Fingerprint Spoof Detection Using Minutiae-based Local Patches

被引:0
作者
Chugh, Tarang [1 ]
Cao, Kai [1 ]
Jain, Anil K. [1 ]
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
来源
2017 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB) | 2017年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The individuality offingerprints is being leveraged for a plethora of day-to-day applications, ranging from unlocking a smartphone to international border security. While the primary purpose of a fingerprint recognition system is to ensure a reliable and accurate user authentication, the security of the recognition system itself can be jeopardized by spoof attacks. This study addresses the problem of developing accurate and generalizable algorithms for detecting fingerprint spoof attacks. We propose a deep convolutional neural network based approach utilizing local patches extracted around fingerprint minutiae. Experimental results on three public-domain LivDet datasets (2011, 2013, and 2015) show that the proposed approach provides state of the art accuracies in fingerprint spoof detection for intra-sensor, cross-material, cross-sensor, as well as cross-dataset testing scenarios. For example, the proposed approach achieves a 69% reduction in average classification error for spoof detection under both known material and cross-material scenarios on LivDet 2015 datasets.
引用
收藏
页码:581 / 589
页数:9
相关论文
共 35 条
  • [1] [Anonymous], 2015, Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on
  • [2] [Anonymous], 2012, Proc. SPIE
  • [3] Fake finger detection by skin distortion analysis
    Antonelli, Athos
    Cappelli, Raffaele
    Maio, Dario
    Maltoni, Davide
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (03) : 360 - 373
  • [4] Arora S. S., 2017, IEEE T INFO IN PRESS
  • [5] Design and Fabrication of 3D Fingerprint Targets
    Arora, Sunpreet S.
    Cao, Kai
    Jain, Anil K.
    Paulter, Nicholas G., Jr.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2284 - 2297
  • [6] Baldisserra D, 2006, LECT NOTES COMPUT SC, V3832, P265
  • [7] Security evaluation of biometric authentication systems under real spoofing attacks
    Biggio, B.
    Akhtar, Z.
    Fumera, G.
    Marcialis, G. L.
    Roli, F.
    [J]. IET BIOMETRICS, 2012, 1 (01) : 11 - 24
  • [8] Cao K., 2016, MSUCSE2016162
  • [9] Cao Kai., 2011, IEEE International Joint Conference on Biometrics (IJCB), P1
  • [10] Investigation on chatter stability of thin-walled parts considering its flexibility based on finite element analysis
    Ding, Yang
    Zhu, Lida
    [J]. INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2018, 94 (9-12) : 3173 - 3187