核心
发表于 2025-3-26 23:24:36
Werner Hecker,Carsten Lau,Arno Müller to the different types of attacks that can be potentially launched, the chapter presents methods for (fraudulently) obtaining fingerprint data and their countermeasures. The focus is on presentation attack instruments (e.g., spoof fingerprints) and related presentation attack detection (PAD) techni
仪式
发表于 2025-3-27 03:42:23
http://reply.papertrans.cn/43/4214/421327/421327_32.png
手工艺品
发表于 2025-3-27 06:30:36
http://reply.papertrans.cn/43/4214/421327/421327_33.png
Shuttle
发表于 2025-3-27 10:26:11
http://reply.papertrans.cn/43/4214/421327/421327_34.png
Ferritin
发表于 2025-3-27 17:01:52
http://reply.papertrans.cn/43/4214/421327/421327_35.png
Malleable
发表于 2025-3-27 19:01:46
http://reply.papertrans.cn/43/4214/421327/421327_36.png
Maximize
发表于 2025-3-27 23:46:15
Latent Fingerprint Recognition, fingerprints have been (and still often are) processed semi-automatically; a latent print examiner marks the minutiae in latent prints, followed by an automatic search on an AFIS. This procedure is time-consuming and subjective, which limits both the efficiency and efficacy of identifying the suspe
赤字
发表于 2025-3-28 02:18:10
Fingerprint Synthesis, fingerprint recognition algorithms. This approach is particularly useful to deal with emerging privacy regulations (e.g., EU-GDPR) limiting the use of personally identifiable information. This chapter introduces fingerprint synthesis and focuses on the two main categories of generation approaches:
大气层
发表于 2025-3-28 10:18:15
http://reply.papertrans.cn/43/4214/421327/421327_39.png
defile
发表于 2025-3-28 11:31:19
Securing Fingerprint Systems, to the different types of attacks that can be potentially launched, the chapter presents methods for (fraudulently) obtaining fingerprint data and their countermeasures. The focus is on presentation attack instruments (e.g., spoof fingerprints) and related presentation attack detection (PAD) techni