Fingerprint Presentation Attack Detector Using Global-Local Model (2402.12754v1)
Abstract: The vulnerability of automated fingerprint recognition systems (AFRSs) to presentation attacks (PAs) promotes the vigorous development of PA detection (PAD) technology. However, PAD methods have been limited by information loss and poor generalization ability, resulting in new PA materials and fingerprint sensors. This paper thus proposes a global-local model-based PAD (RTK-PAD) method to overcome those limitations to some extent. The proposed method consists of three modules, called: 1) the global module; 2) the local module; and 3) the rethinking module. By adopting the cut-out-based global module, a global spoofness score predicted from nonlocal features of the entire fingerprint images can be achieved. While by using the texture in-painting-based local module, a local spoofness score predicted from fingerprint patches is obtained. The two modules are not independent but connected through our proposed rethinking module by localizing two discriminative patches for the local module based on the global spoofness score. Finally, the fusion spoofness score by averaging the global and local spoofness scores is used for PAD. Our experimental results evaluated on LivDet 2017 show that the proposed RTK-PAD can achieve an average classification error (ACE) of 2.28% and a true detection rate (TDR) of 91.19% when the false detection rate (FDR) equals 1.0%, which significantly outperformed the state-of-the-art methods by $\sim$10% in terms of TDR (91.19% versus 80.74%).
- R. Cappelli, M. Ferrara, and D. Maltoni, “Minutia cylinder-code: A new representation and matching technique for fingerprint recognition,” IEEE transactions on pattern analysis and machine intelligence, vol. 32, no. 12, pp. 2128–2141, 2010.
- M. Ghafoor, S. A. Tariq, T. Zia, I. A. Taj, A. Abbas, A. Hassan, and A. Y. Zomaya, “Fingerprint identification with shallow multifeature view classifier,” IEEE Transactions on Cybernetics, 2019.
- A. Das, C. Galdi, H. Han, R. Ramachandra, J.-L. Dugelay, and A. Dantcheva, “Recent advances in biometric technology for mobile devices,” in 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2018, pp. 1–11.
- T. Chugh and A. K. Jain, “Oct fingerprints: Resilience to presentation attacks,” arXiv preprint arXiv:1908.00102, 2019.
- I. Goicoechea-Telleria, B. Fernandez-Saavedra, and R. Sanchez-Reillo, “An evaluation of presentation attack detection of fingerprint biometric systems applying iso/iec 30107-3,” in International Biometric Performance Testing Conference, 2016.
- F. Liu, G. Liu, and X. Wang, “High-accurate and robust fingerprint anti-spoofing system using optical coherence tomography,” Expert Systems with Applications, vol. 130, pp. 31–44, 2019.
- C. Sousedik and C. Busch, “Presentation attack detection methods for fingerprint recognition systems: a survey,” Iet Biometrics, vol. 3, no. 4, pp. 219–233, 2014.
- E. Marasco and A. Ross, “A survey on antispoofing schemes for fingerprint recognition systems,” ACM Computing Surveys (CSUR), vol. 47, no. 2, pp. 1–36, 2014.
- P. V. Reddy, A. Kumar, S. Rahman, and T. S. Mundra, “A new antispoofing approach for biometric devices,” IEEE transactions on biomedical circuits and systems, vol. 2, no. 4, pp. 328–337, 2008.
- Q. Zhao, D. Zhang, L. Zhang, and N. Luo, “Adaptive fingerprint pore modeling and extraction,” Pattern Recognition, vol. 43, no. 8, pp. 2833–2844, 2010.
- F. Liu, H. Liu, W. Zhang, G. Liu, and L. Shen, “One-class fingerprint presentation attack detection using auto-encoder network,” IEEE Transactions on Image Processing, vol. 30, pp. 2394–2407, 2021.
- K. A. Nixon, R. K. Rowe, J. Allen, S. Corcoran, L. Fang, D. Gabel, D. Gonzales, R. Harbour, S. Love, R. McCaskill et al., “Novel spectroscopy-based technology for biometric and liveness verification,” in Biometric Technology for Human Identification, vol. 5404. International Society for Optics and Photonics, 2004, pp. 287–295.
- T. Chugh and A. K. Jain, “Fingerprint presentation attack detection: Generalization and efficiency,” in 2019 International Conference on Biometrics (ICB). IEEE, 2019, pp. 1–8.
- J. Jia, L. Cai, K. Zhang, and D. Chen, “A new approach to fake finger detection based on skin elasticity analysis,” in International Conference on Biometrics (ICB). Springer, 2007, pp. 309–318.
- A. Antonelli, R. Cappelli, D. Maio, and D. Maltoni, “Fake finger detection by skin distortion analysis,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 3, pp. 360–373, 2006.
- H.-s. Lee, H.-j. Maeng, and Y.-s. Bae, “Fake finger detection using the fractional fourier transform,” in European Workshop on Biometrics and Identity Management. Springer, 2009, pp. 318–324.
- S. B. Nikam and S. Agarwal, “Fingerprint liveness detection using curvelet energy and co-occurrence signatures,” in 2008 fifth international conference on computer graphics, imaging and visualisation. IEEE, 2008, pp. 217–222.
- D. Menotti, G. Chiachia, A. Pinto, W. R. Schwartz, H. Pedrini, A. X. Falcao, and A. Rocha, “Deep representations for iris, face, and fingerprint spoofing detection,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 864–879, 2015.
- R. F. Nogueira, R. de Alencar Lotufo, and R. C. Machado, “Fingerprint liveness detection using convolutional neural networks,” IEEE transactions on information forensics and security, vol. 11, no. 6, pp. 1206–1213, 2016.
- T. Chugh, K. Cao, and A. K. Jain, “Fingerprint spoof buster: Use of minutiae-centered patches,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 9, pp. 2190–2202, 2018.
- K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv:1409.1556, 2014.
- A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105.
- V. Mura, G. Orrù, R. Casula, A. Sibiriu, G. Loi, P. Tuveri, L. Ghiani, and G. L. Marcialis, “Livdet 2017 fingerprint liveness detection competition 2017,” in 2018 International Conference on Biometrics (ICB). IEEE, 2018, pp. 297–302.
- T. Chugh and A. K. Jain, “Fingerprint spoof detector generalization,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 42–55, 2020.
- L. Ghiani, D. A. Yambay, V. Mura, G. L. Marcialis, F. Roli, and S. A. Schuckers, “Review of the fingerprint liveness detection (livdet) competition series: 2009 to 2015,” Image and Vision Computing, vol. 58, pp. 110–128, 2017.
- G. Marcialis et al., “Livdet 2015 fingerprint liveness detection competition 2015, 7th ieee int.” Conf. on Biometrics: Theory, Applications and Systems (BTAS 2015).
- A. Rattani, W. J. Scheirer, and A. Ross, “Open set fingerprint spoof detection across novel fabrication materials,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 11, pp. 2447–2460, 2015.
- J. J. Engelsma and A. K. Jain, “Generalizing fingerprint spoof detector: Learning a one-class classifier,” arXiv preprint arXiv:1901.03918, 2019.
- Y. Ding and A. Ross, “An ensemble of one-class svms for fingerprint spoof detection across different fabrication materials,” in 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2016, pp. 1–6.
- R. Gajawada, A. Popli, T. Chugh, A. Namboodiri, and A. K. Jain, “Universal material translator: Towards spoof fingerprint generalization,” in 2019 International Conference on Biometrics (ICB). IEEE, 2019, pp. 1–8.
- C. Cao, X. Liu, Y. Yang, Y. Yu, J. Wang, Z. Wang, Y. Huang, L. Wang, C. Huang, W. Xu et al., “Look and think twice: Capturing top-down visual attention with feedback convolutional neural networks,” in Proceedings of the IEEE international conference on computer vision, 2015, pp. 2956–2964.
- J. J. Engelsma, K. Cao, and A. K. Jain, “Raspireader: Open source fingerprint reader,” IEEE transactions on pattern analysis and machine intelligence, vol. 41, no. 10, pp. 2511–2524, 2018.
- F. Liu, C. Shen, H. Liu, G. Liu, Y. Liu, Z. Guo, and L. Wang, “A flexible touch-based fingerprint acquisition device and a benchmark database using optical coherence tomography,” IEEE Transactions on Instrumentation and Measurement, 2020.
- D. M. Beck and S. Kastner, “Top-down and bottom-up mechanisms in biasing competition in the human brain,” Vision research, vol. 49, no. 10, pp. 1154–1165, 2009.
- R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, and D. Batra, “Grad-cam: Visual explanations from deep networks via gradient-based localization,” in Proceedings of the IEEE international conference on computer vision, 2017, pp. 618–626.
- A. Chattopadhay, A. Sarkar, P. Howlader, and V. N. Balasubramanian, “Grad-cam++: Generalized gradient-based visual explanations for deep convolutional networks,” in 2018 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 2018, pp. 839–847.
- B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba, “Learning deep features for discriminative localization,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 2921–2929.
- M. D. Zeiler and R. Fergus, “Visualizing and understanding convolutional networks,” in European conference on computer vision. Springer, 2014, pp. 818–833.
- Y. Wang, J. Zhang, M. Kan, S. Shan, and X. Chen, “Self-supervised equivariant attention mechanism for weakly supervised semantic segmentation,” in Proceedings of the IEEE international conference on computer vision, 2020, pp. 12 275–12 284.
- A. Kolesnikov and C. H. Lampert, “Seed, expand and constrain: Three principles for weakly-supervised image segmentation,” in European conference on computer vision. Springer, 2016, pp. 695–711.
- Y. Wei, J. Feng, X. Liang, M.-M. Cheng, Y. Zhao, and S. Yan, “Object region mining with adversarial erasing: A simple classification to semantic segmentation approach,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 1568–1576.
- Q. Hou, P. Jiang, Y. Wei, and M.-M. Cheng, “Self-erasing network for integral object attention,” in Advances in Neural Information Processing Systems, 2018, pp. 549–559.
- L. Wang, D. Meng, X. Hu, J. Lu, and J. Zhao, “Instance annotation via optimal bow for weakly supervised object localization,” IEEE Transactions on Cybernetics, vol. 47, no. 5, pp. 1313–1324, 2017.
- B. Xue and N. Tong, “Diod: Fast and efficient weakly semi-supervised deep complex isar object detection,” IEEE Transactions on Cybernetics, vol. 49, no. 11, pp. 3991–4003, 2019.
- T. DeVries and G. W. Taylor, “Improved regularization of convolutional neural networks with cutout,” arXiv preprint arXiv:1708.04552, 2017.
- A. Howard, M. Sandler, G. Chu, L.-C. Chen, B. Chen, M. Tan, W. Wang, Y. Zhu, R. Pang, V. Vasudevan et al., “Searching for mobilenetv3,” in Proceedings of the IEEE International Conference on Computer Vision, 2019, pp. 1314–1324.
- A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, and H. Adam, “Mobilenets: Efficient convolutional neural networks for mobile vision applications,” arXiv preprint arXiv:1704.04861, 2017.
- M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen, “Mobilenetv2: Inverted residuals and linear bottlenecks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 4510–4520.
- M. Tan, B. Chen, R. Pang, V. Vasudevan, M. Sandler, A. Howard, and Q. V. Le, “Mnasnet: Platform-aware neural architecture search for mobile,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 2820–2828.
- O. Ronneberger, P. Fischer, and T. Brox, “U-net: Convolutional networks for biomedical image segmentation,” in International Conference on Medical image computing and computer-assisted intervention. Springer, 2015, pp. 234–241.
- J. Johnson, A. Alahi, and L. Fei-Fei, “Perceptual losses for real-time style transfer and super-resolution,” in European conference on computer vision. Springer, 2016, pp. 694–711.
- Z. Zhou, V. Sodha, M. M. R. Siddiquee, R. Feng, N. Tajbakhsh, M. B. Gotway, and J. Liang, “Models genesis: Generic autodidactic models for 3d medical image analysis,” in International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 2019, pp. 384–393.
- A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang, Z. DeVito, Z. Lin, A. Desmaison, L. Antiga, and A. Lerer, “Automatic differentiation in pytorch,” 2017.
- P. Molchanov, S. Tyree, T. Karras, T. Aila, and J. Kautz, “Pruning convolutional neural networks for resource efficient inference,” arXiv preprint arXiv:1611.06440, 2016.