarized statistical image features | |
| Kalka et al. | Estimating and fusing quality factors for iris biometric images | |
| Tome et al. | The 1st competition on counter measures to finger vein spoofing attacks | |
| Anthony et al. | A review of face anti-spoofing methods for face recognition systems | |
| Thavalengal et al. | Iris liveness detection for next generation smartphones | |
| Sequeira et al. | Iris liveness detection methods in mobile applications | |
| Pravallika et al. | SVM classification for fake biometric detection using image quality assessment: Application to iris, face and palm print | |
| Agarwal et al. | Presentation attack detection system for fake Iris: a review | |
| Chirchi et al. | Iris biometric recognition for person identification in security systems | |
| Hassan et al. | SIPFormer: Segmentation of multiocular biometric traits with transformers | |
| Gomez-Barrero et al. | Towards multi-modal finger presentation attack detection | |
| Sarode et al. | Review of iris recognition: an evolving biometrics identification technology | |
| El-Naggar et al. | Which dataset is this iris image from? | |
| Dronky et al. | A review on iris liveness detection techniques | |
| Sallam et al. | Iris recognition system using deep learning techniques | |
| Proença | Unconstrained iris recognition in visible wavelengths | |
| Ali et al. | Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor. | |
| Benlamoudi | Multi-modal and anti-spoofing person identification | |
| Motwakel et al. | Presentation Attack Detection (PAD) for Iris Recognition System on Mobile Devices-A Survey | |
| Karunya et al. | A study of liveness detection in fingerprint and iris recognition systems using image quality assessment | |
| SulaimanAlshebli et al. | The cyber security biometric authentication based on liveness face-iris images and deep learning classifier |