Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
Smartphone-based biometric authentication has been widely used in various applications. Among several biometric characteristics, fingerphoto biometrics captured from smartphones are gaining popularity owing to their usability, scalability across different smartphones, and reliable verification. However, fingerphoto verification systems are vulnerable to both direct and indirect attacks. In this work, we propose a novel method to generate morphing attacks on fingerphoto biometrics captured using smartphones. We introduce three different image-level fingerphoto morphing attack generation algorithms that can generate high-quality fingerphoto morphing images with minimum distortions. Extensive experiments were conducted on two datasets captured using different smartphones under various environmental conditions. The results demonstrate that the proposed morphing algorithms are highly vulnerable to commercial off-the-shelf and block-directional fingerprint verification systems. To effectively detect morphing attacks on fingerphoto biometrics, we propose the use of fingerphoto morphing attack detection algorithms that utilize both handcrafted and deep features. However, our detection results showed a high error rate in accurately detecting these types of attacks.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11246451 | PMC |
http://dx.doi.org/10.1038/s41598-024-66790-8 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!