Due to their user-friendliness and reliability, biometric systems have taken a central role in everyday digital identity management for all kinds of private, financial and governmental applications with increasing security requirements. A central security aspect of unsupervised biometric authentication systems is the presentation attack detection (PAD) mechanism, which defines the robustness to fake or altered biometric features. Artifacts like photos, artificial fingers, face masks and fake iris contact lenses are a general security threat for all biometric modalities.
View Article and Find Full Text PDFDespite the long history of fingerprint biometrics and its use to authenticate individuals, there are still some unsolved challenges with fingerprint acquisition and presentation attack detection (PAD). Currently available commercial fingerprint capture devices struggle with non-ideal skin conditions, including soft skin in infants. They are also susceptible to presentation attacks, which limits their applicability in unsupervised scenarios such as border control.
View Article and Find Full Text PDFThe input to phonological reasoning are alternations, that is, variations in the pronunciation of related words, such as in electri[k] - electri[s]-ity. But phonologists cannot agree what counts as a relevant alternation: the issue is highly contentious despite a research record of over 50 years. We believe that the experimental setup presented may contribute to this debate based on a kind of evidence that was not brought to bear to date.
View Article and Find Full Text PDF