Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and...
Ausführliche Beschreibung
Autor*in: |
Shaheed, Kashif [verfasserIn] Szczuko, Piotr [verfasserIn] Kumar, Munish [verfasserIn] Qureshi, Imran [verfasserIn] Abbas, Qaisar [verfasserIn] Ullah, Ihsan [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2023 |
---|
Schlagwörter: |
Finger vein anti-spoof attacks |
---|
Übergeordnetes Werk: |
Enthalten in: Engineering applications of artificial intelligence - Amsterdam [u.a.] : Elsevier Science, 1988, 129 |
---|---|
Übergeordnetes Werk: |
volume:129 |
DOI / URN: |
10.1016/j.engappai.2023.107569 |
---|
Katalog-ID: |
ELV067035620 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV067035620 | ||
003 | DE-627 | ||
005 | 20240219093022.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240215s2023 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.engappai.2023.107569 |2 doi | |
035 | |a (DE-627)ELV067035620 | ||
035 | |a (ELSEVIER)S0952-1976(23)01753-0 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | 4 | |a 004 |q VZ |
084 | |a 50.23 |2 bkl | ||
084 | |a 54.72 |2 bkl | ||
100 | 1 | |a Shaheed, Kashif |e verfasserin |0 (orcid)0000-0002-7399-6211 |4 aut | |
245 | 1 | 0 | |a Deep learning techniques for biometric security: A systematic review of presentation attack detection systems |
264 | 1 | |c 2023 | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. | ||
650 | 4 | |a Presentation attack detection | |
650 | 4 | |a Deep learning | |
650 | 4 | |a Finger vein anti-spoof attacks | |
650 | 4 | |a Finger-print anti-spoof attacks | |
650 | 4 | |a Iris anti-spoof attack | |
650 | 4 | |a Face anti-spoof attacks | |
700 | 1 | |a Szczuko, Piotr |e verfasserin |4 aut | |
700 | 1 | |a Kumar, Munish |e verfasserin |4 aut | |
700 | 1 | |a Qureshi, Imran |e verfasserin |4 aut | |
700 | 1 | |a Abbas, Qaisar |e verfasserin |4 aut | |
700 | 1 | |a Ullah, Ihsan |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Engineering applications of artificial intelligence |d Amsterdam [u.a.] : Elsevier Science, 1988 |g 129 |h Online-Ressource |w (DE-627)308447832 |w (DE-600)1502275-4 |w (DE-576)094752524 |x 0952-1976 |7 nnns |
773 | 1 | 8 | |g volume:129 |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_101 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2004 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2010 | ||
912 | |a GBV_ILN_2011 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2048 | ||
912 | |a GBV_ILN_2049 | ||
912 | |a GBV_ILN_2050 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2056 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_2064 | ||
912 | |a GBV_ILN_2106 | ||
912 | |a GBV_ILN_2110 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2112 | ||
912 | |a GBV_ILN_2122 | ||
912 | |a GBV_ILN_2129 | ||
912 | |a GBV_ILN_2143 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2232 | ||
912 | |a GBV_ILN_2336 | ||
912 | |a GBV_ILN_2470 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4242 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4251 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4333 | ||
912 | |a GBV_ILN_4334 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4393 | ||
912 | |a GBV_ILN_4700 | ||
936 | b | k | |a 50.23 |j Regelungstechnik |j Steuerungstechnik |q VZ |
936 | b | k | |a 54.72 |j Künstliche Intelligenz |q VZ |
951 | |a AR | ||
952 | |d 129 |
author_variant |
k s ks p s ps m k mk i q iq q a qa i u iu |
---|---|
matchkey_str |
article:09521976:2023----::eperigehiusoboerceuiysseairveopeet |
hierarchy_sort_str |
2023 |
bklnumber |
50.23 54.72 |
publishDate |
2023 |
allfields |
10.1016/j.engappai.2023.107569 doi (DE-627)ELV067035620 (ELSEVIER)S0952-1976(23)01753-0 DE-627 ger DE-627 rda eng 004 VZ 50.23 bkl 54.72 bkl Shaheed, Kashif verfasserin (orcid)0000-0002-7399-6211 aut Deep learning techniques for biometric security: A systematic review of presentation attack detection systems 2023 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. Presentation attack detection Deep learning Finger vein anti-spoof attacks Finger-print anti-spoof attacks Iris anti-spoof attack Face anti-spoof attacks Szczuko, Piotr verfasserin aut Kumar, Munish verfasserin aut Qureshi, Imran verfasserin aut Abbas, Qaisar verfasserin aut Ullah, Ihsan verfasserin aut Enthalten in Engineering applications of artificial intelligence Amsterdam [u.a.] : Elsevier Science, 1988 129 Online-Ressource (DE-627)308447832 (DE-600)1502275-4 (DE-576)094752524 0952-1976 nnns volume:129 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 50.23 Regelungstechnik Steuerungstechnik VZ 54.72 Künstliche Intelligenz VZ AR 129 |
spelling |
10.1016/j.engappai.2023.107569 doi (DE-627)ELV067035620 (ELSEVIER)S0952-1976(23)01753-0 DE-627 ger DE-627 rda eng 004 VZ 50.23 bkl 54.72 bkl Shaheed, Kashif verfasserin (orcid)0000-0002-7399-6211 aut Deep learning techniques for biometric security: A systematic review of presentation attack detection systems 2023 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. Presentation attack detection Deep learning Finger vein anti-spoof attacks Finger-print anti-spoof attacks Iris anti-spoof attack Face anti-spoof attacks Szczuko, Piotr verfasserin aut Kumar, Munish verfasserin aut Qureshi, Imran verfasserin aut Abbas, Qaisar verfasserin aut Ullah, Ihsan verfasserin aut Enthalten in Engineering applications of artificial intelligence Amsterdam [u.a.] : Elsevier Science, 1988 129 Online-Ressource (DE-627)308447832 (DE-600)1502275-4 (DE-576)094752524 0952-1976 nnns volume:129 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 50.23 Regelungstechnik Steuerungstechnik VZ 54.72 Künstliche Intelligenz VZ AR 129 |
allfields_unstemmed |
10.1016/j.engappai.2023.107569 doi (DE-627)ELV067035620 (ELSEVIER)S0952-1976(23)01753-0 DE-627 ger DE-627 rda eng 004 VZ 50.23 bkl 54.72 bkl Shaheed, Kashif verfasserin (orcid)0000-0002-7399-6211 aut Deep learning techniques for biometric security: A systematic review of presentation attack detection systems 2023 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. Presentation attack detection Deep learning Finger vein anti-spoof attacks Finger-print anti-spoof attacks Iris anti-spoof attack Face anti-spoof attacks Szczuko, Piotr verfasserin aut Kumar, Munish verfasserin aut Qureshi, Imran verfasserin aut Abbas, Qaisar verfasserin aut Ullah, Ihsan verfasserin aut Enthalten in Engineering applications of artificial intelligence Amsterdam [u.a.] : Elsevier Science, 1988 129 Online-Ressource (DE-627)308447832 (DE-600)1502275-4 (DE-576)094752524 0952-1976 nnns volume:129 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 50.23 Regelungstechnik Steuerungstechnik VZ 54.72 Künstliche Intelligenz VZ AR 129 |
allfieldsGer |
10.1016/j.engappai.2023.107569 doi (DE-627)ELV067035620 (ELSEVIER)S0952-1976(23)01753-0 DE-627 ger DE-627 rda eng 004 VZ 50.23 bkl 54.72 bkl Shaheed, Kashif verfasserin (orcid)0000-0002-7399-6211 aut Deep learning techniques for biometric security: A systematic review of presentation attack detection systems 2023 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. Presentation attack detection Deep learning Finger vein anti-spoof attacks Finger-print anti-spoof attacks Iris anti-spoof attack Face anti-spoof attacks Szczuko, Piotr verfasserin aut Kumar, Munish verfasserin aut Qureshi, Imran verfasserin aut Abbas, Qaisar verfasserin aut Ullah, Ihsan verfasserin aut Enthalten in Engineering applications of artificial intelligence Amsterdam [u.a.] : Elsevier Science, 1988 129 Online-Ressource (DE-627)308447832 (DE-600)1502275-4 (DE-576)094752524 0952-1976 nnns volume:129 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 50.23 Regelungstechnik Steuerungstechnik VZ 54.72 Künstliche Intelligenz VZ AR 129 |
allfieldsSound |
10.1016/j.engappai.2023.107569 doi (DE-627)ELV067035620 (ELSEVIER)S0952-1976(23)01753-0 DE-627 ger DE-627 rda eng 004 VZ 50.23 bkl 54.72 bkl Shaheed, Kashif verfasserin (orcid)0000-0002-7399-6211 aut Deep learning techniques for biometric security: A systematic review of presentation attack detection systems 2023 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. Presentation attack detection Deep learning Finger vein anti-spoof attacks Finger-print anti-spoof attacks Iris anti-spoof attack Face anti-spoof attacks Szczuko, Piotr verfasserin aut Kumar, Munish verfasserin aut Qureshi, Imran verfasserin aut Abbas, Qaisar verfasserin aut Ullah, Ihsan verfasserin aut Enthalten in Engineering applications of artificial intelligence Amsterdam [u.a.] : Elsevier Science, 1988 129 Online-Ressource (DE-627)308447832 (DE-600)1502275-4 (DE-576)094752524 0952-1976 nnns volume:129 GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 50.23 Regelungstechnik Steuerungstechnik VZ 54.72 Künstliche Intelligenz VZ AR 129 |
language |
English |
source |
Enthalten in Engineering applications of artificial intelligence 129 volume:129 |
sourceStr |
Enthalten in Engineering applications of artificial intelligence 129 volume:129 |
format_phy_str_mv |
Article |
bklname |
Regelungstechnik Steuerungstechnik Künstliche Intelligenz |
institution |
findex.gbv.de |
topic_facet |
Presentation attack detection Deep learning Finger vein anti-spoof attacks Finger-print anti-spoof attacks Iris anti-spoof attack Face anti-spoof attacks |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Engineering applications of artificial intelligence |
authorswithroles_txt_mv |
Shaheed, Kashif @@aut@@ Szczuko, Piotr @@aut@@ Kumar, Munish @@aut@@ Qureshi, Imran @@aut@@ Abbas, Qaisar @@aut@@ Ullah, Ihsan @@aut@@ |
publishDateDaySort_date |
2023-01-01T00:00:00Z |
hierarchy_top_id |
308447832 |
dewey-sort |
14 |
id |
ELV067035620 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV067035620</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240219093022.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240215s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.engappai.2023.107569</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV067035620</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0952-1976(23)01753-0</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">50.23</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.72</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shaheed, Kashif</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-7399-6211</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Deep learning techniques for biometric security: A systematic review of presentation attack detection systems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2023</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Presentation attack detection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Deep learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Finger vein anti-spoof attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Finger-print anti-spoof attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Iris anti-spoof attack</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Face anti-spoof attacks</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Szczuko, Piotr</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Munish</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qureshi, Imran</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abbas, Qaisar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ullah, Ihsan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Engineering applications of artificial intelligence</subfield><subfield code="d">Amsterdam [u.a.] : Elsevier Science, 1988</subfield><subfield code="g">129</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)308447832</subfield><subfield code="w">(DE-600)1502275-4</subfield><subfield code="w">(DE-576)094752524</subfield><subfield code="x">0952-1976</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">50.23</subfield><subfield code="j">Regelungstechnik</subfield><subfield code="j">Steuerungstechnik</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.72</subfield><subfield code="j">Künstliche Intelligenz</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">129</subfield></datafield></record></collection>
|
author |
Shaheed, Kashif |
spellingShingle |
Shaheed, Kashif ddc 004 bkl 50.23 bkl 54.72 misc Presentation attack detection misc Deep learning misc Finger vein anti-spoof attacks misc Finger-print anti-spoof attacks misc Iris anti-spoof attack misc Face anti-spoof attacks Deep learning techniques for biometric security: A systematic review of presentation attack detection systems |
authorStr |
Shaheed, Kashif |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)308447832 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut aut aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
0952-1976 |
topic_title |
004 VZ 50.23 bkl 54.72 bkl Deep learning techniques for biometric security: A systematic review of presentation attack detection systems Presentation attack detection Deep learning Finger vein anti-spoof attacks Finger-print anti-spoof attacks Iris anti-spoof attack Face anti-spoof attacks |
topic |
ddc 004 bkl 50.23 bkl 54.72 misc Presentation attack detection misc Deep learning misc Finger vein anti-spoof attacks misc Finger-print anti-spoof attacks misc Iris anti-spoof attack misc Face anti-spoof attacks |
topic_unstemmed |
ddc 004 bkl 50.23 bkl 54.72 misc Presentation attack detection misc Deep learning misc Finger vein anti-spoof attacks misc Finger-print anti-spoof attacks misc Iris anti-spoof attack misc Face anti-spoof attacks |
topic_browse |
ddc 004 bkl 50.23 bkl 54.72 misc Presentation attack detection misc Deep learning misc Finger vein anti-spoof attacks misc Finger-print anti-spoof attacks misc Iris anti-spoof attack misc Face anti-spoof attacks |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Engineering applications of artificial intelligence |
hierarchy_parent_id |
308447832 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Engineering applications of artificial intelligence |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)308447832 (DE-600)1502275-4 (DE-576)094752524 |
title |
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems |
ctrlnum |
(DE-627)ELV067035620 (ELSEVIER)S0952-1976(23)01753-0 |
title_full |
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems |
author_sort |
Shaheed, Kashif |
journal |
Engineering applications of artificial intelligence |
journalStr |
Engineering applications of artificial intelligence |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2023 |
contenttype_str_mv |
zzz |
author_browse |
Shaheed, Kashif Szczuko, Piotr Kumar, Munish Qureshi, Imran Abbas, Qaisar Ullah, Ihsan |
container_volume |
129 |
class |
004 VZ 50.23 bkl 54.72 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Shaheed, Kashif |
doi_str_mv |
10.1016/j.engappai.2023.107569 |
normlink |
(ORCID)0000-0002-7399-6211 |
normlink_prefix_str_mv |
(orcid)0000-0002-7399-6211 |
dewey-full |
004 |
author2-role |
verfasserin |
title_sort |
deep learning techniques for biometric security: a systematic review of presentation attack detection systems |
title_auth |
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems |
abstract |
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. |
abstractGer |
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. |
abstract_unstemmed |
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2007 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2106 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4242 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 |
title_short |
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems |
remote_bool |
true |
author2 |
Szczuko, Piotr Kumar, Munish Qureshi, Imran Abbas, Qaisar Ullah, Ihsan |
author2Str |
Szczuko, Piotr Kumar, Munish Qureshi, Imran Abbas, Qaisar Ullah, Ihsan |
ppnlink |
308447832 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1016/j.engappai.2023.107569 |
up_date |
2024-07-06T19:51:33.165Z |
_version_ |
1803860567042031616 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV067035620</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20240219093022.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240215s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.engappai.2023.107569</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV067035620</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0952-1976(23)01753-0</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">50.23</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.72</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shaheed, Kashif</subfield><subfield code="e">verfasserin</subfield><subfield code="0">(orcid)0000-0002-7399-6211</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Deep learning techniques for biometric security: A systematic review of presentation attack detection systems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2023</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric systems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with presentation attacks (PAs) being prevalent and easily executed. PAs involve displaying videos, images, or full-face masks to trick biometric systems and gain unauthorized access. Many authors are currently focusing on detecting these presentation attacks (PAD) and have developed several methods, particularly those based on deep learning (DL), which have shown superior performance compared to other techniques. This survey article focuses on manuscripts related to deep learning presentation attack detection, spoof attack detection using deep learning, and anti-spoofing deep learning methods for biometric finger vein, fingerprint, iris, and face recognition. The studies were primarily sourced from four digital research libraries: ACM, Science Direct, Springer, and IEEE Xplore. The article presents a comprehensive review of DL-based PAD systems, examining recent literature on DL-based PAD methods in finger vein, fingerprint, iris, and face detection systems. Through extensive research of the literature, recent algorithms and their solutions for relevant PAD approaches are thoroughly analyzed. Additionally, the article provides a performance analysis and highlights the most promising research findings. The discussion section addresses current issues, opportunities for advancement, and potential solutions associated with deep learning-based PAD methods. This study is valuable to various community users seeking to understand the significance of this technology and its recent applicability in the development of biometric technology for deep learning.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Presentation attack detection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Deep learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Finger vein anti-spoof attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Finger-print anti-spoof attacks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Iris anti-spoof attack</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Face anti-spoof attacks</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Szczuko, Piotr</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Munish</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qureshi, Imran</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abbas, Qaisar</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ullah, Ihsan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Engineering applications of artificial intelligence</subfield><subfield code="d">Amsterdam [u.a.] : Elsevier Science, 1988</subfield><subfield code="g">129</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)308447832</subfield><subfield code="w">(DE-600)1502275-4</subfield><subfield code="w">(DE-576)094752524</subfield><subfield code="x">0952-1976</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">50.23</subfield><subfield code="j">Regelungstechnik</subfield><subfield code="j">Steuerungstechnik</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.72</subfield><subfield code="j">Künstliche Intelligenz</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">129</subfield></datafield></record></collection>
|
score |
7.401457 |