Fingerprint Presentation Attack Detection Using Transfer Learning Approach

Fingerprint Presentation Attack Detection Using Transfer Learning Approach

Rajneesh Rani, Harpreet Singh
Copyright: © 2021 |Pages: 15
DOI: 10.4018/IJIIT.2021010104
Article PDF Download
Open access articles are freely available for download

Abstract

In this busy world, biometric authentication methods are serving as fast authentication means. But with growing dependencies on these systems, attackers have tried to exploit these systems through various attacks; thus, there is a strong need to protect authentication systems. Many software and hardware methods have been proposed in the past to make existing authentication systems more robust. Liveness detection/presentation attack detection is one such method that provides protection against malicious agents by detecting fake samples of biometric traits. This paper has worked on fingerprint liveness detection/presentation attack detection using transfer learning for which the authors have used a pre-trained NASNetMobile model. The experiments are performed on publicly available liveness datasets LivDet 2011 and LivDet 2013 and have obtained good results as compared to state of art techniques in terms of ACE(average classification error).
Article Preview
Top

1. Introduction

For decades, human civilization has been strongly subjected to the need for authentication systems to prove their identity. Traditional methods for authentication like cards with pins and passwords are no longer safe(Yuan et al., 2019a) as they can be lost or stolen. So biometrics became very popular as it is more robust and secure as authentication is concerned.

Biometrics based on behavioral or physiological traits are used for authentication. Physiological biometric traits, fingerprints are widely used across the globe due to their best-known properties such as individuality, durability, and universality (Ghiani et al., 2013b). Mobile phones are widely used for money transactions these days(Kim, 2016). Many government-issued identities are fully dependent on fingerprint biometric systems which have surged the use of fingerprint authentication. This high-level dependency comes with the risk of critical attacks such as presentation attacks, spoofing attacks, etc. Replica of an original fingerprint can be created by materials like gelatin, silicon, wood glue, etc which is very hard to distinguish from the original one. The whole biometric system can be fooled in a number of ways (Paridah et al., 2016) which comprises attacks at various stages of the biometric system as shown in Figure 1.

Figure 1.

Basic Components biometric system (Paridah et al., 2016)

IJIIT.2021010104.f01

At stage 1, a hacker can perform a direct attack by manipulating sensor to obtain fake fingerprint as an authentic one, at stage 2 biometrics previously collected by the sensor can be resent to fool the system. At stage 3 and 4 features can be changed in the feature extraction stage to stop a real user from getting recognized. In the enrolment center at stage 5, there is a great risk of enrolling fake fingerprints similar to stage 1. The attack on the transmission channel between the module and registration databases can also be performed in stage 6. Even if the sensor is not manipulated and features are extracted properly the database can still be hacked to steal stored templates or features to perform a reply attack in stage 7. While at stage 8 the attack on the transmission channel between the database templates and the comparison module can be performed. Finally, at stages 9 and 10the decision of a biometric system can be changed by a hacker to allow the fake user or restrict the actual user. All stages were targeted to a particular component of the biometric system but as in stage 11, the whole standalone application can also be attacked. The features, database and final output can be secured by utilizing the regular computerized protection methods (digital signature, encryption, hash function, access control,) or by keeping vulnerable parts of a system in a safe place. But these techniques still fail to discriminate fake fingerprints and live fingerprints.

Liveness detection /presentation attack detection is the field that comes with a solution to this problem which includes both hardware and software methods (Naccache et al., 2011). Hardware-based methods require additional hardware units to detect traits such as blood pressure, heartbeat, odor, etc. whereas software-based methods are more popular because they require a single standard sensor thus are comparatively cheap and scalable.

In this paper, we have used a pre-trained NASNet Mobile model which was further modified at last layer and retrained on liveness datasets LivDet 2011 and LivDet 2013 to classify fake and live images. We have evaluated results for whole dataset training, cross-dataset training, and cross material training scenarios.

We have divided this paper into five more sections. Related work and state of art techniques are reviewed in Section 2, the methodology stating the basics and our proposed model in has been discussed in Section 3, datasets and performance metrics used in experiments are covered in Section 4, the results for experiments are shown in Section 5 and finally, in Section 6, we have concluded our work along with future scope.

Top

Many creators have worked on fingerprint ridges for liveness task, Schuckers(Abhyankar and Schuckers, 2006)used multi-resolution textures and frequencies of ridges for detecting liveness of fingerprints and achieved 1.4% of error rate on a dataset collected in their own lab.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 3 Released, 1 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing