Biometrics use an individual's unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, from high security authentication to access to your laptop or phone. With the deployment of biometric systems in different environments such as laptops, mobile phones, airports, e-commerce, and others, users are also gradually getting accustomed with their use in everyday life, and the security weaknesses of these systems are also recognized by fraudsters and hackers. The use of fake biometric traits is commonly termed presentation attacks or spoofing, and unless the security system is equipped with a spoofing detection ability, fake biometric traits can be easily presented to gain illegitimate access. Hence, a secure biometrics system should be able to detect spoofing attacks.
This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.
This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader's understanding.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, D ausgeliefert werden.