Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Intro
Acknowledgements
Author biography
Amit Chatterjee
List of acronyms
Chapter Biometrics
1.1 Introduction
1.2 Types of biometrics
1.2.1 Physiological identifiers
1.2.2 Behavioral identifiers
1.3 Applications
1.3.1 Generic applications
1.3.2 Specific applications
1.4 Biometrics authentication architecture
1.5 ISO standards
1.6 Databases
References
Chapter Presentation attack detection in biometrics
2.1 Introduction
2.2 Historical survey
2.3 Types of presentation attacks
2.4 Preparation of spoofed specimen
2.4.1 2D fake
2.4.2 3D fake
2.5 Existing PA detection technologies
2.6 International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) standards
2.7 Databases
References
Chapter Fringe projection-based secure biometrics
3.1 Introduction
3.2 Theory
3.2.1 Basic configuration
3.2.2 Calibration
3.3 Processing strategy
3.3.1 Phase shifting
3.3.2 Fourier transform
3.3.3 Unwrapping
3.4 Experiments and results
3.4.1 Fingerprint
3.4.2 Palmprint
3.4.3 Face
3.4.4 Photo and video attack
3.4.5 Ear: a simulation experiment
3.5 Discussion
References
Chapter Biometric presentation attack detection using speckle metrology
4.1 Introduction
4.2 Theory
4.2.1 Speckle
4.2.2 Biospeckle
4.2.3 Quality parameters
4.3 Processing strategy
4.3.1 Numerical indexing
4.3.2 Visual analysis
4.3.3 Automated region of interest (ROI) selection
4.4 Experimental and results
4.4.1 Generalized configuration
4.4.2 Fingerprint
4.4.3 Retina
4.4.4 Palmprint and face
4.5 Discussion
References
Chapter Presentation attack detection using fringe projection and biospeckle analysis
5.1 Introduction
5.2 Processing strategies
5.2.1 Fringe projection.

5.2.2 Biospeckle analysis
5.3 Experimental descriptions and results
5.3.1 Fingerprint anti-spoofing
5.3.2 Palmprint anti-spoofing
5.3.3 Ear anti-spoofing
5.4 Discussion
References
Chapter Presentation attack detection using optical coherence tomography
6.1 Introduction
6.2 Theory
6.2.1 Skin physiology
6.2.2 OCT imaging
6.3 Experimental descriptions and results
6.3.1 TD-OCT-based PA detection
6.3.2 FD-OCT-based PA detection
6.3.3 FF-OCT-based PA detection
6.4 Discussion
6.4.1 Balancing sensitivity and imaging speed
References
Chapter Thermography-based presentation attack detection
7.1 Introduction
7.2 Theory
7.3 Experiments and results
7.3.1 Thermal-only approach
7.3.2 Multispectral approach
7.4 Discussion
References
Chapter Miscellaneous
8.1 Introduction
8.2 Topography-based techniques
8.2.1 Color texture analysis
8.2.2 Motion detection
8.2.3 Laser triangulation
8.2.4 Stereo vision
8.3 Internal property-based techniques
8.3.1 Pulse oximetry
8.3.2 Ultrasound sensor
8.3.3 Impedance-based technique
8.4 Hybrid techniques
8.4.1 Fringe projection thermography
8.4.2 Multimodal biometrics
References
Chapter Patents: basics and selected descriptions
9.1 Introduction
9.2 Patent process flow
9.3 Criteria for patent grant
9.4 Selected patents for biometric presentation attack detection
9.5 Patentability-an example
References
Chapter Preliminary experiments and research ideas
10.1 Introduction
10.2 Fringe projection
10.3 Speckle metrology
10.4 Speckle projection
10.5 Multiwavelength analysis
10.6 Extreme attacks
References.

Browse Subjects

Show more subjects...

Statistics

from
to
Export