Fingerphoto spoofing in mobile devices: A preliminary study
TL;DR: This research is aimed at understanding the effect of spoofing on fingerphoto spoofing, and creating a large spoofed fingerphoto database and making it publicly available for research.
Abstract: Biometric-based authentication for smart handheld devices promises to provide a reliable and alternate security mechanism compared to traditional methods such as pins, patterns, and passwords. Although fingerprints are a viable source for authentication, they generally require installation of an additional hardware such as optical and swipe sensors on mobile devices, and are only available in expensive, high-end smartphones. Alternatively, fingerphoto images captured using the smartphone camera for authentication is one of the promising biometric approaches. However, using fingerphotos for authentication brings along a major challenge of fingerphoto spoofing. This research is aimed at understanding the effect of spoofing on fingerphotos. There are three major contributions of this research: (i) create a large spoofed fingerphoto database and make it publicly available for research, (ii) to establish the effect of print attack and photo attack in fingerphoto spoofing, and (iii) understand the performance of existing spoofing detection algorithms on fingerphoto spoofing.
...read more
Citations
41 citations
9 citations
7 citations
Cites background from "Fingerphoto spoofing in mobile devi..."
...However, the attacks at the sensor-level, also known as presentation attacks, can be carried out successfully with utmost ease, as shown for several biometric modalities including face [4], iris [5] and fingerprint [6]....
[...]
7 citations
Cites background from "Fingerphoto spoofing in mobile devi..."
...[12] have explored the fingerprint anti-spoofing techniques for smartphone based authentication....
[...]
7 citations
References
[...]
58,232 citations
"Fingerphoto spoofing in mobile devi..." refers methods in this paper
...Three different matching approaches are adopted: (i) L2 distance based matching, (ii) Neural Network (NN), and (iii) Random Decision Forest (RDF) [6]....
[...]
...We see that the photo attack with iPad-Nokia has the least TAR for ScatNet+NN and ScatNet+RDF matching algorithms, and it is in accordance with Table 3 which provides the highest EER for iPad-Nokia....
[...]
...ScatNet + RDF yields the best results for both spoofed and nonspoofed images; the EERs are in the range of 0.48% to 2.53%....
[...]
37,868 citations
"Fingerphoto spoofing in mobile devi..." refers methods in this paper
...In general, those images that are not correctly matched with the matching algorithm are easily distinguished as spoof images by the SVM classifier, which is in accordance with the basic understanding of the problem....
[...]
...Hence, spoof detection is formulated as a binary classification problem using an SVM [7] to learn these texture patterns from a spoofed image....
[...]
...To study the behavior of high definition display devices such as retina display, gradient based DSIFT [10] features and LUCID descriptor [17] are also independently used to learn an SVM. LUCID descriptors are recently found to provide successful performance in the domain of mobile biometric liveness detection [5]....
[...]
...While using the complete test set, LBP + SVM gives the best spoofed fingerphoto detection performance with 3.71% EER when the complete spoofed dataset is considered....
[...]
...We evaluate the performance of different features such as Local Binary Patterns (LBP), Dense Scale Invariant Feature Transform (DSIFT), and Locally Uniform Comparison Image Descriptor (LUCID) features along with Support Vector Machine (SVM) based fingerphoto spoofing detection algorithm to distinguish between spoofed and non-spoofed images....
[...]
15,597 citations
"Fingerphoto spoofing in mobile devi..." refers methods in this paper
...To study the behavior of high definition display devices such as retina display, gradient based DSIFT [10] features and LUCID descriptor [17] are also independently used to learn an SVM. LUCID descriptors are recently found to provide successful performance in the domain of mobile biometric liveness detection [5]....
[...]
...To study the behavior of high definition display devices such as retina display, gradient based DSIFT [10] features and LUCID descriptor [17] are also independently used to learn an SVM....
[...]
...We evaluate the performance of different features such as Local Binary Patterns (LBP), Dense Scale Invariant Feature Transform (DSIFT), and Locally Uniform Comparison Image Descriptor (LUCID) features along with Support Vector Machine (SVM) based fingerphoto spoofing detection algorithm to distinguish between spoofed and non-spoofed images....
[...]
...The results using both LBP, DSIFT, and LUCID descriptors are presented in Table 5 and Table 6 and the ROC curves are shown in Figure 5....
[...]
...Further, we evaluated different features such as LBP, DSIFT, and LUCID combined with a learning algorithm to classify spoofed and original images....
[...]
5,237 citations
"Fingerphoto spoofing in mobile devi..." refers methods in this paper
...The texture patterns are extracted using LBP features [3, 8, 11]....
[...]
530 citations
"Fingerphoto spoofing in mobile devi..." refers methods in this paper
...The texture patterns are extracted using LBP features [3, 8, 11]....
[...]