Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise

被引:47
作者
Tan, Bozhao [1 ]
Schuckers, Stephanie [1 ]
机构
[1] Clarkson Univ, Dept Elect & Comp Engn, Potsdam, NY 13699 USA
基金
美国国家科学基金会;
关键词
Fingerprint scanner; Anti-spoofing; Fingerprint ridge and valley; Decision tree; Neural network;
D O I
10.1016/j.patcog.2010.01.023
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometric fingerprint scanners are positioned to provide improved security in a great span of applications from government to private. However, one highly publicized vulnerability is that it is possible to spoof a variety of fingerprint scanners using artificial fingers made from Play-Doh, gelatin and silicone molds. Therefore, it is necessary to offer protection for fingerprint systems against these threats. In this paper, an anti-spoofing detection method is proposed which is based on ridge signal and valley noise analysis, to quantify perspiration patterns along ridges in live subjects and noise patterns along valleys in spoofs. The signals representing gray level patterns along ridges and valleys are explored in spatial, frequency and wavelet domains. Based on these features, separation (live/spoof) is performed using standard pattern classification tools including classification trees and neural networks. We test this method on a larger dataset than previously considered which contains 644 live fingerprints (81 subjects with 2 fingers for an average of 4 sessions) and 570 spoof fingerprints (made from Play-Doh, gelatin and silicone molds in multiple sessions) collected from the Identix fingerprint scanner. Results show that the performance can reach 99.1% correct classification overall. The proposed anti-spoofing method is purely software based and integration of this method can provide protection for fingerprint scanners against gelatin, Play-Doh and silicone spoof fingers. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2845 / 2857
页数:13
相关论文
共 50 条
[1]  
AHA DW, 1991, MACH LEARN, V6, P37, DOI 10.1007/BF00153759
[2]  
[Anonymous], P SPIE
[3]  
[Anonymous], 2002, Information Security technical report, DOI DOI 10.1016/S1363-4127(02)00407-7
[4]  
[Anonymous], 2003, Handbook of fingerprint recognition
[5]  
[Anonymous], THESIS
[6]  
[Anonymous], 2007, P WORLD ACAD SCI ENG
[7]   Fake finger detection by skin distortion analysis [J].
Antonelli, Athos ;
Cappelli, Raffaele ;
Maio, Dario ;
Maltoni, Davide .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (03) :360-373
[8]  
BALDISSERRA D, 2006, P INT C BIOM AUTH IC
[9]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[10]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32