Abstract
Using mobile devices, people leave latent fingerprints on the screen that can be photographed and used as a mold to fabricate high-quality spoofs. In this paper, we analysed the threat level of realistic attacks using snapshot pictures of latent fingerprints against presentation attack detection systems. Our evaluation compares a semi-consensual acquisition, given by a voluntary pressure of the finger on the screen, with a completely non-consensual one, given by the normal use of the device.
AUTHORS Roberto Casula; Marco Micheletto; Giulia Orrù; Gian Luca Marcialis; Fabio Roli
DOI 10.1016/j.patrec.2022.09.002
Published in: Pattern Recognition Letters, Volume 171