{"id":"https://openalex.org/W3205999703","doi":"https://doi.org/10.1109/tifs.2021.3121201","title":"Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?","display_name":"Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3205999703","doi":"https://doi.org/10.1109/tifs.2021.3121201","mag":"3205999703"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3121201","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3121201","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2110.10567","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Marco Micheletto","orcid":"https://orcid.org/0000-0003-1196-7869"},"institutions":[{"id":"https://openalex.org/I172446870","display_name":"University of Cagliari","ror":"https://ror.org/003109y17","country_code":"IT","type":"education","lineage":["https://openalex.org/I172446870"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Marco Micheletto","raw_affiliation_strings":["Department of Electrical and Electronic Engineering University of Cagliari Piazza d\u2019Armi I - 09123 Cagliari (Italia). (e-mail: marco.micheletto@unica.it)"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering University of Cagliari Piazza d\u2019Armi I - 09123 Cagliari (Italia). (e-mail: marco.micheletto@unica.it)","institution_ids":["https://openalex.org/I172446870"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Gian Luca Marcialis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gian Luca Marcialis","raw_affiliation_strings":["Department of Electrical and Electronic Engineering University of Cagliari Piazza d\u2019Armi I - 09123 Cagliari (Italia)"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering University of Cagliari Piazza d\u2019Armi I - 09123 Cagliari (Italia)","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Giulia Orru","orcid":"https://orcid.org/0000-0002-7802-2483"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Giulia Orru","raw_affiliation_strings":["Department of Electrical and Electronic Engineering University of Cagliari Piazza d\u2019Armi I - 09123 Cagliari (Italia)"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering University of Cagliari Piazza d\u2019Armi I - 09123 Cagliari (Italia)","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Fabio Roli","orcid":"https://orcid.org/0000-0003-4103-9190"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fabio Roli","raw_affiliation_strings":["Department of Electrical and Electronic Engineering University of Cagliari Piazza d\u2019Armi I - 09123 Cagliari (Italia)"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering University of Cagliari Piazza d\u2019Armi I - 09123 Cagliari (Italia)","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I172446870"],"apc_list":null,"apc_paid":null,"fwci":0.9234,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.74887591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"16","issue":null,"first_page":"5338","last_page":"5351"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.0031999999191612005,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.002400000113993883,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7001000046730042},{"id":"https://openalex.org/keywords/fingerprint-verification-competition","display_name":"Fingerprint Verification Competition","score":0.656000018119812},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6381999850273132},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.6201000213623047},{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.573199987411499},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5690000057220459},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5440000295639038},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.474700003862381},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.45100000500679016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8647000193595886},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7001000046730042},{"id":"https://openalex.org/C164995936","wikidata":"https://www.wikidata.org/wiki/Q5450283","display_name":"Fingerprint Verification Competition","level":4,"score":0.656000018119812},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6381999850273132},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.6201000213623047},{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.573199987411499},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5690000057220459},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5440000295639038},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.474700003862381},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.45100000500679016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42719998955726624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3813999891281128},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3653999865055084},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3452000021934509},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.33570000529289246},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.31060001254081726},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.30889999866485596},{"id":"https://openalex.org/C2982762665","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker verification","level":3,"score":0.29679998755455017},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.29409998655319214},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2818000018596649},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2768999934196472},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C61455927","wikidata":"https://www.wikidata.org/wiki/Q1030529","display_name":"Blossom algorithm","level":3,"score":0.2752000093460083},{"id":"https://openalex.org/C48002344","wikidata":"https://www.wikidata.org/wiki/Q2919644","display_name":"Verification and validation","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2718000113964081},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.26440000534057617},{"id":"https://openalex.org/C2776299755","wikidata":"https://www.wikidata.org/wiki/Q432449","display_name":"Carry (investment)","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tifs.2021.3121201","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3121201","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2110.10567","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2110.10567","pdf_url":"https://arxiv.org/pdf/2110.10567","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:iris.unica.it:11584/321153","is_oa":true,"landing_page_url":"http://hdl.handle.net/11584/321153","pdf_url":null,"source":{"id":"https://openalex.org/S4377196293","display_name":"UNICA IRIS Institutional Research Information System (University of Cagliari)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172446870","host_organization_name":"University of Cagliari","host_organization_lineage":["https://openalex.org/I172446870"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:iris.unige.it:11567/1083616","is_oa":true,"landing_page_url":"https://hdl.handle.net/11567/1083616","pdf_url":null,"source":{"id":"https://openalex.org/S4377196291","display_name":"CINECA IRIS Institutial Research Information System (University of Genoa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I83816512","host_organization_name":"University of Genoa","host_organization_lineage":["https://openalex.org/I83816512"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2110.10567","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2110.10567","pdf_url":"https://arxiv.org/pdf/2110.10567","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W64742913","https://openalex.org/W118835214","https://openalex.org/W1964960762","https://openalex.org/W1969793586","https://openalex.org/W1986702455","https://openalex.org/W2000889716","https://openalex.org/W2034473161","https://openalex.org/W2086517658","https://openalex.org/W2090766658","https://openalex.org/W2118671571","https://openalex.org/W2128242454","https://openalex.org/W2136461127","https://openalex.org/W2141362602","https://openalex.org/W2143140643","https://openalex.org/W2304245051","https://openalex.org/W2343637459","https://openalex.org/W2492824679","https://openalex.org/W2546178662","https://openalex.org/W2560153568","https://openalex.org/W2906701995","https://openalex.org/W2907290678","https://openalex.org/W2907590464","https://openalex.org/W2907633431","https://openalex.org/W2956767096","https://openalex.org/W2964165334","https://openalex.org/W2983409418","https://openalex.org/W3005991297","https://openalex.org/W3120612975"],"related_works":[],"abstract_inverted_index":{"The":[0],"diffusion":[1],"of":[2,16,88,95,120,139,148,164,190],"fingerprint":[3,66,80,214],"verification":[4,81,123,156,227],"systems":[5,111,124,152],"for":[6],"security":[7],"applications":[8],"makes":[9],"it":[10],"urgent":[11],"to":[12,30,65,97,185,208],"investigate":[13,98],"the":[14,37,43,86,93,99,104,118,136,140,143,149,168,180,186,193,198,210,224],"embedding":[15],"software-based":[17],"presentation":[18],"attack":[19],"detection":[20],"algorithms":[21],"(PAD)":[22],"into":[23,122],"such":[24,33],"systems.":[25,82],"Companies":[26],"and":[27,41,155,172,197],"institutions":[28],"need":[29],"know":[31],"whether":[32,42],"integration":[34],"would":[35],"make":[36],"system":[38],"more":[39],"\u201csecure\u201d":[40],"technology":[44],"available":[45],"is":[46,90,167],"ready,":[47],"and,":[48],"if":[49],"so,":[50],"at":[51],"what":[52],"operational":[53],"working":[54],"conditions.":[55],"Despite":[56],"significant":[57,206],"improvements,":[58],"especially":[59],"by":[60,92,125],"adopting":[61],"deep":[62],"learning":[63],"approaches":[64],"PAD,":[67],"current":[68],"research":[69],"did":[70],"not":[71],"state":[72],"much":[73],"about":[74],"their":[75],"effectiveness":[76],"when":[77,107,153],"embedded":[78,217],"in":[79],"We":[83,175],"believe":[84],"that":[85,101],"lack":[87,94],"works":[89],"explained":[91],"instruments":[96],"problem,":[100],"is,":[102],"modeling":[103,138],"cause-effect":[105],"relationships":[106,141],"two":[108,150],"non-zero":[109],"error-free":[110],"work":[112],"together.":[113],"Accordingly,":[114],"this":[115,166],"paper":[116],"explores":[117],"fusion":[119],"PAD":[121,154,181,218],"proposing":[126],"a":[127,131,162],"novel":[128],"investigation":[129],"instrument:":[130],"performance":[132],"simulator":[133],"based":[134],"on":[135,179],"probabilistic":[137],"among":[142],"Receiver":[144],"Operating":[145],"Characteristics":[146],"(ROC)":[147],"individual":[151],"stages":[157],"are":[158],"implemented":[159],"sequentially.":[160],"As":[161],"matter":[163],"fact,":[165],"most":[169,187],"straightforward,":[170],"flexible,":[171],"widespread":[173],"approach.":[174],"carry":[176],"out":[177],"simulations":[178],"algorithms\u2019":[182],"ROCs":[183],"submitted":[184],"recent":[188],"editions":[189],"LivDet":[191],"(2017-2019),":[192],"state-of-the-art":[194],"NIST":[195],"Bozorth3,":[196],"top-level":[199],"Veryfinger":[200],"12":[201],"matchers.":[202],"Reported":[203],"experiments":[204],"explore":[205],"scenarios":[207],"get":[209],"conditions":[211],"under":[212],"which":[213],"matching":[215],"with":[216],"can":[219],"improve,":[220],"rather":[221],"than":[222],"degrade,":[223],"overall":[225],"personal":[226],"performance.":[228]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2021-10-25T00:00:00"}
