[go: up one dir, main page]

Moon et al., 2021 - Google Patents

Face antispoofing method using color texture segmentation on FPGA

Moon et al., 2021

View PDF @Full View
Document ID
15435134811486499363
Author
Moon Y
Ryoo I
Kim S
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

User authentication for accurate biometric systems is becoming necessary in modern real‐ world applications. Authentication systems based on biometric identifiers such as faces and fingerprints are being applied in a variety of fields in preference over existing password input …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/0008Extracting features related to ridge properties; determining the fingerprint type, e.g. whorl, loop
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/52Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • G06K9/00046Image acquisition by using geometrical optics, e.g. using prisms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • G06K9/00093Matching features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification

Similar Documents

Publication Publication Date Title
Damer et al. Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts
Chen et al. Face liveness detection: fusing colour texture feature and deep feature
US20250191403A1 (en) Forgery detection of face image
CN112215180B (en) Living body detection method and device
Sumalatha et al. A comprehensive review of unimodal and multimodal fingerprint biometric authentication systems: Fusion, attacks, and template protection
Atoum et al. Face anti-spoofing using patch and depth-based CNNs
Moon et al. Face antispoofing method using color texture segmentation on FPGA
Xin et al. Multimodal feature-level fusion for biometrics identification system on IoMT platform
Ortega-Delcampo et al. Border control morphing attack detection with a convolutional neural network de-morphing approach
Seibold et al. Accurate and robust neural networks for face morphing attack detection
Tian et al. Stacked PCA network (SPCANet): an effective deep learning for face recognition
Rathgeb et al. Makeup presentation attacks: Review and detection performance benchmark
Tapia et al. Single morphing attack detection using feature selection and visualization based on mutual information
Ali et al. Proposed face recognition system after plastic surgery
Einy et al. IoT Cloud‐Based Framework for Face Spoofing Detection with Deep Multicolor Feature Learning Model
Gao et al. Deep Learning in Palmprint Recognition: A Comprehensive Survey
Wu et al. Comparative analysis and application of LBP face image recognition algorithms
Ibsen et al. Impact of facial tattoos and paintings on face recognition systems
Khade et al. Fingerprint liveness detection using directional ridge frequency with machine learning classifiers
Liu et al. Presentation attack detection for face in mobile phones
Fang et al. Intra and cross-spectrum iris presentation attack detection in the NIR and visible domains
Bakshi et al. 3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine
Rathgeb et al. Reliable detection of doppelgängers based on deep face representations
Burkul et al. Exploring the intricacies of Biometric ATM operations, specifically focusing on the integration of fingerprint and facial recognition using Deep Learning techniques
Kisku et al. Multithread face recognition in cloud