核心 发表于 2025-3-26 23:24:36
Werner Hecker,Carsten Lau,Arno Müller to the different types of attacks that can be potentially launched, the chapter presents methods for (fraudulently) obtaining fingerprint data and their countermeasures. The focus is on presentation attack instruments (e.g., spoof fingerprints) and related presentation attack detection (PAD) techni仪式 发表于 2025-3-27 03:42:23
http://reply.papertrans.cn/43/4214/421327/421327_32.png手工艺品 发表于 2025-3-27 06:30:36
http://reply.papertrans.cn/43/4214/421327/421327_33.pngShuttle 发表于 2025-3-27 10:26:11
http://reply.papertrans.cn/43/4214/421327/421327_34.pngFerritin 发表于 2025-3-27 17:01:52
http://reply.papertrans.cn/43/4214/421327/421327_35.pngMalleable 发表于 2025-3-27 19:01:46
http://reply.papertrans.cn/43/4214/421327/421327_36.pngMaximize 发表于 2025-3-27 23:46:15
Latent Fingerprint Recognition, fingerprints have been (and still often are) processed semi-automatically; a latent print examiner marks the minutiae in latent prints, followed by an automatic search on an AFIS. This procedure is time-consuming and subjective, which limits both the efficiency and efficacy of identifying the suspe赤字 发表于 2025-3-28 02:18:10
Fingerprint Synthesis, fingerprint recognition algorithms. This approach is particularly useful to deal with emerging privacy regulations (e.g., EU-GDPR) limiting the use of personally identifiable information. This chapter introduces fingerprint synthesis and focuses on the two main categories of generation approaches:大气层 发表于 2025-3-28 10:18:15
http://reply.papertrans.cn/43/4214/421327/421327_39.pngdefile 发表于 2025-3-28 11:31:19
Securing Fingerprint Systems, to the different types of attacks that can be potentially launched, the chapter presents methods for (fraudulently) obtaining fingerprint data and their countermeasures. The focus is on presentation attack instruments (e.g., spoof fingerprints) and related presentation attack detection (PAD) techni