We're sorry. An error has occurred
Please cancel or retry.
Biometric Presentation Attack Detection
Some error occured while loading the Quick View. Please close the Quick View and try reloading the page.
Couldn't load pickup availability
- Format:
-
21 December 2023

Biometrics use an individual’s unique biological identifiers to verify his or her identity. The present technological evolution has allowed the use of biometrics in many diverse environments, and we are therefore at higher risk of spoofing attacks from fraudsters and hackers. This book discusses anti-spoofing techniques in detail. For each anti-spoofing technology, different experimental configurations, processing strategies, scope for generalization, advantages and limitations are detailed. The book also considers applicability of artificial intelligence techniques for automated biometric spoof detection, and future scope of research in this direction. MATLAB and PYTHON codes for few anti-spoofing schemes are also provided to further the reader’s understanding.
Key Features:
- Consolidated approach includes most prevalent spoofing and anti-spoofing strategies.
- Includes both hardware and software-based approaches to anti-spoofing technologies
- Features Artificial Intelligence methods
- Reviews patents
- Accompanied by MATLAB and PYTHON codes
COMPUTERS / Security / General, Computer security, TECHNOLOGY & ENGINEERING / Sensors, COMPUTERS / Human-Computer Interaction, Human–computer interaction, Sensors
Preface
Acknowledgements
Author biography
List of acronyms
1 Biometrics
2 Presentation attack detection in biometrics
3 Fringe projection–based secure biometrics
4 Biometric presentation attack detection using speckle metrology
5 Presentation attack detection using fringe projection and biospeckle analysis
6 Presentation attack detection using optical coherence tomography
7 Thermography-based presentation attack detection
8 Miscellaneous
9 Patents: basics and selected descriptions
10 Preliminary experiments and research ideas