SlideShare a Scribd company logo
1 of 26
A Bayesian Approach for Modeling Sensor
Influence on Quality, Liveness and Match Score
Values in Fingerprint Verification

Ajita Rattani1, Norman Poh2 and Arun Ross1
1

Dept. of Computer Science and Eng., Michigan State University, USA
http://www.cse.msu.edu/~rossarun/i-probe/
2
Dept. of Computing, University of Surrey, UK
Abstract
• Recently a number of studies in fingerprint verification have
combined match scores with quality and liveness measure in order
to thwart spoof attacks.
• However, these approaches do not explicitly account for the
influence of the sensor on these variables.
• In this work, we propose a graphical model that account for the
impact of the sensor on match scores, quality and liveness measures.
• Effectiveness of the proposed model has been assessed on the
LivDet 2011 fingerprint database using Biometrika and Italdata
sensors.
Outline
•
•
•
•
•
•

Fingerprint Spoof Attacks
Fingerprint Liveness Detectors
Problem Statement and Contributions
Proposed Graphical Model
Experimental Validations
Conclusions

3
Spoof Attacks
• A spoofing attack occurs when an adversary replicate the
biometric trait of another individual in order to circumvent
the system.
• These attacks pose the most severe threat to biometric
systems as
– they can be easily performed using simple techniques
and commonly available materials and,
– do not require any knowledge of internal functioning
of the system.

4
Contd..,

A forger counterfeits a biometric sample of a given user to gain unauthorized access.
5
Fingerprints and Spoof Attacks
•

Studies have shown that fake fingerprints can be easily fabricated using
commonly available materials like silicone, latex etc., [Matsumoto et al.,
2002, Yambay et al., 2012].

•

Fingerprint liveness detection algorithms have been proposed as a countermeasure against spoof attacks.

Matsumoto et al., Impact of artificial gummy fingers on fingerprint systems, Opt. Sec.
Counterfait Deterrence Techniq. IV 4677, 275-289.
Yambay et al., Livdet2011 – fingerprint liveness detection competition, ICB, 2012
6
Fake Fingerprint Fabrication Process
Silicone
Latex
Ecoflex

7
Fingerprint Liveness Detectors
• They aim to discriminate live biometric samples from the
spoofed (fake) artefact.
• The algorithms for fingerprint liveness detection examine the
textural, anatomical and/or physiological attributes of the
finger.
• The output of these liveness detection algorithms is a singlevalued numerical entity referred to as liveness measure.

8
Latex

Silgum

Gelatin

Live //
Live
Fake
Fake
EcoFlex

Live

An example training based fingerprint liveness detector
9
Liveness Detector and Biometric System
• Liveness detection algorithms are not designed to
operate in isolation; rather, they have to be
integrated with the overall fingerprint recognition
system.
• Accordingly, recent studies have combined match
scores generated by a fingerprint matcher with
liveness values, as well as image quality, in order
to render a decision on the recognition process.
State of the Art
Reference

Variables
combined

Scheme

Database

Marasco et
al., BTAS,
2012

fingerprint
match scores +
liveness values

Bayesian
Belief Network

LivDet 2009

Chingovska
et al.,
CVPRW,
2013

face match
scores +
liveness values

Logistic
Regression

Replay attack,
2011

Rattani et al.,
ICB, 2013

fingerprint
match scores +
quality +
liveness values

Density-based
fusion
framework

LivDet 2011
Problem Statement
• However, in the aforementioned schemes, the influence of
the sensor on the 3 variables - match scores, liveness
values and quality has not been considered.
• Such a consideration is essential for several reasons:
(a) the quality of an image is impacted by the sensor used;
(b) most liveness measures are training-based and are
impacted by the sensor that was used to collect live and spoof
data;
(c) understanding sensor influence, can help in facilitating
sensor interoperability for fingerprint matchers and liveness
detectors.
Contributions
• Development of a graphical model for fusing match
scores, liveness measures and quality values while
accounting for sensor influence;
• Implementation of the proposed model using a Gaussian
Mixture Model (GMM) based Bayesian classifier;
• Evaluation of the proposed model using fingerprint data
from two different sensors in the LivDet 2011 fingerprint
database.
Notations
• y = match score between pair of fingerprint
images.
• q = quality of a fingerprint image
• l = liveness measure of a fingerprint image
• k = class label i.e., {C, I, S}
• d = fingerprint acquisition sensor
Graphical Model

Conditional
Probabilities
•

k
y
a) Model A
(conventional classifier)

k

•

l
y

q

b) Model B
(Rattani et al., ICB, 2013)

Bayesian Classifier
Contd..,
k

•

d
y

l

•

q

c) Proposed Model C

Conjectures:
1. Match scores, quality and liveness measures are sensor dependent
(d
{y, q, l})
2. Further their exist no significant correlation between quality (q) and liveness
measures (l).
Experimental Validations
•
•
•
•
•

Dataset: LivDet 20111
Liveness measure: LBP + SVM2
Quality: IQF freeware developed by MITRE3
Match Scores: NIST Bozorth3 matcher4
Performance metrics :
– OFAR : Overall False Acceptance Rate
– GAR: Genuine Acceptance Rate
– O-EER : Overall Equal Error Rate

Yambay et al., Livdet2011 - fingerprint liveness detection competition, ICB, 2012
2
Nikam and Aggarwal, Local binary pattern and wavelet-based spoof fingerprint detection,
IJB, 2008
3
http://www.mitre.org/tech/mtf/
4
http://www.nist.gov/itl/iad/ig/nbis.cfm
1
1. Performance Evaluation of Model B under
Cross-sensor Evaluation

k

l
y

q
2. Validation of the Conjectures for Model C

0.1

Genuine-Biometrika
Spoof-Biometrika
Impostor- Biometrika
Genuine- Italdata
Spoof- Italdata
Impostor- Italdata

0.09
0.08

80

70

0.06

Quality

Likelihood

0.07

0.05
0.04
0.03

60

50

40

0.02

30

0.01
0

0

50

100

150

Scores

200

250

300

20
Biometrika

Sensors

Italdata

Match scores and quality measures are sensor dependent
Contd..,
4.5
4

Biometrika
Italdata

3.5

Likelihood

3
2.5
2
1.5
1
0.5
0
0

0.2

0.4

0.6

Liveness measure

0.8

Liveness measures are sensor
dependent

1

No significant correlation exist between
quality and liveness measure ( =0.25)
3. Assessment of Model C in a Multi-sensor
Environment
Conclusions
• Recent studies have addressed the security of
fingerprint verification system by combining
match scores with quality and liveness measure.
• We advance the state of the art by modeling
sensor influence on them.
• This is realized through a graphical model that
account for the impact of sensor on liveness,
quality and match score values
Contd..,
• Experimental investigations on the LivDet11 fingerprint
database indicate that
– Existing training-based fusion framework cannot
operate effectively in a multi-sensor scenario
– The proposed graphical model can effectively operate
in a multi-sensor environment
• The effectiveness of the proposed model can be further
enhanced by improving the sensitivity of the underlying
liveness detector
Thank you

More Related Content

What's hot

Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithmijcisjournal
 
Sign Language Recognition
Sign Language RecognitionSign Language Recognition
Sign Language RecognitionJamal Khan
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint ijasuc
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...idescitation
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET Journal
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsIRJET Journal
 
Occlusion and Abandoned Object Detection for Surveillance Applications
Occlusion and Abandoned Object Detection for Surveillance ApplicationsOcclusion and Abandoned Object Detection for Surveillance Applications
Occlusion and Abandoned Object Detection for Surveillance ApplicationsEditor IJCATR
 
A Fuzzy Logic Intelligent Agent for Information Extraction
A Fuzzy Logic Intelligent Agent for Information ExtractionA Fuzzy Logic Intelligent Agent for Information Extraction
A Fuzzy Logic Intelligent Agent for Information ExtractionTarekMourad8
 
Object Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet TransformObject Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet TransformIJCOAiir
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionKinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionIJCSIS Research Publications
 
Facial Image Analysis for age and gender and
Facial Image Analysis for age and gender andFacial Image Analysis for age and gender and
Facial Image Analysis for age and gender andYuheng Wang
 
Video object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsVideo object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsManish Khare
 

What's hot (19)

Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
 
Sign Language Recognition
Sign Language RecognitionSign Language Recognition
Sign Language Recognition
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
Occlusion and Abandoned Object Detection for Surveillance Applications
Occlusion and Abandoned Object Detection for Surveillance ApplicationsOcclusion and Abandoned Object Detection for Surveillance Applications
Occlusion and Abandoned Object Detection for Surveillance Applications
 
A Fuzzy Logic Intelligent Agent for Information Extraction
A Fuzzy Logic Intelligent Agent for Information ExtractionA Fuzzy Logic Intelligent Agent for Information Extraction
A Fuzzy Logic Intelligent Agent for Information Extraction
 
Object Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet TransformObject Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet Transform
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Object tracking
Object trackingObject tracking
Object tracking
 
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionKinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
 
Facial Image Analysis for age and gender and
Facial Image Analysis for age and gender andFacial Image Analysis for age and gender and
Facial Image Analysis for age and gender and
 
Video object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsVideo object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objects
 
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
 

Viewers also liked

The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognitionderektop
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýSecurity Session
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
final year embedded system projects in chennai
final year embedded system projects in chennai final year embedded system projects in chennai
final year embedded system projects in chennai Ashok Kumar.k
 
Lecture 10 ming yang - face recognition systems
Lecture 10   ming yang - face recognition systemsLecture 10   ming yang - face recognition systems
Lecture 10 ming yang - face recognition systemsmustafa sarac
 
Final year ece projects in bangalore
Final year ece projects in bangaloreFinal year ece projects in bangalore
Final year ece projects in bangaloreRSentur1959
 
THE GREAT STONE FACE 1 AND 2
THE GREAT STONE FACE 1 AND 2THE GREAT STONE FACE 1 AND 2
THE GREAT STONE FACE 1 AND 2Zoha Hussain
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognitionCharu Joshi
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 

Viewers also liked (18)

The Case for Voice + Face Recognition
The Case for Voice + Face RecognitionThe Case for Voice + Face Recognition
The Case for Voice + Face Recognition
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
final year embedded system projects in chennai
final year embedded system projects in chennai final year embedded system projects in chennai
final year embedded system projects in chennai
 
Lecture 10 ming yang - face recognition systems
Lecture 10   ming yang - face recognition systemsLecture 10   ming yang - face recognition systems
Lecture 10 ming yang - face recognition systems
 
Final year ece projects in bangalore
Final year ece projects in bangaloreFinal year ece projects in bangalore
Final year ece projects in bangalore
 
The great-stone-face
The great-stone-faceThe great-stone-face
The great-stone-face
 
THE GREAT STONE FACE 1 AND 2
THE GREAT STONE FACE 1 AND 2THE GREAT STONE FACE 1 AND 2
THE GREAT STONE FACE 1 AND 2
 
4g stratellite
4g stratellite4g stratellite
4g stratellite
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face recognition
face recognitionface recognition
face recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Week6 face detection
Week6 face detectionWeek6 face detection
Week6 face detection
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Match Score Values in Fingerprint Verification

Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...International Center for Biometric Research
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysisvivatechijri
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET Journal
 
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...IDES Editor
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...IOSR Journals
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 

Similar to A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Match Score Values in Fingerprint Verification (20)

Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
finger prints
finger printsfinger prints
finger prints
 
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...(2008) Statistical Analysis Framework for Biometric System Interoperability T...
(2008) Statistical Analysis Framework for Biometric System Interoperability T...
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
K0167683
K0167683K0167683
K0167683
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
 
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
 
A04820104
A04820104A04820104
A04820104
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
 
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
 
Overview of the Biometrics Lab at Purdue
Overview of the Biometrics Lab at PurdueOverview of the Biometrics Lab at Purdue
Overview of the Biometrics Lab at Purdue
 
A05610109
A05610109A05610109
A05610109
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Match Score Values in Fingerprint Verification

  • 1. A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Match Score Values in Fingerprint Verification Ajita Rattani1, Norman Poh2 and Arun Ross1 1 Dept. of Computer Science and Eng., Michigan State University, USA http://www.cse.msu.edu/~rossarun/i-probe/ 2 Dept. of Computing, University of Surrey, UK
  • 2. Abstract • Recently a number of studies in fingerprint verification have combined match scores with quality and liveness measure in order to thwart spoof attacks. • However, these approaches do not explicitly account for the influence of the sensor on these variables. • In this work, we propose a graphical model that account for the impact of the sensor on match scores, quality and liveness measures. • Effectiveness of the proposed model has been assessed on the LivDet 2011 fingerprint database using Biometrika and Italdata sensors.
  • 3. Outline • • • • • • Fingerprint Spoof Attacks Fingerprint Liveness Detectors Problem Statement and Contributions Proposed Graphical Model Experimental Validations Conclusions 3
  • 4. Spoof Attacks • A spoofing attack occurs when an adversary replicate the biometric trait of another individual in order to circumvent the system. • These attacks pose the most severe threat to biometric systems as – they can be easily performed using simple techniques and commonly available materials and, – do not require any knowledge of internal functioning of the system. 4
  • 5. Contd.., A forger counterfeits a biometric sample of a given user to gain unauthorized access. 5
  • 6. Fingerprints and Spoof Attacks • Studies have shown that fake fingerprints can be easily fabricated using commonly available materials like silicone, latex etc., [Matsumoto et al., 2002, Yambay et al., 2012]. • Fingerprint liveness detection algorithms have been proposed as a countermeasure against spoof attacks. Matsumoto et al., Impact of artificial gummy fingers on fingerprint systems, Opt. Sec. Counterfait Deterrence Techniq. IV 4677, 275-289. Yambay et al., Livdet2011 – fingerprint liveness detection competition, ICB, 2012 6
  • 7. Fake Fingerprint Fabrication Process Silicone Latex Ecoflex 7
  • 8. Fingerprint Liveness Detectors • They aim to discriminate live biometric samples from the spoofed (fake) artefact. • The algorithms for fingerprint liveness detection examine the textural, anatomical and/or physiological attributes of the finger. • The output of these liveness detection algorithms is a singlevalued numerical entity referred to as liveness measure. 8
  • 9. Latex Silgum Gelatin Live // Live Fake Fake EcoFlex Live An example training based fingerprint liveness detector 9
  • 10. Liveness Detector and Biometric System • Liveness detection algorithms are not designed to operate in isolation; rather, they have to be integrated with the overall fingerprint recognition system. • Accordingly, recent studies have combined match scores generated by a fingerprint matcher with liveness values, as well as image quality, in order to render a decision on the recognition process.
  • 11. State of the Art Reference Variables combined Scheme Database Marasco et al., BTAS, 2012 fingerprint match scores + liveness values Bayesian Belief Network LivDet 2009 Chingovska et al., CVPRW, 2013 face match scores + liveness values Logistic Regression Replay attack, 2011 Rattani et al., ICB, 2013 fingerprint match scores + quality + liveness values Density-based fusion framework LivDet 2011
  • 12. Problem Statement • However, in the aforementioned schemes, the influence of the sensor on the 3 variables - match scores, liveness values and quality has not been considered. • Such a consideration is essential for several reasons: (a) the quality of an image is impacted by the sensor used; (b) most liveness measures are training-based and are impacted by the sensor that was used to collect live and spoof data; (c) understanding sensor influence, can help in facilitating sensor interoperability for fingerprint matchers and liveness detectors.
  • 13.
  • 14. Contributions • Development of a graphical model for fusing match scores, liveness measures and quality values while accounting for sensor influence; • Implementation of the proposed model using a Gaussian Mixture Model (GMM) based Bayesian classifier; • Evaluation of the proposed model using fingerprint data from two different sensors in the LivDet 2011 fingerprint database.
  • 15. Notations • y = match score between pair of fingerprint images. • q = quality of a fingerprint image • l = liveness measure of a fingerprint image • k = class label i.e., {C, I, S} • d = fingerprint acquisition sensor
  • 16. Graphical Model Conditional Probabilities • k y a) Model A (conventional classifier) k • l y q b) Model B (Rattani et al., ICB, 2013) Bayesian Classifier
  • 17. Contd.., k • d y l • q c) Proposed Model C Conjectures: 1. Match scores, quality and liveness measures are sensor dependent (d {y, q, l}) 2. Further their exist no significant correlation between quality (q) and liveness measures (l).
  • 18. Experimental Validations • • • • • Dataset: LivDet 20111 Liveness measure: LBP + SVM2 Quality: IQF freeware developed by MITRE3 Match Scores: NIST Bozorth3 matcher4 Performance metrics : – OFAR : Overall False Acceptance Rate – GAR: Genuine Acceptance Rate – O-EER : Overall Equal Error Rate Yambay et al., Livdet2011 - fingerprint liveness detection competition, ICB, 2012 2 Nikam and Aggarwal, Local binary pattern and wavelet-based spoof fingerprint detection, IJB, 2008 3 http://www.mitre.org/tech/mtf/ 4 http://www.nist.gov/itl/iad/ig/nbis.cfm 1
  • 19. 1. Performance Evaluation of Model B under Cross-sensor Evaluation k l y q
  • 20.
  • 21. 2. Validation of the Conjectures for Model C 0.1 Genuine-Biometrika Spoof-Biometrika Impostor- Biometrika Genuine- Italdata Spoof- Italdata Impostor- Italdata 0.09 0.08 80 70 0.06 Quality Likelihood 0.07 0.05 0.04 0.03 60 50 40 0.02 30 0.01 0 0 50 100 150 Scores 200 250 300 20 Biometrika Sensors Italdata Match scores and quality measures are sensor dependent
  • 22. Contd.., 4.5 4 Biometrika Italdata 3.5 Likelihood 3 2.5 2 1.5 1 0.5 0 0 0.2 0.4 0.6 Liveness measure 0.8 Liveness measures are sensor dependent 1 No significant correlation exist between quality and liveness measure ( =0.25)
  • 23. 3. Assessment of Model C in a Multi-sensor Environment
  • 24. Conclusions • Recent studies have addressed the security of fingerprint verification system by combining match scores with quality and liveness measure. • We advance the state of the art by modeling sensor influence on them. • This is realized through a graphical model that account for the impact of sensor on liveness, quality and match score values
  • 25. Contd.., • Experimental investigations on the LivDet11 fingerprint database indicate that – Existing training-based fusion framework cannot operate effectively in a multi-sensor scenario – The proposed graphical model can effectively operate in a multi-sensor environment • The effectiveness of the proposed model can be further enhanced by improving the sensitivity of the underlying liveness detector