ViT Unified: Joint Fingerprint Recognition and Presentation Attack Detection

被引:5
作者
Grosz, Steven A. [1 ]
Wijewardena, Kanishka P. [1 ]
Jain, Anil K. [1 ]
机构
[1] Michigan State Univ, E Lansing, MI 48824 USA
来源
2023 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB | 2023年
关键词
D O I
10.1109/IJCB57857.2023.10449087
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A secure fingerprint recognition system must contain both a presentation attack (i.e., spoof) detection and recognition module in order to protect users against unwanted access by malicious users. Traditionally, these tasks would be carried out by two independent systems; however, recent studies have demonstrated the potential to have one unified system architecture in order to reduce the computational burdens on the system, while maintaining high accuracy. In this work, we leverage a vision transformer architecture for joint spoof detection and matching and report competitive results with state-of-the-art (SOTA) models for both a sequential system (two ViT models operating independently) and a unified architecture (a single ViT model for both tasks). ViT models are particularly well suited for this task as the ViT's global embedding encodes features useful for recognition, whereas the individual, local embeddings are useful for spoof detection. We demonstrate the capability of our unified model to achieve an average integrated matching (IM) accuracy of 98.87% across LivDet 2013 and 2015 CrossMatch sensors. This is comparable to IM accuracy of 98.95% of our sequential dual-ViT system, but with similar to 50% of the parameters and similar to 58% of the latency.
引用
收藏
页数:9
相关论文
共 40 条
[1]   A Unified Model for Face Matching and Presentation Attack Detection using an Ensemble of Vision Transformer Features [J].
Al-Refai, Rouqaiah ;
Nandakumar, Karthik .
2023 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION WORKSHOPS (WACVW), 2023, :662-671
[2]  
[Anonymous], 2016, ISO/IEC 30107-1:2016
[3]  
[Anonymous], 2011, Introduction to Biometrics, DOI [DOI 10.1007/978-0-387-77326-1, 10.1007/978-0-387-77326-1]
[4]  
Anusha BVS, 2020, IEEE WINT CONF APPL, P2684, DOI [10.1109/wacv45572.2020.9093397, 10.1109/WACV45572.2020.9093397]
[5]  
Casula R., 2021, CoRR, abs/2108.10183
[6]   Anti-spoofing in action: joint operation with a verification system [J].
Chingovska, Ivana ;
Anjos, Andre ;
Marcel, Sebastien .
2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2013, :98-104
[7]   Fingerprint Spoof Detector Generalization [J].
Chugh, Tarang ;
Jain, Anil K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :42-55
[8]   Fingerprint Presentation Attack Detection: Generalization and Efficiency [J].
Chugh, Tarang ;
Jain, Anil K. .
2019 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2019,
[9]   Fingerprint Spoof Buster: Use of Minutiae-Centered Patches [J].
Chugh, Tarang ;
Cao, Kai ;
Jain, Anil K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2190-2202
[10]   Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach [J].
Deb, Debayan ;
Jain, Anil K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :1143-1157