scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A Survey in Presentation Attack and Presentation Attack Detection

TL;DR: A general taxonomy of presentation attacks is proposed to cover different biometric modalities considering the attacker’s intention and the presentation instrument and mechanisms that aim to eliminate or mitigate those attacks are also taxonomized.
Abstract: Biometric-based recognition has been replacing conventional recognition methods in security systems. Modern electronic devices such as smartphones and online services have been employing biometric systems because of their security, acceptability, and usability. However, the wide deployment of Biometrics raises security concerns including attacks that aim to interfere with a system’s operation. This paper provides a review of potential threats which may affect biometric systems’ security, particularly, Presentation Attack (PA). A general taxonomy of presentation attacks is proposed to cover different biometric modalities considering the attacker’s intention and the presentation instrument. Moreover, Presentation Attack Detection (PAD) mechanisms that aim to eliminate or mitigate those attacks are also taxonomized. The taxonomy analyzes PAD mechanisms wherein the biometric trait pattern is considered to classify PAD methods. A state of the art study has been carried out to investigate PA and PAD for six biological and behavioral modalities.

Summary (7 min read)

Tutor:

  • This is for you, Dad. IV Acknowledgements.
  • The state-of-the-art languages do not have the capacity to put my gratitude into a form of written speech for those who supported me to achieving this thesis.
  • Nevertheless, I still feel the necessity of not skipping this page.

Journal papers:

  • Anas Husseis, Judith Liu-Jimenez, Ines Goicoechea-Telleria, Raul Sanchez-Reillo, “Dynamic Fingerprint Statistics: Application in Presentation Attack Detection” in IEEE Access, 2018.
  • Experimental planning, collecting data, performing the experiment, reporting results, and writing the paper, also known as o Published o Role.
  • Anas Husseis, Judith Liu-Jimenez, Raul Sanchez-Reillo, “Fingerprint Presentation Attack Detection Utilizing Spatio-Temporal Feature”.
  • O Submitted to Sensors (under review) o Role: performing the experiment, reporting results, and writing the paper.
  • Chapter 5. Anas Husseis, Judith Liu-Jimenez, Raul Sanchez-Reillo, “The Impact of Pressure on the Fingerprint Impression: Presentation Attack Detection Scheme”.

Communication Channels

  • The different subsystems within the biometric system are connected through multiple communication channels, points 2, 4, 6, and 8, which transmit the signal/s from one subsystem to the next.
  • The attacker seeks to modify the transmitted signal with the 11 objective of manipulating the recognition decision.
  • Thus, biometric systems are designed in a fashion that secures the data during transmission to avoid potential attacks.

Biometric Subsystems

  • The biometric system includes a sequence of subsystems that perform the different tasks of biometric recognition .
  • These subsystems can be targeted by the attacker seeking to manipulate the recognition process as follows: a) Data Capture Subsystem: Besides the presentation attack, the biometric sensor, point 1, is subject to indirect attacks.
  • The feature extractor might be replaced to perform a hell climbing attack.
  • The matching process compares the captured sample with a stored template in the database.
  • The integrity of the authorized administrator/s on controlling: the decision thresholds, the quality check criteria, and the enrollment process, reflects the integrity of the overall system.

ATTACK DETECTION TAXONOMIES

  • Each biometric system utilizes a specific physiological and/or behavioral characteristic for the recognition process.
  • Additionally, each biometric modality has different types of sensors that vary with other technologies in terms of data acquisition methods.
  • This variety inquires the attacker to perform the presentation attack using a specific Presentation Attack Instrument (PAI) species that is adjusted to the target biometric system.
  • The next subsections propose general taxonomies for presentation attack and presentation attack detection.
  • On the contrary, the vascular pattern needs to be captured directly from the bona fide subject using an infrared imaging capture device, as the pattern is not exposed either leaves traces.

DETECTION

  • As stated in the previous section, many investigations are being undertaken in order to study presentation attacks seeking to propose detection mechanisms to eliminate or mitigate those attacks.
  • There is a vast amount of literature on presentation attack and presentation attack detection evaluations, which the authors introduce in this section and link those investigations to the proposed taxonomy.
  • The PAD mechanisms in this class are basically developed to investigate the influence of the natural biometric phenomena on the acquired presentation.
  • Table 2.6 lists the proposed PAD mechanisms that consider natural phenomena as distinguishing basis to address the issue of PA.
  • 22 As stated in Section 2, this category includes the mechanisms that exploit secondary information that distinguishes genuine presentations from attacks.

Evaluation Methodology

  • Performance evaluation of a PAD mechanism is essential to characterize its technical capabilities such as security and ease-of-use.
  • Essentially, PAD evaluation determines the technical competence of a PAD mechanism considering specific attack potential.
  • Figure 3.1 illustrates the corresponding reference at each part of the proposed methodology.
  • This chapter provides the required framework to perform the evaluations, details the data collection process, and provides a vulnerability assessment for the Target of Evaluation (ToE).

PAI.

  • Class of presentation attack instruments created using a standard production method and based on different biometric characteristics, also known as PAI species.
  • The biometric system is a combination of multiple subsystems that work jointly to provide the final recognition score/decision including the PAD result.
  • Thus, PAD evaluations shall completely describe the ToE, i.e. system or subsystem that is the subject of evaluation, including the details of PAD implementation and the evaluator’s attributes.
  • The evaluator would have access to the capture decision and might obtain further details depending on the acquisition tool provided by the manufacturer.
  • In addition to the vulnerability analysis, 28 vulnerability assessment analyzes the attack potential by exploring different factors that affect the potential of attacks.

3.1.4.3.1 Reporting BPCER at Fixed APCER Value

  • This allows determining the ease-of-use measures at certain levels of security making the comparison between different mechanisms more evident and accurate.
  • BPCER can be computed when APCER=5% and then reported as BPCER20.
  • The opposite is also valid where APCER can be calculated at fixed levels of BPCER.

3.1.4.3.2 Detection Error Tradeoff (DET) Curve

  • The DET curve [217] is a graphical representation for APCER versus BPCER.
  • This representation describes the trade-off between security and ease-of-use, and helps to define a decision threshold that suits the security/ease-of-use requirements.

3.1.4.3.3 Tradeoff Equal Error Rate (TEER)

  • The conventional EER measure has been used in the evaluations of biometric systems performance.
  • The usage of TEER is not recommended since it reports the accuracy of different mechanisms at different levels of security/ ease-of-use.
  • As stated in Chapter 1, this thesis was undertaken in order to investigate the dynamic fingerprint characteristics as the PAD features.
  • For the initiation of PAD testing process, the primary step is to define the test target including the biometric modality, sensing technology, operational scenarios, and the ToE.
  • Afterward, the required data to perform the testing should be determined.

Participants

  • Eleven capture subjects, four females and seven males, have participated in the data collection.
  • Each subject donated his/her biometric samples from 6 fingers: thumb, index, and middle of both hands.

Scenarios

  • Initially, the participants were given a brief overview of the typical use cases of fingerprint sensors.
  • They then were asked to present their fingerprints to the sensors, knowing that each sensor acquires the complete placement over its surface as a video.
  • The presentations were collected assuming two different operational scenarios: (1) ordinary presentations and (2) presentations with additional pressure on the sensor’s surface.

Sensors

  • Two sensing technologies with different capabilities are utilized to collect the data.
  • The sensors produce different characteristics for the captured videos due to their distinctions in Table 3.4.

Attacker

  • The attacker has extensive knowledge about fingerprint sensors, fingerprint security, and presentation attacks.
  • The attacker has participated in an experiment to attack fingerprint sensors in mobile devices [218].
  • Moreover, the attacker had tested different PAI species on the thermal and optical sensors as training before conducting the formal investigation.
  • Based on those bases, following the discussion on Section 3.1.3.2, the attacker is classified as an expert.

Attacks

  • The attacks are conducted in cooperation with the subjects.
  • 3-D silicon molds were collected from the selected 66 fingerprints.
  • Only one mold was collected from each fingerprint.
  • Accordingly, the attacker performed attack presentations using seven PAI species, specifically: Play-Doh, white glue, spray rubber, nail polish, nail hardener, gelatin, and latex.
  • Table 3.6 lists the details of the attacks following the recommendations of ISO/IEC 30107-3.

Vulnerability Analysis

  • Following the steps in Section 3.1.3.1, the evaluator defined the vulnerability at the surface of the fingerprint sensor.
  • Then, the potential attacks were defined following two steps: creating testing PAIs from different materials and select the species that can be detected by the sensors.
  • The process of analyzing the defined vulnerability is illustrated in Figure 3.2. 40.

Attack Potential

  • The assumed attack potential is characterized in Table 3.7.
  • The elapsed time is calculated considering the seven PAI species; defined in Figure 3.5.
  • At the moment of performing the attacks, the evaluator had only access to the public information about the ToE.
  • All the used equipment in this experiment were purchased from online shops, local shops, and supermarkets; thus, the equipment is reported as standard.
  • The following chapters conduct several experiments proposing fingerprint PAD mechanisms.

Application in Presentation Attack Detection

  • Fingerprint is typically perceived as the static pattern of the fingertip’s impression.
  • This section focuses on analyzing the complete interaction between the fingerprint and the sensor surface rather than analyzing a single fingerprint image.
  • These classifiers were selected after examining seven machine learning algorithms with different configuration modes, as shown in Table 4.2.
  • Different attack types are expected to have different attack potentials, a PAD mechanism may not succeed to distinguish specific attack types, while performs more successfully with other types [11].
  • 56 Table 4.5 and Table 4.6 report the PAD performance after feature selection by showing BPCER at fixed APCER and the equal error rate.

Detection Utilizing Spatio-Temporal Features

  • In the previous chapter, the experiment was conducted by analyzing the fingerprint as a sequence of dependent frames.
  • The dynamic features were extracted from the video frames in the spatial domain, then the variation of those spatial features was used to describe each fingerprint video.
  • There is a vast amount of literature on dynamic texture recognition with application to biometric recognition and analysis, this section highlights the most related works in this domain.
  • The authors had evaluated their PAD mechanism considering printed and replay attacks (video attacks).
  • 60 Additionally, various dynamic descriptors were suggested to categorize human actions.

SUBSYSTEM

  • The proposed PAD subsystem is designed in a fashion that leverages the dynamic information provided during the fingerprint presentation .
  • Five feature extractors are therefore selected to achieve a description that discriminates genuine from attack presentations.
  • The first mode investigates dynamic fingerprint features in the frequency domain whereas a 3-D filter bank is utilized to extract spectral features in a diverse range of scales and orientations.
  • Figure 5.2 illustrates these modes and Figure 5.3 shows an example of a fingerprint video and its sampling into 3-D patches and TOPs.
  • The feature extractors were selected in order to be in accordance with the proposed modes, moreover, to analyze the features in spatio-temporal and spectral domains.

1) Segmentation of thermal subset

  • The thermal sensor’s SDK provides a capturing mode that acquires only the central region of the sensor sized 90×128 pixels.
  • Thus, the acquired sequence is already segmented as a stack of 7 frames sized 90×128 Figure 5.4.

2) Segmentation of optical subset

  • Since their study analyzes the formation of fingerprints, the authors have implemented a simple volume segmentation tool that creates the boundaries of the entire Interaction between a fingerprint and the sensor.
  • The first set of analyses examined the impact of (i) the size of 3-D samples used in the processing mode, and (ii) selecting rotation invariant or uniform features, on the feature extractor performance.
  • The authors separately evaluate the feature extraction time for optical and thermal sensors in Table 5.9 and Figure 5.9.
  • The significance of the proposed approach is integrating the effect of natural fingerprint phenomena from the acquired video using dynamic descriptors, for instance, the intensity variation caused by the perspiration and pressure, and the ridge/valley pattern's formation caused by the 3- D form and elasticity of genuine fingerprints.
  • Moreover, the approach has the capacity to detect anomalous patterns caused by the various PAI species, consequently, enhance the PAD subsystem's accuracy.

Fingerprint Features

  • As explained in earlier chapters, the fundamental research question in the development of novel PAD mechanisms concerns the distinct features that segregate genuine from malicious biometric traits.
  • Presentation instructions, which might be referred to as challenge-response in the context of PAD, are used to trigger the biometric trait aiming to obtain a unique reaction pattern/s that, ideally, cannot be achieved by attacks, also known as 78 I. Presentation instruction.
  • Further analysis of fingerprint elasticity was performed by Jia et al. [153], analyzing the variations in the fingerprint area, intensity, and standard deviation.
  • The variations in area and intensity were justified by the applied pressure and skin’s moistness.
  • Thus, a detailed analysis of the impact of different attack species on the PAD subsystem performance is shown in the results section.

6.3.1.1.1 DISTORTION-BASED FEATURES

  • This feature extractor analyzes the impact of pressure on the fingerprint ridge/valley dynamicpattern considering both bona fide and attack presentations.
  • Frames are taken to demonstrate the variations at the beginning, mid, end of the presentation (left to right).
  • Peak Signal to Noise Ratio (𝑃𝑆𝑁𝑅) measures the peak error between two images.
  • In the fingerprint sequence, image degradation is caused by the applied pressure during a presentation.
  • Finally, the defined four features (i.e. PSNR, r, SSIM, and I) in addition to the eight statistics introduced in [233], are combined to form the final PAD features.

6.3.1.1.2 SPATIO-TEMPORAL FEATURES

  • In their previous work (Chapter 5), dynamic texture has shown a high capacity to provide discriminative descriptions for dynamic fingerprint presentations.
  • This section revisits the used feature extraction methods, namely: VLBP, LBP-TOP, VLPQ, LPQ-TOP, and GIST 3-D, and utilizes them as PAD feature extractors considering the database which includes the pressure scenario.
  • The previous conclusions state that those methods are capable of detecting the dynamic features of genuine fingerprints and the abnormal variations of attacks when fingerprint videos are investigated.
  • Therefore, the dynamic pattern’s variation caused by pressure is expected to provide additional discriminative features that improve the overall accuracy of the PAD subsystem.

1) Protocol I

  • The purpose of this protocol is to evaluate the proposed PAD mechanisms in section 6.3.1.1 by conducting Experiments I and II.
  • The authors thus utilize the database in Section 3. 2, which was collected to investigate the influence of pressure on bona fide and attack presentations, to validate the proposed PAD mechanisms.
  • In all of the corresponding experiments, each sensor’s data is studied individually because of the differences between the acquired data, i.e frame rate, image size, resolution, noise, etc.
  • The division is performed by randomizing capture subjects such that all the presentations (bona fide and attacks) of an independent capture subject are either in the training or testing data.
  • Finally, the PAD subsystem is evaluated through performing the PAD feature extraction, training/testing the PAD classifier, and assessing the obtained results following the evaluation methodology.

2) Protocol II

  • The aim of the second protocol is to compare the PAD performance of the proposed mechanisms in the scenarios of ordinary presentations and presentations with pressure.
  • Table 6.2 summarizes the proposed experiments, the corresponding protocol and database, and the experiment objective.
  • Further analysis is performed to the obtained results to demonstrate the influence of PAI species on the PAD performance (Table 6.4).
  • Although the PAD accuracy for the optical sensor is significantly higher than the thermal sensor at low APCER values.

1) PAD Subsystem Accuracy: Pressure Versus Ordinary Presentations

  • In order to identify the influence of pressure on the PAD subsystem accuracy, BPCER20 is used to compare the PAD subsystem accuracy considering the scenarios of ordinary presentations and presentations with pressure.
  • The error rates, reported in Chapter 5 for ordinary presentation and in the previous experiment for presentations with pressure, are shown in Figure 6.13 to compare the PAD subsystem accuracy for both scenarios.
  • Those scenarios are further investigated in the next subsection.
  • Thus, Figure 6.15 and Figure 6.16 demonstrate the score distributions for bona fide and attack presentations considering both cases.
  • On the other hand, the thermal sensor does not show a noticeable change in the median of attacks but the median of bona fide increased from 0.21 to 0.37.

2) PAD Subsystem Generalizability: Pressure Versus Ordinary Presentations

  • To assess the PAD subsystem generalizability, the second part of Protocol II is applied.
  • On the other hand, the 100 stability of the PAD model, which was confirmed by the leave-one-out cross validation, could be interpreted as being a result of obtaining more generic features that are less dependent on certain differences between capture subjects.
  • Finally, the authors suggest studying fingerprint-specific dynamic features such as contours development and region of interest variations.
  • The proposed taxonomies provided a deeper understanding of the issue of presentation attacks, and the development of presentation attack detection evaluations.

Fingerprint System

  • Prior to performing the data collection (presented in Chapter 3), the attacker gained solid knowledge and experience in the subject of fingerprint presentation attacks.
  • The experiment was limited a 12-hour development and testing limit.
  • The main observations reported by the attacker are: 1. In the primary stages of the experiment, different presentation attack attempts were carried out and failed.
  • The attack success rate increases while the attacker keeps practicing.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

I
Vulnerability Assessment in the Use of Biometrics in
Unsupervised Environments
by
Anas Hussein Ahmad Husseis
A dissertation submitted by in partial fulfillment of the requirements
for the degree of Doctor of Philosophy in
Electrical Engineering, Electronics and Automation
Universidad Carlos III de Madrid
Advisor(s):
Raúl Sánchez Reíllo
Judith Liu Jiménez
Tutor:
Raúl Sánchez Reíllo
January 2021

II
This thesis is distributed under license Creative Commons Attribution Non
Commercial Non Derivatives”.

III
This is for you, Dad.

IV
Acknowledgements
The state-of-the-art languages do not have the capacity to put my gratitude into a form of
written speech for those who supported me to achieving this thesis. Nevertheless, I still feel
the necessity of not skipping this page.
In the first place, I would like to thank my advisors Raul and Judith for all the support they
provided through my journey in GUTI. I am very proud for being a research fellow with these
great advisors and I hope I will be good enough to make them proud of me in the future.
I would also like to thank my family for standing with me from the beginning. For being there
supporting, listening, and giving good vibes all the time.
Infinite thanks to my colleagues (gutitos) and my friends all around the world for the
continuous encouragement and enthusiasm. I would specifically mention my Japanese friends
Ichigo, L, and Goku for being there all the time.
Finally, I would take the opportunity to thank myself for being patient and hard worker, for
believing in me, and for the constant reminders that this thesis will be finely finished.

V
Published and submitted content
Journal papers:
Anas Husseis, Judith Liu-Jimenez, Ines Goicoechea-Telleria, Raul Sanchez-Reillo,
“Dynamic Fingerprint Statistics: Application in Presentation Attack Detectionin
IEEE Access, 2018.
o Published
o Role: experimental planning, collecting data, performing the experiment,
reporting results, and writing the paper.
o Wholly included in Thesis. Chapter 4.
o URL: https://ieeexplore.ieee.org/abstract/document/9097282
Anas Husseis, Judith Liu-Jimenez, Raul Sanchez-Reillo, “Fingerprint Presentation
Attack Detection Utilizing Spatio-Temporal Feature”.
o Submitted to Sensors (under review)
o Role: performing the experiment, reporting results, and writing the paper.
o Wholly included in Thesis. Chapter 5.
Anas Husseis, Judith Liu-Jimenez, Raul Sanchez-Reillo, “The Impact of Pressure
on the Fingerprint Impression: Presentation Attack Detection Scheme”.
o Submitted to Sensors (under review)
o Role: performing the experiment, reporting results, and writing the paper.
o Wholly included in Thesis. Chapter 6.
Conference papers:
Anas Husseis, Judith Liu-Jimenez, Ines Goicoechea-Telleria, Raul Sanchez-Reillo,
“A survey in presentation attack and presentation attack detection” in in IEEE
International Carnahan Conference on Security Technology (ICCST), 2019.
o Published
o Role: conducting the study and writing the paper.
o Wholly included in Thesis. Chapter 2.
o The inclusion in the thesis of material from this source is specified in a
footnote to each chapter where an inclusion occurs.
o The material from this source included int his thesis is not singled out with
typographic means and references
o URL: https://ieeexplore.ieee.org/abstract/document/8888436
R Blanco Gonzalo, Barbara Corsetti, Ines Goicoechea-Telleria, Anas Husseis,
Judith Liu-Jimenez, Raul Sanchez-Reillo, Teodors Eglitis, Elakkiya Ellavarason,
Richard Guest, Chiara Lunerti, M Azimi, J Khiarak, Salatiel Ezennaya-Gomez, N
Whiskerd, R Kuzu, E Okoh, “Attacking a Smartphone Biometric Fingerprint
System: A Novice's Approach in IEEE International Carnahan Conference on
Security Technology (ICCST), 2018.
o Published
o Role: participating in the experiment as an attacker and reporting partial
results of the complete experiment.

Citations
More filters
Journal ArticleDOI
TL;DR: In this paper, a review of the recent research landscape in biometric finger vein recognition systems is presented, focusing on manuscripts related to keywords "Finger Vein Authentication System", "Anti-spoofing or Presentation Attack Detection", "Multimodal Biometric Finger Vein authentication", and their variations in four main digital research libraries such as IEEE Xplore, Springer, ACM, and Science Direct.
Abstract: Finger vein recognition biometric trait is a significant biometric modality that is considered more secure, reliable, and emerging. This article presents a review to focus on the recent research landscape in biometric finger vein recognition systems. This article focuses on manuscripts related to keywords ‘Finger Vein Authentication System’, ‘Anti-spoofing or Presentation Attack Detection’, ‘Multimodal Biometric Finger Vein Authentication’ and their variations in four main digital research libraries such as IEEE Xplore, Springer, ACM, and Science Direct. The final set of articles is divided into three main categories: Deep Learning (DL) based finger vein recognition, Presentation Attack Detection (PAD), and Multimodal-based finger vein authentication system. Deep learning-based finger vein recognition techniques are further sub-divided into pre-processing (Quality assessment and enhancement) based, feature extraction based, and feature extraction and recognition based schemes. Presentation attack detection methods are sub-divided into software-based and hardware-based approaches. Multimodal-based finger vein biometric system is sub-categorized into feature level fusion, matching level fusion, and hybrid fusion methods. The authors have studied the problem of the recent algorithm and their solution related to finger vein biometric system from the recent literature. Performance analysis and selected the best promising research work from the mentioned studies are also presented. Finally, open challenges, opportunities, and suggested solutions related to deep learning, PAD, and Multimodal based finger vein recognition systems have been discussed in the discussion section. This work would be helpful to the developers, company users, researchers, and readers to get insight into the importance of such technology and the recent problem faced by finger vein authentication technology with respect to deep learning and multimodal systems.

33 citations

Proceedings ArticleDOI
TL;DR: LivDet-Face 2019 as discussed by the authors is the first edition of the face liveness competition, which aims to assess and report state-of-the-art in liveness / presentation attack detection for face recognition.
Abstract: Liveness Detection (LivDet)-Face is an international competition series open to academia and industry. The competition’s objective is to assess and report state-of-the-art in liveness / Presentation Attack Detection (PAD) for face recognition. Impersonation and presentation of false samples to the sensors can be classified as presentation attacks and the ability for the sensors to detect such attempts is known as PAD. LivDet-Face 2021 * will be the first edition of the face liveness competition. This competition serves as an important benchmark in face presentation attack detection, offering (a) an independent assessment of the current state of the art in face PAD, and (b) a common evaluation protocol, availability of Presentation Attack Instruments (PAI) and live face image dataset through the Biometric Evaluation and Testing (BEAT) platform. The competition can be easily followed by researchers after it is closed, in a platform in which participants can compare their solutions against the LivDet-Face winners.

17 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors explored two network design issues for finger-vein recognition: shallow network using rectangular filters and lightweight semi-pretrained network, and exhaustive experiments on three benchmark databases HKPU, FV-USM and SDUMLA demonstrate that rectangular filters outperform square filters for DL-based finger-Vein recognition.
Abstract: Finger-vein recognition has been widely explored for biometrics security over the past two or three decade. Its size and characteristics against presentation attacks make it suitable for various commercial, governmental and forensics applications. As with other biometric traits, finger-vein recognition approaches mainly depend on well-engineering feature descriptors and recently, more deep learning (DL) models have been designed to achieve high-performance biometrics. However, the existing DL approaches usually employ the neural networks with increasing layers and parameters, which inevitably leads to an increase in memory consumption and algorithm complexity. Besides, all the vein recognition networks use square filters, which are influenced by network designed for object detection and classification. In this paper, two network design issues for finger-vein recognition are explored: shallow network using rectangular filters and lightweight semi-pretrained network. The exhaustive experiments on three benchmark databases HKPU, FV-USM and SDUMLA demonstrate that rectangular filters outperform square filters for DL-based finger-vein recognition, and the lightweight semi-pretrained network also outperforms non-pretrained network.

8 citations

Journal ArticleDOI
15 Mar 2021-Sensors
TL;DR: Wang et al. as discussed by the authors utilized five spatio-temporal feature extractors to efficiently eliminate and mitigate different presentation attack species, such that the fingerprint ridge/valley pattern is consolidated with the temporal variations within the pattern in fingerprint videos.
Abstract: This paper presents a novel mechanism for fingerprint dynamic presentation attack detection. We utilize five spatio-temporal feature extractors to efficiently eliminate and mitigate different presentation attack species. The feature extractors are selected such that the fingerprint ridge/valley pattern is consolidated with the temporal variations within the pattern in fingerprint videos. An SVM classification scheme, with a second degree polynomial kernel, is used in our presentation attack detection subsystem to classify bona fide and attack presentations. The experiment protocol and evaluation are conducted following the ISO/IEC 30107-3:2017 standard. Our proposed approach demonstrates efficient capability of detecting presentation attacks with significantly low BPCER where BPCER is 1.11% for an optical sensor and 3.89% for a thermal sensor at 5% APCER for both.

7 citations

Journal ArticleDOI
24 Aug 2021-Sensors
TL;DR: In this paper, a fingerprint capture device based on thin film transistor (TFT) technology has been modified to acquire the impedances of the presented fingers and those impedance values were used to train a presentation attack detection (PAD) algorithm.
Abstract: Within the last few decades, the need for subject authentication has grown steadily, and biometric recognition technology has been established as a reliable alternative to passwords and tokens, offering automatic decisions. However, as unsupervised processes, biometric systems are vulnerable to presentation attacks targeting the capture devices, where presentation attack instruments (PAI) instead of bona fide characteristics are presented. Due to the capture devices being exposed to the public, any person could potentially execute such attacks. In this work, a fingerprint capture device based on thin film transistor (TFT) technology has been modified to additionally acquire the impedances of the presented fingers. Since the conductance of human skin differs from artificial PAIs, those impedance values were used to train a presentation attack detection (PAD) algorithm. Based on a dataset comprising 42 different PAI species, the results showed remarkable performance in detecting most attack presentations with an APCER = 2.89% in a user-friendly scenario specified by a BPCER = 0.2%. However, additional experiments utilising unknown attacks revealed a weakness towards particular PAI species.

5 citations

References
More filters
Journal ArticleDOI
TL;DR: A face recognition algorithm which is insensitive to large variation in lighting direction and facial expression is developed, based on Fisher's linear discriminant and produces well separated classes in a low-dimensional subspace, even under severe variations in lighting and facial expressions.
Abstract: We develop a face recognition algorithm which is insensitive to large variation in lighting direction and facial expression. Taking a pattern classification approach, we consider each pixel in an image as a coordinate in a high-dimensional space. We take advantage of the observation that the images of a particular face, under varying illumination but fixed pose, lie in a 3D linear subspace of the high dimensional image space-if the face is a Lambertian surface without shadowing. However, since faces are not truly Lambertian surfaces and do indeed produce self-shadowing, images will deviate from this linear subspace. Rather than explicitly modeling this deviation, we linearly project the image into a subspace in a manner which discounts those regions of the face with large deviation. Our projection method is based on Fisher's linear discriminant and produces well separated classes in a low-dimensional subspace, even under severe variation in lighting and facial expressions. The eigenface technique, another method based on linearly projecting the image space to a low dimensional subspace, has similar computational requirements. Yet, extensive experimental results demonstrate that the proposed "Fisherface" method has error rates that are lower than those of the eigenface technique for tests on the Harvard and Yale face databases.

11,674 citations

Journal ArticleDOI
TL;DR: This paper presents a novel and efficient facial image representation based on local binary pattern (LBP) texture features that is assessed in the face recognition problem under different challenges.
Abstract: This paper presents a novel and efficient facial image representation based on local binary pattern (LBP) texture features. The face image is divided into several regions from which the LBP feature distributions are extracted and concatenated into an enhanced feature vector to be used as a face descriptor. The performance of the proposed method is assessed in the face recognition problem under different challenges. Other applications and several extensions are also discussed

5,563 citations

Journal ArticleDOI
TL;DR: A fast fingerprint enhancement algorithm is presented, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency.
Abstract: In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy.

2,212 citations

Journal ArticleDOI
TL;DR: Experimental data are presented that clearly demonstrate the scope of application of peak signal-to-noise ratio (PSNR) as a video quality metric and it is shown that as long as the video content and the codec type are not changed, PSNR is a valid quality measure.
Abstract: Experimental data are presented that clearly demonstrate the scope of application of peak signal-to-noise ratio (PSNR) as a video quality metric. It is shown that as long as the video content and the codec type are not changed, PSNR is a valid quality measure. However, when the content is changed, correlation between subjective quality and PSNR is highly reduced. Hence PSNR cannot be a reliable method for assessing the video quality across different video contents.

1,899 citations

Journal ArticleDOI
TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Abstract: Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.

1,709 citations


"A Survey in Presentation Attack and..." refers background in this paper

  • ...The second attack category takes place within the digital processes of the system’s interior parts, to be specific, seven points of digital attacks in the general biometric system are exposed in [2]....

    [...]

Frequently Asked Questions (9)
Q1. How many frames are fixed for the thermal sensor subset?

Since L is fixed to 7 frames for the thermal sensor subset, then the corresponding dimensionality is fixed to 56 for all presentations. 

the proposed algorithm utilizes image statistics, thus, it does not require high computational cost and can be processed in real time. 

DATA BASEIn order to validate the proposed mechanism, the first scenario, i.e. ordinary dynamic presentations, from Chapter 3 is used. 

Non-cooperative attacks are often rather sophisticated because of the need for special expertise and adequate hardware/software tools, moreover, the targeted biometric modality plays an important role to determine the ease of the process. 

On the other hand, non-subversive intents are still considered as suspicious presentations, while users are behaving24normally by wearing commercial products for cosmetic purposes, facing accidents which cause problems in engaging with a system, or need more knowledge about the use of these systems. 

The same portion was used in the experiment of Chapter 4.VOLUME SEGMENTATIONTo neglect the influence of empty background on the extracted features, the authors apply 3-D segmentation to the dataset so that the features are extracted only from the part of the sensor’s surface where the presentation was applied. 

Face recognition security occupies high attention since it has been deployed in many areas such as passport check and video surveillance. 

even though the different PAI species have demonstrated different behaviors, other factors such as attacking tools and attacker’s level of81expertise must be taken into account to completely characterize the interaction over the sensor’s surface. 

In order to compare the presented algorithm with that proposed in Chapter 4, the authors apply cross-validation data partitioning to the pressure dataset then the authors train an SVM model in the same fashion presented in Chapter 4; results are shown in Figure 6.9.