A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 176

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016

File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 316
Function: require_once

Fingerphoto morphing attack generation using texture descriptors based landmarks. | LitMetric

Smartphone-based biometric authentication has been widely used in various applications. Among several biometric characteristics, fingerphoto biometrics captured from smartphones are gaining popularity owing to their usability, scalability across different smartphones, and reliable verification. However, fingerphoto verification systems are vulnerable to both direct and indirect attacks. In this work, we propose a novel method to generate morphing attacks on fingerphoto biometrics captured using smartphones. We introduce three different image-level fingerphoto morphing attack generation algorithms that can generate high-quality fingerphoto morphing images with minimum distortions. Extensive experiments were conducted on two datasets captured using different smartphones under various environmental conditions. The results demonstrate that the proposed morphing algorithms are highly vulnerable to commercial off-the-shelf and block-directional fingerprint verification systems. To effectively detect morphing attacks on fingerphoto biometrics, we propose the use of fingerphoto morphing attack detection algorithms that utilize both handcrafted and deep features. However, our detection results showed a high error rate in accurately detecting these types of attacks.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11246451PMC
http://dx.doi.org/10.1038/s41598-024-66790-8DOI Listing

Publication Analysis

Top Keywords

fingerphoto morphing
16
morphing attack
12
fingerphoto biometrics
12
captured smartphones
12
fingerphoto
8
attack generation
8
biometrics captured
8
verification systems
8
morphing attacks
8
attacks fingerphoto
8

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!