50 research outputs found
An Open Patch Generator based Fingerprint Presentation Attack Detection using Generative Adversarial Network
The low-cost, user-friendly, and convenient nature of Automatic Fingerprint
Recognition Systems (AFRS) makes them suitable for a wide range of
applications. This spreading use of AFRS also makes them vulnerable to various
security threats. Presentation Attack (PA) or spoofing is one of the threats
which is caused by presenting a spoof of a genuine fingerprint to the sensor of
AFRS. Fingerprint Presentation Attack Detection (FPAD) is a countermeasure
intended to protect AFRS against fake or spoof fingerprints created using
various fabrication materials. In this paper, we have proposed a Convolutional
Neural Network (CNN) based technique that uses a Generative Adversarial Network
(GAN) to augment the dataset with spoof samples generated from the proposed
Open Patch Generator (OPG). This OPG is capable of generating realistic
fingerprint samples which have no resemblance to the existing spoof fingerprint
samples generated with other materials. The augmented dataset is fed to the
DenseNet classifier which helps in increasing the performance of the
Presentation Attack Detection (PAD) module for the various real-world attacks
possible with unknown spoof materials. Experimental evaluations of the proposed
approach are carried out on the Liveness Detection (LivDet) 2015, 2017, and
2019 competition databases. An overall accuracy of 96.20\%, 94.97\%, and
92.90\% has been achieved on the LivDet 2015, 2017, and 2019 databases,
respectively under the LivDet protocol scenarios. The performance of the
proposed PAD model is also validated in the cross-material and cross-sensor
attack paradigm which further exhibits its capability to be used under
real-world attack scenarios
On Multiview Analysis for Fingerprint Liveness Detection
Fingerprint recognition systems, as any other biometric system, can be subject to attacks, which are usually carried out using artificial fingerprints. Several approaches to discriminate between live and fake fingerprint images have been presented to address this issue. These methods usually rely on the analysis of individual features extracted from the fingerprint images. Such features represent different and complementary views of the object in analysis, and their fusion is likely to improve the classification accuracy. However, very little work in this direction has been reported in the literature. In this work, we present the results of a preliminary investigation on multiview analysis for fingerprint liveness detection. Experimental results show the effectiveness of such approach, which improves previous results in the literatur
Security and accuracy of fingerprint-based biometrics: A review
Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper
Security and accuracy of fingerprint-based biometrics: A review
Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper
Feature Fusion for Fingerprint Liveness Detection
For decades, fingerprints have been the most widely used biometric trait in identity
recognition systems, thanks to their natural uniqueness, even in rare cases such as
identical twins. Recently, we witnessed a growth in the use of fingerprint-based
recognition systems in a large variety of devices and applications. This, as a consequence,
increased the benefits for offenders capable of attacking these systems. One
of the main issues with the current fingerprint authentication systems is that, even
though they are quite accurate in terms of identity verification, they can be easily
spoofed by presenting to the input sensor an artificial replica of the fingertip skin’s
ridge-valley patterns.
Due to the criticality of this threat, it is crucial to develop countermeasure
methods capable of facing and preventing these kind of attacks. The most effective
counter–spoofing methods are those trying to distinguish between a "live" and a
"fake" fingerprint before it is actually submitted to the recognition system. According
to the technology used, these methods are mainly divided into hardware and software-based
systems. Hardware-based methods rely on extra sensors to gain more pieces
of information regarding the vitality of the fingerprint owner. On the contrary,
software-based methods merely rely on analyzing the fingerprint images acquired
by the scanner. Software-based methods can then be further divided into dynamic,
aimed at analyzing sequences of images to capture those vital signs typical of a real
fingerprint, and static, which process a single fingerprint impression. Among these
different approaches, static software-based methods come with three main benefits.
First, they are cheaper, since they do not require the deployment of any additional
sensor to perform liveness detection. Second, they are faster since the information
they require is extracted from the same input image acquired for the identification
task. Third, they are potentially capable of tackling novel forms of attack through an
update of the software. The interest in this type of counter–spoofing methods is at the basis of this
dissertation, which addresses the fingerprint liveness detection under a peculiar
perspective, which stems from the following consideration. Generally speaking, this
problem has been tackled in the literature with many different approaches. Most of
them are based on first identifying the most suitable image features for the problem
in analysis and, then, into developing some classification system based on them. In
particular, most of the published methods rely on a single type of feature to perform
this task. Each of this individual features can be more or less discriminative and often
highlights some peculiar characteristics of the data in analysis, often complementary
with that of other feature. Thus, one possible idea to improve the classification
accuracy is to find effective ways to combine them, in order to mutually exploit their
individual strengths and soften, at the same time, their weakness. However, such a
"multi-view" approach has been relatively overlooked in the literature.
Based on the latter observation, the first part of this work attempts to investigate
proper feature fusion methods capable of improving the generalization and robustness
of fingerprint liveness detection systems and enhance their classification strength.
Then, in the second part, it approaches the feature fusion method in a different way,
that is by first dividing the fingerprint image into smaller parts, then extracting an
evidence about the liveness of each of these patches and, finally, combining all these
pieces of information in order to take the final classification decision.
The different approaches have been thoroughly analyzed and assessed by comparing
their results (on a large number of datasets and using the same experimental
protocol) with that of other works in the literature. The experimental results discussed
in this dissertation show that the proposed approaches are capable of obtaining
state–of–the–art results, thus demonstrating their effectiveness
Textural features for fingerprint liveness detection
The main topic ofmy research during these three years concerned biometrics and in particular
the Fingerprint Liveness Detection (FLD), namely the recognition of fake fingerprints.
Fingerprints spoofing is a topical issue as evidenced by the release of the latest iPhone and
Samsung Galaxy models with an embedded fingerprint reader as an alternative to passwords.
Several videos posted on YouTube show how to violate these devices by using fake
fingerprints which demonstrated how the problemof vulnerability to spoofing constitutes a
threat to the existing fingerprint recognition systems.
Despite the fact that many algorithms have been proposed so far, none of them showed
the ability to clearly discriminate between real and fake fingertips. In my work, after a study
of the state-of-the-art I paid a special attention on the so called textural algorithms. I first
used the LBP (Local Binary Pattern) algorithm and then I worked on the introduction of the
LPQ (Local Phase Quantization) and the BSIF (Binarized Statistical Image Features) algorithms
in the FLD field.
In the last two years I worked especially on what we called the “user specific” problem.
In the extracted features we noticed the presence of characteristic related not only to the
liveness but also to the different users. We have been able to improve the obtained results
identifying and removing, at least partially, this user specific characteristic.
Since 2009 the Department of Electrical and Electronic Engineering of the University of
Cagliari and theDepartment of Electrical and Computer Engineering of the ClarksonUniversity
have organized the Fingerprint Liveness Detection Competition (LivDet). I have been
involved in the organization of both second and third editions of the Fingerprint Liveness
Detection Competition (LivDet 2011 and LivDet 2013) and I am currently involved in the acquisition
of live and fake fingerprint that will be inserted in three of the LivDet 2015 datasets
Análise de propriedades intrĂnsecas e extrĂnsecas de amostras biomĂ©tricas para detecção de ataques de apresentação
Orientadores: Anderson de Rezende Rocha, HĂ©lio PedriniTese (doutorado) - Universidade Estadual de Campinas, Instituto de ComputaçãoResumo: Os recentes avanços nas áreas de pesquisa em biometria, forense e segurança da informação trouxeram importantes melhorias na eficácia dos sistemas de reconhecimento biomĂ©tricos. No entanto, um desafio ainda em aberto Ă© a vulnerabilidade de tais sistemas contra ataques de apresentação, nos quais os usuários impostores criam amostras sintĂ©ticas, a partir das informações biomĂ©tricas originais de um usuário legĂtimo, e as apresentam ao sensor de aquisição procurando se autenticar como um usuário válido. Dependendo da modalidade biomĂ©trica, os tipos de ataque variam de acordo com o tipo de material usado para construir as amostras sintĂ©ticas. Por exemplo, em biometria facial, uma tentativa de ataque Ă© caracterizada quando um usuário impostor apresenta ao sensor de aquisição uma fotografia, um vĂdeo digital ou uma máscara 3D com as informações faciais de um usuário-alvo. Em sistemas de biometria baseados em Ăris, os ataques de apresentação podem ser realizados com fotografias impressas ou com lentes de contato contendo os padrões de Ăris de um usuário-alvo ou mesmo padrões de textura sintĂ©ticas. Nos sistemas biomĂ©tricos de impressĂŁo digital, os usuários impostores podem enganar o sensor biomĂ©trico usando rĂ©plicas dos padrões de impressĂŁo digital construĂdas com materiais sintĂ©ticos, como látex, massa de modelar, silicone, entre outros. Esta pesquisa teve como objetivo o desenvolvimento de soluções para detecção de ataques de apresentação considerando os sistemas biomĂ©tricos faciais, de Ăris e de impressĂŁo digital. As linhas de investigação apresentadas nesta tese incluem o desenvolvimento de representações baseadas nas informações espaciais, temporais e espectrais da assinatura de ruĂdo; em propriedades intrĂnsecas das amostras biomĂ©tricas (e.g., mapas de albedo, de reflectância e de profundidade) e em tĂ©cnicas de aprendizagem supervisionada de caracterĂsticas. Os principais resultados e contribuições apresentadas nesta tese incluem: a criação de um grande conjunto de dados publicamente disponĂvel contendo aproximadamente 17K videos de simulações de ataques de apresentações e de acessos genuĂnos em um sistema biomĂ©trico facial, os quais foram coletados com a autorização do ComitĂŞ de Ética em Pesquisa da Unicamp; o desenvolvimento de novas abordagens para modelagem e análise de propriedades extrĂnsecas das amostras biomĂ©tricas relacionadas aos artefatos que sĂŁo adicionados durante a fabricação das amostras sintĂ©ticas e sua captura pelo sensor de aquisição, cujos resultados de desempenho foram superiores a diversos mĂ©todos propostos na literature que se utilizam de mĂ©todos tradicionais de análise de images (e.g., análise de textura); a investigação de uma abordagem baseada na análise de propriedades intrĂnsecas das faces, estimadas a partir da informação de sombras presentes em sua superfĂcie; e, por fim, a investigação de diferentes abordagens baseadas em redes neurais convolucionais para o aprendizado automático de caracterĂsticas relacionadas ao nosso problema, cujos resultados foram superiores ou competitivos aos mĂ©todos considerados estado da arte para as diferentes modalidades biomĂ©tricas consideradas nesta tese. A pesquisa tambĂ©m considerou o projeto de eficientes redes neurais com arquiteturas rasas capazes de aprender caracterĂsticas relacionadas ao nosso problema a partir de pequenos conjuntos de dados disponĂveis para o desenvolvimento e a avaliação de soluções para a detecção de ataques de apresentaçãoAbstract: Recent advances in biometrics, information forensics, and security have improved the recognition effectiveness of biometric systems. However, an ever-growing challenge is the vulnerability of such systems against presentation attacks, in which impostor users create synthetic samples from the original biometric information of a legitimate user and show them to the acquisition sensor seeking to authenticate themselves as legitimate users. Depending on the trait used by the biometric authentication, the attack types vary with the type of material used to build the synthetic samples. For instance, in facial biometric systems, an attempted attack is characterized by the type of material the impostor uses such as a photograph, a digital video, or a 3D mask with the facial information of a target user. In iris-based biometrics, presentation attacks can be accomplished with printout photographs or with contact lenses containing the iris patterns of a target user or even synthetic texture patterns. In fingerprint biometric systems, impostor users can deceive the authentication process using replicas of the fingerprint patterns built with synthetic materials such as latex, play-doh, silicone, among others. This research aimed at developing presentation attack detection (PAD) solutions whose objective is to detect attempted attacks considering different attack types, in each modality. The lines of investigation presented in this thesis aimed at devising and developing representations based on spatial, temporal and spectral information from noise signature, intrinsic properties of the biometric data (e.g., albedo, reflectance, and depth maps), and supervised feature learning techniques, taking into account different testing scenarios including cross-sensor, intra-, and inter-dataset scenarios. The main findings and contributions presented in this thesis include: the creation of a large and publicly available benchmark containing 17K videos of presentation attacks and bona-fide presentations simulations in a facial biometric system, whose collect were formally authorized by the Research Ethics Committee at Unicamp; the development of novel approaches to modeling and analysis of extrinsic properties of biometric samples related to artifacts added during the manufacturing of the synthetic samples and their capture by the acquisition sensor, whose results were superior to several approaches published in the literature that use traditional methods for image analysis (e.g., texture-based analysis); the investigation of an approach based on the analysis of intrinsic properties of faces, estimated from the information of shadows present on their surface; and the investigation of different approaches to automatically learning representations related to our problem, whose results were superior or competitive to state-of-the-art methods for the biometric modalities considered in this thesis. We also considered in this research the design of efficient neural networks with shallow architectures capable of learning characteristics related to our problem from small sets of data available to develop and evaluate PAD solutionsDoutoradoCiĂŞncia da ComputaçãoDoutor em CiĂŞncia da Computação140069/2016-0
CNPq, 142110/2017-5CAPESCNP