{"id":8548,"date":"2022-09-20T18:23:00","date_gmt":"2022-09-20T16:23:00","guid":{"rendered":"https:\/\/sites.unica.it\/pralab\/?p=8548"},"modified":"2023-07-27T19:11:45","modified_gmt":"2023-07-27T17:11:45","slug":"towards-realistic-fingerprint-presentation-attacks-the-screenspoof-method","status":"publish","type":"post","link":"https:\/\/sites.unica.it\/pralab\/2022\/09\/20\/towards-realistic-fingerprint-presentation-attacks-the-screenspoof-method\/","title":{"rendered":"Towards realistic fingerprint presentation attacks: The ScreenSpoof method"},"content":{"rendered":"\n<h6 class=\"wp-block-heading\">Abstract<\/h6>\n\n\n\n<p class=\"has-text-align-left is-style-info has-neve-text-color-color has-nv-site-bg-background-color has-text-color has-background\">Using&nbsp;mobile devices, people leave latent fingerprints on the screen that can be photographed and used as a mold to fabricate high-quality spoofs. In this paper, we analysed the threat level of realistic attacks using snapshot pictures of latent fingerprints against presentation attack detection systems. Our evaluation compares a semi-consensual acquisition, given by a voluntary pressure of the finger on the screen, with a completely non-consensual one, given by the normal use of the device.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>AUTHORS<\/strong> <a href=\"https:\/\/sites.unica.it\/pralab\/people\/roberto-casula\/\" data-type=\"page\" data-id=\"7310\">Roberto Casula<\/a>; <a href=\"https:\/\/sites.unica.it\/pralab\/people\/marco-micheletto\/\" data-type=\"page\" data-id=\"7307\">Marco Micheletto<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/orcid.org\/0000-0003-1196-7869\" target=\"_blank\"><\/a>; <a href=\"https:\/\/sites.unica.it\/pralab\/people\/giulia-orru\/\">Giulia Orr\u00f9<\/a>;\u00a0<a href=\"https:\/\/sites.unica.it\/pralab\/people\/gian-luca-marcialis\/\" data-type=\"page\" data-id=\"7284\">Gian Luca Marcialis<\/a>;\u00a0<a href=\"https:\/\/sites.unica.it\/pralab\/people\/fabio-roli\/\" data-type=\"page\" data-id=\"7282\">Fabio Roli<\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/orcid.org\/0000-0003-4103-9190\" target=\"_blank\"><\/a><\/p>\n\n\n\n<p><strong>DOI<\/strong> <a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1016\/j.patrec.2022.09.002\" target=\"_blank\">10.1016\/j.patrec.2022.09.002<\/a><\/p>\n<cite><strong>Published in:&nbsp;<\/strong><a href=\"https:\/\/www.sciencedirect.com\/journal\/pattern-recognition-letters\">Pattern Recognition Letters<\/a>, <a href=\"https:\/\/www.sciencedirect.com\/journal\/pattern-recognition-letters\/vol\/171\/suppl\/C\">Volume 171<\/a><\/cite><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Abstract Using&nbsp;mobile devices, people leave latent fingerprints on the screen that can be photographed and used as a mold to fabricate high-quality spoofs. In this paper, we analysed the threat level of realistic attacks using snapshot pictures of latent fingerprints against presentation attack detection systems. Our evaluation compares a semi-consensual acquisition, given by a voluntary&hellip;&nbsp;<a href=\"https:\/\/sites.unica.it\/pralab\/2022\/09\/20\/towards-realistic-fingerprint-presentation-attacks-the-screenspoof-method\/\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Towards realistic fingerprint presentation attacks: The ScreenSpoof method<\/span><\/a><\/p>\n","protected":false},"author":3990,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[24,23],"tags":[],"class_list":["post-8548","post","type-post","status-publish","format-standard","hentry","category-pad","category-publications"],"_links":{"self":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/posts\/8548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/users\/3990"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/comments?post=8548"}],"version-history":[{"count":2,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/posts\/8548\/revisions"}],"predecessor-version":[{"id":8565,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/posts\/8548\/revisions\/8565"}],"wp:attachment":[{"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/media?parent=8548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/categories?post=8548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.unica.it\/pralab\/wp-json\/wp\/v2\/tags?post=8548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}