Abstract

This paper presents a novel mechanism for fingerprint dynamic presentation attack detection. We utilize five spatio-temporal feature extractors to efficiently eliminate and mitigate different presentation attack species. The feature extractors are selected such that the fingerprint ridge/valley pattern is consolidated with the temporal variations within the pattern in fingerprint videos. An SVM classification scheme, with a second degree polynomial kernel, is used in our presentation attack detection subsystem to classify bona fide and attack presentations. The experiment protocol and evaluation are conducted following the ISO/IEC 30107-3:2017 standard. Our proposed approach demonstrates efficient capability of detecting presentation attacks with significantly low BPCER where BPCER is 1.11% for an optical sensor and 3.89% for a thermal sensor at 5% APCER for both.

Highlights

  • Fingerprint recognition is one of the oldest and most prevalent biometric modalities.It has shown attractive features such as high accuracy and user convenience; it has been applied in applications such as forensics, identity control, physical access control, and mobile devices

  • We assess the accuracy of the proposed Presentation Attack Detection (PAD) scheme and analyze the influence of selecting the feature extractor on the PAD subsystem efficiency

  • We present a novel fingerprint PAD approach in the dynamic scenario

Read more

Summary

Introduction

Fingerprint recognition is one of the oldest and most prevalent biometric modalities. The generic biometric scheme is vulnerable at different points starting from the sensor to the recognition score/decision [2] Based on those vulnerabilities, biometric security is categorized in two main areas: (a) electronic security which concerns the digital process of the captured biometric trait (b) physical security which questions whether the biometric trait presentation is performed by a bona fide (i.e., genuine user) or by an attacker. The primary motivation for this study is that when expert attackers perform attacks, the 2-D impression of the attack presentation resembles the genuine fingerprint pattern, leading to a higher possibility that the attack will be classified as a bona fide presentation In this context, two recent investigations were carried out to support this claim.

Related Work
Dynamic Fingerprint Pad Mechanisms
Dynamic Texture
Proposed Presentation Attack Detection Subsystem
Feature Extraction Modes
Feature Extractors
GIST 3-D Descriptor
Volume Local Binary Patterns
Volume Local Phase Quantizer
Local Binary Patterns from Three Orthogonal Planes
PAD Classification
Experiment
Database Description
Volume Segmentation
Optical Subset
Experimental Protocol
Impact of PAD Subsystem Mode and Feature Extraction Method
Impact of Sensing Technology
Impact of Attack Species
Accuracy Comparison with SoA Mechanisms
Summary and Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call