SlideShare a Scribd company logo
1 of 20
Biometric Presentation Attack
Detection: Beyond the Visible
Spectrum
TAKEN FROM IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY,
VOL 15, 2020
1
CONTENT
 INTRODUCTION
 DEFINATION
 RELATED WORKS
 PRESENTATION ATTACK DETECTION METHODOLOGY: HARDWARE
 PRESENTATION ATTACK DETECTION METHODOLOGY: SOFTWARE
 EXPERIMENTAL FRAMEWORK
 EXPERIMENTAL RESULTS
 CONCLUSION
 REFERENCE
2
INTRODUCTION
Biometric recognition systems is based on the individuals’ biological
(e.g., iris or fingerprint) or behavioural (e.g., signature or voice)
characteristics.
In spite of their numerous advantages, biometric systems are
vulnerable to external attacks as any other security-related
technology. The biometric capture device is probably the most
exposed one.
One can simply present the capture device with a presentation attack
instrument (PAI), such as a gummy finger or a fingerprint overlay, in
order to interfere with its intended behaviour. These attacks are
known as presentation attacks (PAs).
3
The initial approaches to PAD were based on the so-called
handcrafted features, such as texture descriptors or motion
analysis.
However, deep learning (DL) has become a thriving topic in the
biometric recognition in general.
More specifically, convolutional neural networks (CNNs) and deep
belief networks (DBNs) have been used for fingerprint PAD
purposes.
Selected SWIR wavelengths are used to discriminate skin from
other materials.
Human skin shows characteristic remission properties for
multispectral SWIR wavelengths, which are independent of a
person’s age, gender or skin type.
4
DEFINITION
 Bona fide Presentation: A normal or genuine presentation.
 Presentation attack (PA): An attack carried out on the capture device to
either conceal your identity or impersonate someone else.
 Presentation attack instrument (PAI): biometric characteristic or object
used in a presentation attack.
 Attack Presentation Classification Error Rate (APCER): Proportion of attack
presentations using the same PAI species incorrectly classified as bona fide
presentations in a specific scenario.
 Bona fide Presentation Classification Error Rate (BPCER):Proportion of bona
fide presentations incorrectly classified as presentation attacks in a
specific scenario.
5
RELATED WORKS
Key works on fingerprint PAD for both non-conventional sensors and conventional sensors.
Non-Conventional Fingerprint Sensor
6
Deep Learning for conventional sensors
7
PRESENTATION ATTACK DETECTION METHODOLOGY:
HARDWARE
 The finger SWIR capture device
contain a camera and SWIR sensor.
 Captures 64 × 64 px images, with a
25 mm fixed focal length lens
optimised for wavelengths within
900 – 1700 nm.
 Region of interest(ROI) is extracted
from background of size 18 × 58 px
8
9
Example of bonafides
and PAs acquired by
SWIR sensors
PRESENTATION ATTACK DETECTION METHODOLOGY:
SOFTWARE
Two approaches are: i) handcrafted features
ii) deep learning features
A) Handcrafted features
This method is builds upon the raw spectral signature(ss) of the pixels
across all four wavelengths in order to capture bona fide presentation and
PAI materials.
SWIR sensor provides raw spectral signature(ss) as:
𝒔𝒔 𝒙, 𝒚 = {i1(x,y), … … … iN(x,y)}
iN(x,y) represents the intensity value of pixels for n-th wavelength.
10
 However, this original representation of the sensor is vulnerable to
illumination changes.
 Only the differences among wavelengths will be used as our set of
handcrafted features. Therefore, for each pixel, the final normalised
difference feature vector d(x, y) is computed as follows:
d(x, y) ={d [ia,ib](x, y)} 1≤a<b≤N
 For each pixel with coordinates (x,y), the normalised difference feature
vector d(x,y) is used to classify as skin vs. non-skin with a Support
Vector Machine (SVM) classifier.
11
B) Deep Learning Features
1. Training CNN Models From Scratch:
 The first approach is focused on training residual CNNs from scratch.
 The characteristics of this network is the insertion of shortcut
connections every few stacked layers, converting the plain network into
its residual version.
 The residual connections allow the use of deeper neural network
architectures and at the same time decrease their training time
significantly.
12
2. Adapting Pre-Trained CNN Models
 The second approach evaluates the potential of state-of-the-art pre-trained
models for fingerprint PAD.
 Here the classifier is replaced and retrained and the weights of the last
convolutional layers is adapted.
 MobileNet and VGG19 network architectures pre-trained using the
ImageNet database are proposed to use.
 MobileNet network is based on depthwise separable convolutions, which
factorize a standard convolution into: i) a depthwise convolution, and ii) a
1×1 convolution called pointwise convolution.
 VGG19 network is one of the most popular network architecture, providing
very good results due to its simplicity.
13
EXPERIMENTAL FRAMEWORK
A. DATABASE
 Data were collected in two different stages and comprises both bona
fide and PA samples.
 For the bona fide samples, a total of 163 subjects participated during
the first stage. For each of them, all 5 fingers of the right hand were
captured. For the second stage, there were a total of 399 subjects.
 For the PA samples, there are a total of 35 different PAI species.
14
B. EXPERIMENTAL PROTOCOL
 The main goal behind the experimental protocol design is to
analyze and prove the soundness of our proposed fingerprint PAD
approach in a realistic scenario.
 For the development of our proposed fingerprint PAD methods,
both training and validation datasets are used in order to train the
weights of the systems and select the optimal network
architectures.
15
EXPERIMENTAL RESULTS16
 Spectral signature pixel-wise approach has achieved a 12.61% D-EER.
 It is not possible to get an APCER ≤ 2%, and for APCER ≈ 5%, the BPCER is
over 20% .
 For the case of training end-to-end residual CNN models from scratch, the
best result obtained is a 2.25% D-EER. This result outperforms the
handcrafted feature approach by an 82%.
 Low APCERs below 1% can be achieved for BPCERs below 8%, thereby
overcoming the main drawback of the handcrafted feature approach.
 Three CNN approaches have been fused in two by two basis.
 That yields convenient systems (i.e., low BPCER) even for highly secure (i.e.,
very low APCER) scenarios.
 Our proposed fingerprint PAD system has achieved a final 1.35% D-EER.
Furthermore, other operating points yield a BPCER of 2% for APCER ≤ 0.5%,
and an APCER ≈ 7% for BPCER=0.1%.
17
CONCLUSION
 A fingerprint PAD scheme based on i) a new capture device able to
acquire images within the short wave infrared (SWIR) spectrum, and
ii) state-of-the-art deep learning techniques.
 The best performance was reached for the fusion of two end-to-end
CNNs: the residual CNN trained from scratch and the adapted VGG19
pre-trained model. A D-EER of 1.35% was obtained.
 These results clearly outperform those achieved with the handcrafted
features, which yielded a D-EER over 12%.
 The use of SWIR images in combination with state-of-the-art CNNs
offers a reliable and efficient solution to the threat posed by presentation
attacks.
18
Reference
 J. Kolberg, M. Gomez-Barrero, S. Venkatesh, R. Raghavendra, and C. Busch,
“Presentation attack detection for finger recognition,” in Handbook of Vascular
Biometrics, S. Marcel, A. Uhl, R. Veldhuis, and C. Busch, Eds. Springer, 2019.
 E. Park, W. Kim, Q. Li, J. Kim, and H. Kim, “Fingerprint liveness detection using
CNN features of random sample patches,” in Proc. Int. Conf. Biometrics Special
Interest Group (BIOSIG), Sep. 2016.
 R. Tolosana, M. Gomez-Barrero, J. Kolberg, A. Morales, C. Busch, and J. Ortega,
“Towards fingerprint presentation attack detection based on convolutional
neural networks and short wave infrared imaging,” in Proc. Int. Conf.
Biometrics Special Interest Group (BIOSIG), Sep. 2018.
19
THANK YOU20

More Related Content

What's hot

Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection SystemIntrader Amit
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksSaif Salah
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity RecognitionAshwinGill1
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slideSanjoy Dutta
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-pptMohankumar Ramachandran
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication techniqueViraj Rajopadhye
 
Feature selection
Feature selectionFeature selection
Feature selectionDong Guo
 

What's hot (20)

PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and Attacks
 
Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity Recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Steganography
SteganographySteganography
Steganography
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Feature selection
Feature selectionFeature selection
Feature selection
 
face recognition
face recognitionface recognition
face recognition
 
Fingerprint
FingerprintFingerprint
Fingerprint
 

Similar to Biometric presentation attack detection

Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkShamika Ganesan
 
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET Journal
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfWhitney Anderson
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection TechniquesIRJET Journal
 
Presentation MINI.pptx djreheukuyegyejej
Presentation MINI.pptx djreheukuyegyejejPresentation MINI.pptx djreheukuyegyejej
Presentation MINI.pptx djreheukuyegyejejpadamsravan8
 
Pipeline anomaly detection
Pipeline anomaly detectionPipeline anomaly detection
Pipeline anomaly detectionGauravBiswas9
 
Covid Detection Using Lung X-ray Images
Covid Detection Using Lung X-ray ImagesCovid Detection Using Lung X-ray Images
Covid Detection Using Lung X-ray ImagesIRJET Journal
 
A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...IAESIJAI
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKijaia
 
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOTCROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOTIRJET Journal
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...aciijournal
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)aciijournal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
 
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...TELKOMNIKA JOURNAL
 
Covid-19 Detection Using CNN MODEL
Covid-19 Detection Using CNN MODELCovid-19 Detection Using CNN MODEL
Covid-19 Detection Using CNN MODELIRJET Journal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
 
IRJET - Identification of Malarial Parasites using Deep Learning
IRJET -  	  Identification of Malarial Parasites using Deep LearningIRJET -  	  Identification of Malarial Parasites using Deep Learning
IRJET - Identification of Malarial Parasites using Deep LearningIRJET Journal
 

Similar to Biometric presentation attack detection (20)

Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
 
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
 
Presentation MINI.pptx djreheukuyegyejej
Presentation MINI.pptx djreheukuyegyejejPresentation MINI.pptx djreheukuyegyejej
Presentation MINI.pptx djreheukuyegyejej
 
x-RAYS PROJECT
x-RAYS PROJECTx-RAYS PROJECT
x-RAYS PROJECT
 
Pipeline anomaly detection
Pipeline anomaly detectionPipeline anomaly detection
Pipeline anomaly detection
 
Covid Detection Using Lung X-ray Images
Covid Detection Using Lung X-ray ImagesCovid Detection Using Lung X-ray Images
Covid Detection Using Lung X-ray Images
 
A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
 
Af03401810185..
Af03401810185..Af03401810185..
Af03401810185..
 
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOTCROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
 
Covid-19 Detection Using CNN MODEL
Covid-19 Detection Using CNN MODELCovid-19 Detection Using CNN MODEL
Covid-19 Detection Using CNN MODEL
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
IRJET - Identification of Malarial Parasites using Deep Learning
IRJET -  	  Identification of Malarial Parasites using Deep LearningIRJET -  	  Identification of Malarial Parasites using Deep Learning
IRJET - Identification of Malarial Parasites using Deep Learning
 
D0521522
D0521522D0521522
D0521522
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Biometric presentation attack detection

  • 1. Biometric Presentation Attack Detection: Beyond the Visible Spectrum TAKEN FROM IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 15, 2020 1
  • 2. CONTENT  INTRODUCTION  DEFINATION  RELATED WORKS  PRESENTATION ATTACK DETECTION METHODOLOGY: HARDWARE  PRESENTATION ATTACK DETECTION METHODOLOGY: SOFTWARE  EXPERIMENTAL FRAMEWORK  EXPERIMENTAL RESULTS  CONCLUSION  REFERENCE 2
  • 3. INTRODUCTION Biometric recognition systems is based on the individuals’ biological (e.g., iris or fingerprint) or behavioural (e.g., signature or voice) characteristics. In spite of their numerous advantages, biometric systems are vulnerable to external attacks as any other security-related technology. The biometric capture device is probably the most exposed one. One can simply present the capture device with a presentation attack instrument (PAI), such as a gummy finger or a fingerprint overlay, in order to interfere with its intended behaviour. These attacks are known as presentation attacks (PAs). 3
  • 4. The initial approaches to PAD were based on the so-called handcrafted features, such as texture descriptors or motion analysis. However, deep learning (DL) has become a thriving topic in the biometric recognition in general. More specifically, convolutional neural networks (CNNs) and deep belief networks (DBNs) have been used for fingerprint PAD purposes. Selected SWIR wavelengths are used to discriminate skin from other materials. Human skin shows characteristic remission properties for multispectral SWIR wavelengths, which are independent of a person’s age, gender or skin type. 4
  • 5. DEFINITION  Bona fide Presentation: A normal or genuine presentation.  Presentation attack (PA): An attack carried out on the capture device to either conceal your identity or impersonate someone else.  Presentation attack instrument (PAI): biometric characteristic or object used in a presentation attack.  Attack Presentation Classification Error Rate (APCER): Proportion of attack presentations using the same PAI species incorrectly classified as bona fide presentations in a specific scenario.  Bona fide Presentation Classification Error Rate (BPCER):Proportion of bona fide presentations incorrectly classified as presentation attacks in a specific scenario. 5
  • 6. RELATED WORKS Key works on fingerprint PAD for both non-conventional sensors and conventional sensors. Non-Conventional Fingerprint Sensor 6
  • 7. Deep Learning for conventional sensors 7
  • 8. PRESENTATION ATTACK DETECTION METHODOLOGY: HARDWARE  The finger SWIR capture device contain a camera and SWIR sensor.  Captures 64 × 64 px images, with a 25 mm fixed focal length lens optimised for wavelengths within 900 – 1700 nm.  Region of interest(ROI) is extracted from background of size 18 × 58 px 8
  • 9. 9 Example of bonafides and PAs acquired by SWIR sensors
  • 10. PRESENTATION ATTACK DETECTION METHODOLOGY: SOFTWARE Two approaches are: i) handcrafted features ii) deep learning features A) Handcrafted features This method is builds upon the raw spectral signature(ss) of the pixels across all four wavelengths in order to capture bona fide presentation and PAI materials. SWIR sensor provides raw spectral signature(ss) as: 𝒔𝒔 𝒙, 𝒚 = {i1(x,y), … … … iN(x,y)} iN(x,y) represents the intensity value of pixels for n-th wavelength. 10
  • 11.  However, this original representation of the sensor is vulnerable to illumination changes.  Only the differences among wavelengths will be used as our set of handcrafted features. Therefore, for each pixel, the final normalised difference feature vector d(x, y) is computed as follows: d(x, y) ={d [ia,ib](x, y)} 1≤a<b≤N  For each pixel with coordinates (x,y), the normalised difference feature vector d(x,y) is used to classify as skin vs. non-skin with a Support Vector Machine (SVM) classifier. 11
  • 12. B) Deep Learning Features 1. Training CNN Models From Scratch:  The first approach is focused on training residual CNNs from scratch.  The characteristics of this network is the insertion of shortcut connections every few stacked layers, converting the plain network into its residual version.  The residual connections allow the use of deeper neural network architectures and at the same time decrease their training time significantly. 12
  • 13. 2. Adapting Pre-Trained CNN Models  The second approach evaluates the potential of state-of-the-art pre-trained models for fingerprint PAD.  Here the classifier is replaced and retrained and the weights of the last convolutional layers is adapted.  MobileNet and VGG19 network architectures pre-trained using the ImageNet database are proposed to use.  MobileNet network is based on depthwise separable convolutions, which factorize a standard convolution into: i) a depthwise convolution, and ii) a 1×1 convolution called pointwise convolution.  VGG19 network is one of the most popular network architecture, providing very good results due to its simplicity. 13
  • 14. EXPERIMENTAL FRAMEWORK A. DATABASE  Data were collected in two different stages and comprises both bona fide and PA samples.  For the bona fide samples, a total of 163 subjects participated during the first stage. For each of them, all 5 fingers of the right hand were captured. For the second stage, there were a total of 399 subjects.  For the PA samples, there are a total of 35 different PAI species. 14
  • 15. B. EXPERIMENTAL PROTOCOL  The main goal behind the experimental protocol design is to analyze and prove the soundness of our proposed fingerprint PAD approach in a realistic scenario.  For the development of our proposed fingerprint PAD methods, both training and validation datasets are used in order to train the weights of the systems and select the optimal network architectures. 15
  • 17.  Spectral signature pixel-wise approach has achieved a 12.61% D-EER.  It is not possible to get an APCER ≤ 2%, and for APCER ≈ 5%, the BPCER is over 20% .  For the case of training end-to-end residual CNN models from scratch, the best result obtained is a 2.25% D-EER. This result outperforms the handcrafted feature approach by an 82%.  Low APCERs below 1% can be achieved for BPCERs below 8%, thereby overcoming the main drawback of the handcrafted feature approach.  Three CNN approaches have been fused in two by two basis.  That yields convenient systems (i.e., low BPCER) even for highly secure (i.e., very low APCER) scenarios.  Our proposed fingerprint PAD system has achieved a final 1.35% D-EER. Furthermore, other operating points yield a BPCER of 2% for APCER ≤ 0.5%, and an APCER ≈ 7% for BPCER=0.1%. 17
  • 18. CONCLUSION  A fingerprint PAD scheme based on i) a new capture device able to acquire images within the short wave infrared (SWIR) spectrum, and ii) state-of-the-art deep learning techniques.  The best performance was reached for the fusion of two end-to-end CNNs: the residual CNN trained from scratch and the adapted VGG19 pre-trained model. A D-EER of 1.35% was obtained.  These results clearly outperform those achieved with the handcrafted features, which yielded a D-EER over 12%.  The use of SWIR images in combination with state-of-the-art CNNs offers a reliable and efficient solution to the threat posed by presentation attacks. 18
  • 19. Reference  J. Kolberg, M. Gomez-Barrero, S. Venkatesh, R. Raghavendra, and C. Busch, “Presentation attack detection for finger recognition,” in Handbook of Vascular Biometrics, S. Marcel, A. Uhl, R. Veldhuis, and C. Busch, Eds. Springer, 2019.  E. Park, W. Kim, Q. Li, J. Kim, and H. Kim, “Fingerprint liveness detection using CNN features of random sample patches,” in Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG), Sep. 2016.  R. Tolosana, M. Gomez-Barrero, J. Kolberg, A. Morales, C. Busch, and J. Ortega, “Towards fingerprint presentation attack detection based on convolutional neural networks and short wave infrared imaging,” in Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG), Sep. 2018. 19

Editor's Notes

  1. no need to carry tokens or memorise passwords
  2. The "handcrafted features" were commonly used with "traditional" machine learning approaches for object recognition and computer vision like Support Vector Machines. understanding of how an object moves within an environment.
  3. 1.Not many details about the acquired database or the experimental protocol are available. 2. the spectroscopic properties of living against the cadaver fingers were analyzed using four wavelengths. However, no PAIs were analysed in their work. 3. Finger vein image over same database was analyzed with help of gaussian pyramid and LBP.
  4. 1.CNN optimization was used , best accuracy was achieved 2. 2 Pre trained CNN cafenet and googlenet, performance was compared with Siamese ntw. ROI: Different approach to optimize CNN model, output were classified by SVM, no data agumantation required Patch: deep boltzman machine which learn more complex samples. Instead of using deep n/ws 10 different handcrafted descriptors were used, which were fed to self developed deep ntw for final fusion.
  5. Hamamatsu G11097-0606S InGaAs area image sensor, 4 wavelength 1200nm ,1300nm 1450nm,1550nm Fingerprint verification can be done with 1.3 MP camera and VIS NIS lens.
  6. 4 wavelength sample acquired from 2 bonafide and 3 PAIs Playdoh finger show some similarities wrt BP which makes PAD task harder. Change are different making it easier to discriminate from BP
  7. each individual score si generated by the individual PAD algorithms
  8. Due to having the finger slot open to outer world
  9. These ntw have outperformed the traditional ntw in many different datasets such as ImageNet for both image classification and object detection. Batch normalization is applied r8 after each convolution
  10. first layers of the CNN extract more general features related to directional edges and colours, whereas the last layers of the network are in charge of extracting more abstract features related to the specific task
  11. People from different gender, ethinicity,and age were considerd PAI species were categorized into 8 groups.
  12. 1.for APCER ≤ 0.5%, the corresponding BPCER values for the fused systems (solid lines) are significantly lower than those of the individual networks (dashed lines): close to 2% 2.for low BPCER ≤1%, the best APCER (≤10%) is achieved for either the residual CNN alone (dashed orange) or its fusion with the VGG19 (solid dark blue).