Moon et al., 2021 - Google Patents
Face antispoofing method using color texture segmentation on FPGAMoon et al., 2021
View PDF- Document ID
- 15435134811486499363
- Author
- Moon Y
- Ryoo I
- Kim S
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
User authentication for accurate biometric systems is becoming necessary in modern real‐ world applications. Authentication systems based on biometric identifiers such as faces and fingerprints are being applied in a variety of fields in preference over existing password input …
- 230000011218 segmentation 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/0008—Extracting features related to ridge properties; determining the fingerprint type, e.g. whorl, loop
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
- G06K9/00046—Image acquisition by using geometrical optics, e.g. using prisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
- G06K9/00093—Matching features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Damer et al. | Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts | |
| Chen et al. | Face liveness detection: fusing colour texture feature and deep feature | |
| US20250191403A1 (en) | Forgery detection of face image | |
| CN112215180B (en) | Living body detection method and device | |
| Sumalatha et al. | A comprehensive review of unimodal and multimodal fingerprint biometric authentication systems: Fusion, attacks, and template protection | |
| Atoum et al. | Face anti-spoofing using patch and depth-based CNNs | |
| Moon et al. | Face antispoofing method using color texture segmentation on FPGA | |
| Xin et al. | Multimodal feature-level fusion for biometrics identification system on IoMT platform | |
| Ortega-Delcampo et al. | Border control morphing attack detection with a convolutional neural network de-morphing approach | |
| Seibold et al. | Accurate and robust neural networks for face morphing attack detection | |
| Tian et al. | Stacked PCA network (SPCANet): an effective deep learning for face recognition | |
| Rathgeb et al. | Makeup presentation attacks: Review and detection performance benchmark | |
| Tapia et al. | Single morphing attack detection using feature selection and visualization based on mutual information | |
| Ali et al. | Proposed face recognition system after plastic surgery | |
| Einy et al. | IoT Cloud‐Based Framework for Face Spoofing Detection with Deep Multicolor Feature Learning Model | |
| Gao et al. | Deep Learning in Palmprint Recognition: A Comprehensive Survey | |
| Wu et al. | Comparative analysis and application of LBP face image recognition algorithms | |
| Ibsen et al. | Impact of facial tattoos and paintings on face recognition systems | |
| Khade et al. | Fingerprint liveness detection using directional ridge frequency with machine learning classifiers | |
| Liu et al. | Presentation attack detection for face in mobile phones | |
| Fang et al. | Intra and cross-spectrum iris presentation attack detection in the NIR and visible domains | |
| Bakshi et al. | 3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine | |
| Rathgeb et al. | Reliable detection of doppelgängers based on deep face representations | |
| Burkul et al. | Exploring the intricacies of Biometric ATM operations, specifically focusing on the integration of fingerprint and facial recognition using Deep Learning techniques | |
| Kisku et al. | Multithread face recognition in cloud |