LivDet 2011 - Fingerprint liveness detection competition 2011

نویسندگان

  • David Yambay
  • Luca Ghiani
  • Paolo Denti
  • Gian Luca Marcialis
  • Fabio Roli
  • Stephanie Schuckers
چکیده

" Liveness detection " , a technique used to determine the vitality of a submitted biometric, has been implemented in fingerprint scanners in recent years. The goal for the LivDet 2011 competition is to compare software-based fingerprint liveness detection methodologies (Part 1), as well as fingerprint systems which incorporate liveness detection capabilities (Part 2), using a standardized testing protocol and large quantities of spoof and live fingerprint images. This competition was open to all academic and industrial institutions which have a solution for either software-based or system-based fingerprint vitality detection problem. Five submissions across the two parts of the competition resulted in successful completion. These submissions were: Chinese Academy of Sciences Institute of Automation (CASIA), Federico II University (Federico) and Dermalog Identification SystemsGmbH (Dermalog) for Part 1: Algorithms, and GreenBit and Dermalog for Part 2: Systems. Part 1 was evaluated using four different datasets. The best results were from Federico on the Digital Persona dataset with error for live and spoof detection of 6.2% and 11.61% respectively. The best overall results for Part 1 were Dermalog with 34.05 FerrFake and 11.825% FerrLive. Part 2 was evaluated using live subjects and spoof finger casts. The best results were from Dermalog with an error for live and spoof of 42.5% and 0.8%, respectively.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of the Fingerprint Liveness Detection (LivDet) competition series: 2009 to 2015

A spoof attack, a subset of presentation attacks, is the use of an artificial replica of a biometric in an attempt to circumvent a biometric sensor. Liveness detection, or presentation attack detection, distinguishes between live and fake biometric traits and is based on the principle that additional information can be garnered above and beyond the data procured by a standard authentication sys...

متن کامل

Experimental Results on Fingerprint Liveness Detection

Fingerprint liveness detection is aimed to detect if a fingerprint image, sensed by an electronic device, belongs to an alive fingertip or to be an artificial replica of it. Recent studies have shown that a fingerprint can be replicated and, if a clever attacker tries to evade the system, this is an issue. Accordingly, several countermeasures in terms of fingerprint liveness detection algorithm...

متن کامل

First International Fingerprint Liveness Detection Competition - LivDet 2009

Fingerprint recognition systems are vulnerable to artificial spoof fingerprint attacks, like molds made of silicone, gelatin or Play-Doh. “Liveness detection”, which is to detect vitality information from the biometric signature itself, has been proposed to defeat these kinds of spoof attacks. The goal for the LivDet 2009 competition is to compare different methodologies for softwarebased finge...

متن کامل

LivDet 2017 Fingerprint Liveness Detection Competition 2017

Fingerprint Presentation Attack Detection (FPAD) deals with distinguishing images coming from artificial replicas of the fingerprint characteristic, made up of materials like silicone, gelatine or latex, and images coming from alive fingerprints. Images are captured by modern scanners, typically relying on solid-state or optical technologies. Since from 2009, the Fingerprint Liveness Detection ...

متن کامل

Spatial surface coarseness analysis: technique for fingerprint spoof detection

Introduction: Presently, the fingerprint is the most commonly used biometric identifier in authentication systems. It was responsible for more than 50% of the biometric revenue in 2009 [1]. According to Roberts [2], one way to overtake the security of those systems is providing to the sensor a fake physical biometric. Thus, an efficient technique for spoof detection [3,4] is an essential requir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012