scispace - formally typeset
Journal ArticleDOI

Fingerprint Spoof Buster: Use of Minutiae-Centered Patches

Reads0
Chats0
TLDR
A deep convolutional neural network-based approach utilizing local patches centered and aligned using fingerprint minutiae provides the state-of-the-art accuracies in fingerprint spoof detection for intra-sensor, cross-material,cross-s sensor, as well as cross-dataset testing scenarios.
Abstract
The primary purpose of a fingerprint recognition system is to ensure a reliable and accurate user authentication, but the security of the recognition system itself can be jeopardized by spoof attacks. This paper addresses the problem of developing accurate, generalizable, and efficient algorithms for detecting fingerprint spoof attacks. Specifically, we propose a deep convolutional neural network-based approach utilizing local patches centered and aligned using fingerprint minutiae. Experimental results on three public-domain LivDet datasets (2011, 2013, and 2015) show that the proposed approach provides the state-of-the-art accuracies in fingerprint spoof detection for intra-sensor, cross-material, cross-sensor, as well as cross-dataset testing scenarios. For example, in LivDet 2015, the proposed approach achieves 99.03% average accuracy over all sensors compared with 95.51% achieved by the LivDet 2015 competition winners. In addition, two new fingerprint presentation attack datasets containing more than 20,000 images, using two different fingerprint readers, and over 12 different spoof fabrication materials are collected. We also present a graphical user interface, called Fingerprint Spoof Buster, that allows the operator to visually examine the local regions of the fingerprint highlighted as live or spoof, instead of relying on only a single score as output by the traditional approaches.

read more

Citations
More filters
Journal ArticleDOI

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

TL;DR: A systematic and comprehensive overview of the main threats of attacks and the success of corresponding countermeasures against adversarial examples, for three most popular data types, including images, graphs and text is reviewed.
Posted Content

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

TL;DR: In this article, the authors provide a comprehensive overview of the main threats of attacks and the success of corresponding countermeasures against adversarial examples, for the three popular data types, i.e., images, graphs and text.
Journal ArticleDOI

A comprehensive overview of biometric fusion

TL;DR: A comprehensive review of techniques incorporating ancillary information in the biometric recognition pipeline is presented in this paper, where the authors provide a comprehensive overview of the role of information fusion in biometrics.
Journal ArticleDOI

Slim-ResCNN: A Deep Residual Convolutional Neural Network for Fingerprint Liveness Detection

TL;DR: The proposed framework is a lightweight yet powerful network structure, called Slim-ResCNN, which consists of the stack of series of improved residual blocks, specifically designed for fingerprint liveness detection without overfitting and less processing time.
Journal ArticleDOI

A-Stacking and A-Bagging: Adaptive versions of ensemble learning algorithms for spoof fingerprint detection

TL;DR: This work proposes A-Stacking and A-Bagging; adaptive versions of stacking and bagging respectively that take into consideration the similarity inherently present in the dataset.
References
More filters
Proceedings Article

ImageNet Classification with Deep Convolutional Neural Networks

TL;DR: The state-of-the-art performance of CNNs was achieved by Deep Convolutional Neural Networks (DCNNs) as discussed by the authors, which consists of five convolutional layers, some of which are followed by max-pooling layers, and three fully-connected layers with a final 1000-way softmax.
Proceedings Article

Very Deep Convolutional Networks for Large-Scale Image Recognition

TL;DR: This work investigates the effect of the convolutional network depth on its accuracy in the large-scale image recognition setting using an architecture with very small convolution filters, which shows that a significant improvement on the prior-art configurations can be achieved by pushing the depth to 16-19 weight layers.
Proceedings Article

Very Deep Convolutional Networks for Large-Scale Image Recognition

TL;DR: In this paper, the authors investigated the effect of the convolutional network depth on its accuracy in the large-scale image recognition setting and showed that a significant improvement on the prior-art configurations can be achieved by pushing the depth to 16-19 layers.
Journal ArticleDOI

ImageNet Large Scale Visual Recognition Challenge

TL;DR: The ImageNet Large Scale Visual Recognition Challenge (ILSVRC) as mentioned in this paper is a benchmark in object category classification and detection on hundreds of object categories and millions of images, which has been run annually from 2010 to present, attracting participation from more than fifty institutions.
Proceedings ArticleDOI

Rethinking the Inception Architecture for Computer Vision

TL;DR: In this article, the authors explore ways to scale up networks in ways that aim at utilizing the added computation as efficiently as possible by suitably factorized convolutions and aggressive regularization.
Related Papers (5)