A Novel Fingerprint Recovery Scheme using Deep Neural Network-based Learning

被引:0
作者
Samuel Lee
Seok-Woo Jang
Dongho Kim
Hernsoo Hahn
Gye-Young Kim
机构
[1] Soongsil University,School of Software
[2] Anyang University,Department of Software
[3] Soongsil University,Global school of Media
[4] Soongsil University,School of Electronic Engineering
来源
Multimedia Tools and Applications | 2021年 / 80卷
关键词
Biometrics; Presentation attack; Deep learning; Fingerprint recognition; Recovery; Feature extraction; Vulnerability;
D O I
暂无
中图分类号
学科分类号
摘要
Minutiae used in most fingerprint recognition devices is robust to presentation attack, but generates a high false match rate. Thus, it is applied along with orientation map or skeleton images. There has been plenty of research on security vulnerability of minutiae, whereas few research has been conducted on orientation map or skeleton images. This study analyzes vulnerability of presentation attack for skeleton images. For this purpose, it proposes a new algorithm of recovering fingerprints with the use of machine learning and skeleton image features of fingerprints. In the proposed method, we suggest the new machine learning Pix2Pix model to generate more natural images. The suggested model is developed in the way of adding a latent vector to the conventional image-to-image translation model Pix2Pix. In the experiment, fingerprints were recovered with the use of the proposed Pix2Pix model, and it was found that a fingerprint recognition device which recognized the recovered fingerprints had a high success rate of recognition. Therefore, it was proved that a fingerprint recognition device using skeleton images as well was vulnerable to presentation attack. It is expected that the algorithm proposed in this study will be very useful to many different application areas related to image processing, including biometrics, fingerprint recognition and recovery, and image surveillance.
引用
收藏
页码:34121 / 34135
页数:14
相关论文
共 129 条
[1]  
Almajmaie L(2019)Fingerprint recognition system based on modified multi-connect architecture (MMCA) Cognit. Syst. Res 58 107-113
[2]  
Ucan ON(2011)Minutiae Extraction from Fingerprint Images - a review IJSCI International Jounal of Computer Science Issues 8 74-85
[3]  
Bayat O(2014)New iterative triclass thresholding technique in image segmentation IEEE trans. Image process 23 1038-1046
[4]  
Bansal R(2019)Factorized discriminative conditional variational auto-encoder for radar HRRP target recognition Signal process 158 176-189
[5]  
Sehgal P(2011)Vulnerabilities of fingerprint reader to fake fingerprints attacks Forensic Sci. Int 204 41-49
[6]  
Bedi P(2011)Fingerprint reconstruction: from minutiae to phase IEEE Trans Pattern Anal Mach Intell 33 209-223
[7]  
Cai H(2013)Active appearance models using statistical characteristics of Gabor based texture representation J. Vis. Comm. Image represent 24 627-634
[8]  
Yang Z(2019)An approach to develop the smart health using internet-of-things and authentication based on biometric technology Future Generat. Comput. Syst. 91 434-449
[9]  
Cao X(2018)High-quality face image generated with conditional boundary equilibrium generative adversarial networks Pattern Recogn. Lett 111 72-79
[10]  
Xia W(2019)Ship detection based on squeeze excitation skip-connection path networks for optical remote sensing images Neurocomputing. 332 215-223