[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack Detection

  • Conference paper
  • First Online:
Pattern Recognition and Machine Intelligence (PReMI 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13102))

  • 155 Accesses

Abstract

Fingerprint recognition systems have played a significant role in the field of biometric security in recent years. However, it is vulnerable to several threats which can put the biometric security system at a significant risk. Presentation attack or spoofing is one of these attacks which utilizes a fake fingerprint created with a fabrication material by an intruder to fool the authentication system. Development of new fabrication materials makes this spoof detection more challenging for cross materials. In this work, we have proposed a novel approach for detecting these presentation attacks using Auxiliary Classifier-Generative Adversarial Networks (AC-GAN). The performance of the proposed method is assessed in an open set paradigm on publicly available LivDet Competition 2013 and 2015 datasets. Proposed methodology achieves an average accuracy of \(98.52 \%\) and \(92.02 \%\) on the LivDet 2013 and LivDet 2015 datasets, respectively which outperforms the state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 54.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 69.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Information technology — biometric presentation attack detection - part 3: Testing and reporting. https://www.iso.org/obp/ui/#iso:std:iso-iec:30107:-3:ed-1:v1:en

  2. Abhyankar, A., Schuckers, S.: Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recogn. 42, 452–464 (2009)

    Article  Google Scholar 

  3. Arora, S.: Fingerprint spoofing detection to improve customer security in mobile financial applications using deep learning. Arab. J. Sci. Eng. 45, 2847–2863 (2019)

    Article  Google Scholar 

  4. Espinoza, M., Champod, C.: Using the number of pores on fingerprint images to detect spoofing attacks. In: Proceedings of International Conference on Hand-Based Biometrics, pp. 1–5 (2011)

    Google Scholar 

  5. Frassetto Nogueira, R., de Alencar Lotufo, R., Campos Machado, R.: Evaluating software-based fingerprint liveness detection using convolutional networks and local binary patterns. In: Proceedings of IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) Proceedings, pp. 22–29 (2014)

    Google Scholar 

  6. Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23, 710–724 (2014)

    Article  MathSciNet  Google Scholar 

  7. Gottschlich, C., Marasco, E., Yang, A.Y., Cukic, B.: Fingerprint liveness detection based on histograms of invariant gradients. In: Proceedings of IEEE International Joint Conference on Biometrics, pp. 1–7 (2014)

    Google Scholar 

  8. Johnson, P., Schuckers, S.: Fingerprint pore characteristics for liveness detection. In: Proceedings of International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–8 (2014)

    Google Scholar 

  9. Jung, H.Y., Heo, Y.S., Lee, S.: Fingerprint liveness detection by a template-probe convolutional neural network. IEEE Access 7, 118986–118993 (2019)

    Article  Google Scholar 

  10. Marcialis, G.L., Roli, F., Tidu, A.: Analysis of fingerprint pores for vitality detection. In: Proceedings of International Conference on Pattern Recognition, pp. 1289–1292 (2010)

    Google Scholar 

  11. Mura, V., Ghiani, L., Marcialis, G.L., Roli, F., Yambay, D.A., Schuckers, S.A.: LivDet 2015 fingerprint liveness detection competition 2015. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–6 (2015)

    Google Scholar 

  12. Odena, A., Olah, C., Shlens, J.: Conditional image synthesis with auxiliary classifier GANs, pp. 2642–2651. JMLR.org (2017)

    Google Scholar 

  13. Park, Y., Jang, U., Lee, E.C.: Statistical anti-spoofing method for fingerprint recognition. Soft. Comput. 22, 4175–4184 (2018)

    Article  Google Scholar 

  14. Pillai, A.R., Manuel, M., Premson, Y.: Fingerprint liveness detection with feature level fusion techniques using SVM and deep neural network. In: Proceedings of IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), pp. 266–272 (2018)

    Google Scholar 

  15. Sharma, R., Anshul, A., Jha, A., Dey, S.: Investigating Fingerprint Quality Features for Liveness Detection, pp. 296–307 (2020)

    Google Scholar 

  16. Sharma, R., Dey, S.: Fingerprint liveness detection using local quality features. Vis. Comput. 35, 1393–1410 (2019)

    Article  Google Scholar 

  17. Sharma, R., Dey, S.: A comparative study of handcrafted local texture descriptors for fingerprint liveness detection under real world scenarios. Multimedia Tools Appl. 80, 1–20 (2021)

    Article  Google Scholar 

  18. Tan, B., Schuckers, S.: Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners. In: Proceedings of Biometric Technology for Human Identification III, pp. 94–103 (2006)

    Google Scholar 

  19. Tatar, F.D.: Fingerprint recognition algorithm (2017)

    Google Scholar 

  20. Uliyan, D.M., Sadeghi, S., Jalab, H.A.: Anti-spoofing method for fingerprint recognition using patch based deep learning machine. Eng. Sci. Technol. Int. J. 23, 264–273 (2020)

    Google Scholar 

  21. Xia, Z., Yuan, C., Lv, R., Xingming, S., Xiong, N., Shi, Y.: A novel weber local binary descriptor for fingerprint liveness detection. IEEE Trans. Syst. Man Cybern. Syst. 50, 1–11 (2018)

    Google Scholar 

  22. Yuan, C., et al.: Fingerprint liveness detection using an improved CNN with image scale equalization. IEEE Access 7, 26953–26966 (2019)

    Article  Google Scholar 

  23. Yuan, C., Xia, Z., Sun, X., Sun, D., Lv, R.: Fingerprint liveness detection using multiscale difference co-occurrence matrix. Opt. Eng. 55, 1–10 (2016)

    Article  Google Scholar 

  24. Zhang, Y., Shi, D., Zhan, X., Cao, D., Zhu, K., Li, Z.: Slim-ResCNN: a deep residual convolutional neural network for fingerprint liveness detection. IEEE Access 7, 91476–91487 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anuj Rai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Anshul, A., Jha, A., Jain, P., Rai, A., Sharma, R.P., Dey, S. (2024). An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack Detection. In: Ghosh, A., King, I., Bhattacharyya, M., Sankar Ray, S., K. Pal, S. (eds) Pattern Recognition and Machine Intelligence. PReMI 2021. Lecture Notes in Computer Science, vol 13102. Springer, Cham. https://doi.org/10.1007/978-3-031-12700-7_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-12700-7_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-12699-4

  • Online ISBN: 978-3-031-12700-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics