Now showing items 1-3 of 3
Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting
With the widespread deployment of biometric recognition systems, the interest in attacking these systems is increasing. One of the easiest ways to circumvent a biometric recognition system are so-called presentation attacks, in which artefacts are presented to the sensor to either impersonate another subject or avoid ...
Improvement of Iris Recognition based on Iris-Code Bit-Error Pattern Analysis
In this paper an advanced iris-biometric comparator is presented. In the proposed scheme an analysis of bit-error patterns produced by Hamming distance-based iris-code comparisons is performed. The lengths of sequences of horizontal consecutive mis-matching bits are measured and a frequency distribution is estimated. The ...
SIC-Gen: A Synthetic Iris-Code Generator
Nowadays large-scale identity management systems enrol more than one billion data subjects. In order to limit transaction times, biometric indexing is a suitable method to reduce the search space in biometric identifications. Effective testing of such biometric identification systems and biometric indexing approaches ...