Advanced Techniques for Biometric Authentication: Leveraging Deep Learning and Explainable AI

被引:0
|
作者
Khairnar, Smita [1 ,2 ]
Gite, Shilpa [3 ,4 ]
Mahajan, Kashish [2 ]
Pradhan, Biswajeet [5 ]
Alamri, Abdullah [6 ]
Thepade, Sudeep D. [2 ,7 ]
机构
[1] Symbiosis Int Deemed Univ, Symbiosis Inst Technol, Dept Comp Sci & Engn, Pune 412115, India
[2] Pimpri Chinchwad Coll Engn, Pune 411044, India
[3] Symbiosis Inst Technol, AIML Dept, Pune 412115, India
[4] Symbiosis Int Deemed Univ, Symbiosis Ctr Appl AI, Pune 412115, India
[5] Univ Technol Sydney, Fac Engn & Informat Technol, CAMGIS, Sch Civil & Environm Engn, Sydney, NSW 2007, Australia
[6] King Saud Univ, Coll Sci, Dept Geol & Geophys, Riyadh 11543, Saudi Arabia
[7] Pimpri Chinchwad Univ, PCET, Pune 412106, India
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Biological system modeling; Predictive models; Deep learning; Explainable AI; Computational modeling; Artificial intelligence; Accuracy; Computer security; Robustness; Context modeling; Explainable artificial intelligence (XAI); liveness detection; LIME; pre-trained models; spoof attacks;
D O I
10.1109/ACCESS.2024.3474690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Liveness face detection is essential for modern biometric systems, ensuring that input data is genuine and not derived from a false image or video. Liveness face detection in today's biometric systems will ensure that input comes from a real, live person rather than a manipulated image or video. The novelty of this study lies in combining deep learning models with local interpretable model-agnostic interpretation (LIME) to enhance the interpretability and transparency of facial liveness detection systems. This technology is necessary for preventing spoofing attacks and attempts by hackers to break the security feature via pictures, videos, masks, etc. Spoofing refers to the compromise of a biometric system by providing it with untruthful material, photographs, videos, or masks to gain access. However, if not dealt with, such forms of fraud could affect the security of the biometrics. Liveness detection relies on several strategies, from basic facial actions like blinking and head twists to even more advanced algorithms that can identify natural skin texture and warmth or detect differences at the pixel level between live and static images. Robust liveness detection in biometric authentication significantly enhances security and reliability. The objective of this research is to test the different pre-trained models to detect spoofing attacks and to use LIME to explain the model's predictions. This paper focuses on a dataset of Spoof in Wild with Multiple Attacks Version 2 (SiWMv2), comprising 14 different spoofing techniques, ranging from replay attacks and makeup disguises with paper glasses to more complex ones. Seven pre-trained architectures, VGG16, DenseNet201, InceptionV3, VGG19, ResNet50, MobileNetV2, and Xception, are fine-tuned with the potential for actual automatic liveness identification in facial images. Deep learning approaches achieve superior detection performance against contemporary spoofing techniques. These techniques aim to enhance the interpretability of their predictions. Building on deep learning approaches, LIME is incorporated to improve transparency further. LIME provides visual explanations of the prediction to represent what features support the model's decisions. Our work demonstrates how LIME can effectively give insights that are useful to understand findings on face identification and critically aid in understanding model decisions in security and authentication systems. The key findings of this research show that our method achieves 97.3% accuracy on the SiWMv2 dataset, a significant improvement over baseline models, which average 91.5%. This enhancement shows the effectiveness of our approach in a system that boosts robustness and increases the reliability of liveness detection.
引用
收藏
页码:153580 / 153595
页数:16
相关论文
共 50 条
  • [1] Explainable AI for Bearing Fault Prognosis Using Deep Learning Techniques
    Sanakkayala, Deva Chaitanya
    Varadarajan, Vijayakumar
    Kumar, Namya
    Karan
    Soni, Girija
    Kamat, Pooja
    Kumar, Satish
    Patil, Shruti
    Kotecha, Ketan
    MICROMACHINES, 2022, 13 (09)
  • [2] Leveraging Transfer Learning for Efficient Diagnosis of COPD Using CXR Images and Explainable AI Techniques
    Ikechukwu, Agughasi Victor
    INTELIGENCIA ARTIFICIAL-IBEROAMERICAN JOURNAL OF ARTIFICIAL INTELLIGENCE, 2024, 24 (74): : 133 - 151
  • [3] Detecting Deepfake Images Using Deep Learning Techniques and Explainable AI Methods
    Abir, Wahidul Hasan
    Khanam, Faria Rahman
    Alam, Kazi Nabiul
    Hadjouni, Myriam
    Elmannai, Hela
    Bourouis, Sami
    Dey, Rajesh
    Khan, Mohammad Monirujjaman
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (02): : 2151 - 2169
  • [4] A Mathematical Model for Customer Segmentation Leveraging Deep Learning, Explainable AI, and RFM Analysis in Targeted Marketing
    Talaat, Fatma M.
    Aljadani, Abdussalam
    Alharthi, Bshair
    Farsi, Mohammed A.
    Badawy, Mahmoud
    Elhosseini, Mostafa
    MATHEMATICS, 2023, 11 (18)
  • [5] BAED: A secured biometric authentication system using ECG signal based on deep learning techniques
    Allam, Jaya Prakash
    Patro, Kiran Kumar
    Hammad, Mohamed
    Tadeusiewicz, Ryszard
    Plawiak, Pawel
    BIOCYBERNETICS AND BIOMEDICAL ENGINEERING, 2022, 42 (04) : 1081 - 1093
  • [6] Glaucoma Detection Using Explainable AI and Deep Learning
    Afreen N.
    Aluvalu R.
    EAI Endorsed Transactions on Pervasive Health and Technology, 2024, 10
  • [7] Why Fuzzy Techniques in Explainable AI? Which Fuzzy Techniques in Explainable AI?
    Cohen, Kelly
    Bokati, Laxman
    Ceberio, Martine
    Kosheleva, Olga
    Kreinovich, Vladik
    EXPLAINABLE AI AND OTHER APPLICATIONS OF FUZZY TECHNIQUES, NAFIPS 2021, 2022, 258 : 74 - 78
  • [8] Explainable Ransomware Detection with Deep Learning Techniques
    Giovanni Ciaramella
    Giacomo Iadarola
    Fabio Martinelli
    Francesco Mercaldo
    Antonella Santone
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 317 - 330
  • [9] Explainable Ransomware Detection with Deep Learning Techniques
    Ciaramella, Giovanni
    Iadarola, Giacomo
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (02) : 317 - 330
  • [10] Multimodal Biometric Authentication System using Deep Learning Method
    Sengar, Sandeep Singh
    Hariharan, U.
    Rajkumar, K.
    2020 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2020, : 309 - 312