A Novel Fingerprint Recovery Scheme using Deep Neural Network-based Learning

被引:0
作者
Samuel Lee
Seok-Woo Jang
Dongho Kim
Hernsoo Hahn
Gye-Young Kim
机构
[1] Soongsil University,School of Software
[2] Anyang University,Department of Software
[3] Soongsil University,Global school of Media
[4] Soongsil University,School of Electronic Engineering
来源
Multimedia Tools and Applications | 2021年 / 80卷
关键词
Biometrics; Presentation attack; Deep learning; Fingerprint recognition; Recovery; Feature extraction; Vulnerability;
D O I
暂无
中图分类号
学科分类号
摘要
Minutiae used in most fingerprint recognition devices is robust to presentation attack, but generates a high false match rate. Thus, it is applied along with orientation map or skeleton images. There has been plenty of research on security vulnerability of minutiae, whereas few research has been conducted on orientation map or skeleton images. This study analyzes vulnerability of presentation attack for skeleton images. For this purpose, it proposes a new algorithm of recovering fingerprints with the use of machine learning and skeleton image features of fingerprints. In the proposed method, we suggest the new machine learning Pix2Pix model to generate more natural images. The suggested model is developed in the way of adding a latent vector to the conventional image-to-image translation model Pix2Pix. In the experiment, fingerprints were recovered with the use of the proposed Pix2Pix model, and it was found that a fingerprint recognition device which recognized the recovered fingerprints had a high success rate of recognition. Therefore, it was proved that a fingerprint recognition device using skeleton images as well was vulnerable to presentation attack. It is expected that the algorithm proposed in this study will be very useful to many different application areas related to image processing, including biometrics, fingerprint recognition and recovery, and image surveillance.
引用
收藏
页码:34121 / 34135
页数:14
相关论文
共 129 条
[91]  
Dodd MD(undefined)undefined undefined undefined undefined-undefined
[92]  
Gauthier I(undefined)undefined undefined undefined undefined-undefined
[93]  
Talab AMA(undefined)undefined undefined undefined undefined-undefined
[94]  
Huang Z(undefined)undefined undefined undefined undefined-undefined
[95]  
Xi F(undefined)undefined undefined undefined undefined-undefined
[96]  
HaiMing L(undefined)undefined undefined undefined undefined-undefined
[97]  
Unar JA(undefined)undefined undefined undefined undefined-undefined
[98]  
Seng WC(undefined)undefined undefined undefined undefined-undefined
[99]  
Abbasi A(undefined)undefined undefined undefined undefined-undefined
[100]  
Wang S(undefined)undefined undefined undefined undefined-undefined