SlideShare a Scribd company logo
Biometric Presentation Attack
Detection: Beyond the Visible
Spectrum
TAKEN FROM IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY,
VOL 15, 2020
1
CONTENT
 INTRODUCTION
 DEFINATION
 RELATED WORKS
 PRESENTATION ATTACK DETECTION METHODOLOGY: HARDWARE
 PRESENTATION ATTACK DETECTION METHODOLOGY: SOFTWARE
 EXPERIMENTAL FRAMEWORK
 EXPERIMENTAL RESULTS
 CONCLUSION
 REFERENCE
2
INTRODUCTION
Biometric recognition systems is based on the individuals’ biological
(e.g., iris or fingerprint) or behavioural (e.g., signature or voice)
characteristics.
In spite of their numerous advantages, biometric systems are
vulnerable to external attacks as any other security-related
technology. The biometric capture device is probably the most
exposed one.
One can simply present the capture device with a presentation attack
instrument (PAI), such as a gummy finger or a fingerprint overlay, in
order to interfere with its intended behaviour. These attacks are
known as presentation attacks (PAs).
3
The initial approaches to PAD were based on the so-called
handcrafted features, such as texture descriptors or motion
analysis.
However, deep learning (DL) has become a thriving topic in the
biometric recognition in general.
More specifically, convolutional neural networks (CNNs) and deep
belief networks (DBNs) have been used for fingerprint PAD
purposes.
Selected SWIR wavelengths are used to discriminate skin from
other materials.
Human skin shows characteristic remission properties for
multispectral SWIR wavelengths, which are independent of a
person’s age, gender or skin type.
4
DEFINITION
 Bona fide Presentation: A normal or genuine presentation.
 Presentation attack (PA): An attack carried out on the capture device to
either conceal your identity or impersonate someone else.
 Presentation attack instrument (PAI): biometric characteristic or object
used in a presentation attack.
 Attack Presentation Classification Error Rate (APCER): Proportion of attack
presentations using the same PAI species incorrectly classified as bona fide
presentations in a specific scenario.
 Bona fide Presentation Classification Error Rate (BPCER):Proportion of bona
fide presentations incorrectly classified as presentation attacks in a
specific scenario.
5
RELATED WORKS
Key works on fingerprint PAD for both non-conventional sensors and conventional sensors.
Non-Conventional Fingerprint Sensor
6
Deep Learning for conventional sensors
7
PRESENTATION ATTACK DETECTION METHODOLOGY:
HARDWARE
 The finger SWIR capture device
contain a camera and SWIR sensor.
 Captures 64 × 64 px images, with a
25 mm fixed focal length lens
optimised for wavelengths within
900 – 1700 nm.
 Region of interest(ROI) is extracted
from background of size 18 × 58 px
8
9
Example of bonafides
and PAs acquired by
SWIR sensors
PRESENTATION ATTACK DETECTION METHODOLOGY:
SOFTWARE
Two approaches are: i) handcrafted features
ii) deep learning features
A) Handcrafted features
This method is builds upon the raw spectral signature(ss) of the pixels
across all four wavelengths in order to capture bona fide presentation and
PAI materials.
SWIR sensor provides raw spectral signature(ss) as:
𝒔𝒔 𝒙, 𝒚 = {i1(x,y), … … … iN(x,y)}
iN(x,y) represents the intensity value of pixels for n-th wavelength.
10
 However, this original representation of the sensor is vulnerable to
illumination changes.
 Only the differences among wavelengths will be used as our set of
handcrafted features. Therefore, for each pixel, the final normalised
difference feature vector d(x, y) is computed as follows:
d(x, y) ={d [ia,ib](x, y)} 1≤a<b≤N
 For each pixel with coordinates (x,y), the normalised difference feature
vector d(x,y) is used to classify as skin vs. non-skin with a Support
Vector Machine (SVM) classifier.
11
B) Deep Learning Features
1. Training CNN Models From Scratch:
 The first approach is focused on training residual CNNs from scratch.
 The characteristics of this network is the insertion of shortcut
connections every few stacked layers, converting the plain network into
its residual version.
 The residual connections allow the use of deeper neural network
architectures and at the same time decrease their training time
significantly.
12
2. Adapting Pre-Trained CNN Models
 The second approach evaluates the potential of state-of-the-art pre-trained
models for fingerprint PAD.
 Here the classifier is replaced and retrained and the weights of the last
convolutional layers is adapted.
 MobileNet and VGG19 network architectures pre-trained using the
ImageNet database are proposed to use.
 MobileNet network is based on depthwise separable convolutions, which
factorize a standard convolution into: i) a depthwise convolution, and ii) a
1×1 convolution called pointwise convolution.
 VGG19 network is one of the most popular network architecture, providing
very good results due to its simplicity.
13
EXPERIMENTAL FRAMEWORK
A. DATABASE
 Data were collected in two different stages and comprises both bona
fide and PA samples.
 For the bona fide samples, a total of 163 subjects participated during
the first stage. For each of them, all 5 fingers of the right hand were
captured. For the second stage, there were a total of 399 subjects.
 For the PA samples, there are a total of 35 different PAI species.
14
B. EXPERIMENTAL PROTOCOL
 The main goal behind the experimental protocol design is to
analyze and prove the soundness of our proposed fingerprint PAD
approach in a realistic scenario.
 For the development of our proposed fingerprint PAD methods,
both training and validation datasets are used in order to train the
weights of the systems and select the optimal network
architectures.
15
EXPERIMENTAL RESULTS16
 Spectral signature pixel-wise approach has achieved a 12.61% D-EER.
 It is not possible to get an APCER ≤ 2%, and for APCER ≈ 5%, the BPCER is
over 20% .
 For the case of training end-to-end residual CNN models from scratch, the
best result obtained is a 2.25% D-EER. This result outperforms the
handcrafted feature approach by an 82%.
 Low APCERs below 1% can be achieved for BPCERs below 8%, thereby
overcoming the main drawback of the handcrafted feature approach.
 Three CNN approaches have been fused in two by two basis.
 That yields convenient systems (i.e., low BPCER) even for highly secure (i.e.,
very low APCER) scenarios.
 Our proposed fingerprint PAD system has achieved a final 1.35% D-EER.
Furthermore, other operating points yield a BPCER of 2% for APCER ≤ 0.5%,
and an APCER ≈ 7% for BPCER=0.1%.
17
CONCLUSION
 A fingerprint PAD scheme based on i) a new capture device able to
acquire images within the short wave infrared (SWIR) spectrum, and
ii) state-of-the-art deep learning techniques.
 The best performance was reached for the fusion of two end-to-end
CNNs: the residual CNN trained from scratch and the adapted VGG19
pre-trained model. A D-EER of 1.35% was obtained.
 These results clearly outperform those achieved with the handcrafted
features, which yielded a D-EER over 12%.
 The use of SWIR images in combination with state-of-the-art CNNs
offers a reliable and efficient solution to the threat posed by presentation
attacks.
18
Reference
 J. Kolberg, M. Gomez-Barrero, S. Venkatesh, R. Raghavendra, and C. Busch,
“Presentation attack detection for finger recognition,” in Handbook of Vascular
Biometrics, S. Marcel, A. Uhl, R. Veldhuis, and C. Busch, Eds. Springer, 2019.
 E. Park, W. Kim, Q. Li, J. Kim, and H. Kim, “Fingerprint liveness detection using
CNN features of random sample patches,” in Proc. Int. Conf. Biometrics Special
Interest Group (BIOSIG), Sep. 2016.
 R. Tolosana, M. Gomez-Barrero, J. Kolberg, A. Morales, C. Busch, and J. Ortega,
“Towards fingerprint presentation attack detection based on convolutional
neural networks and short wave infrared imaging,” in Proc. Int. Conf.
Biometrics Special Interest Group (BIOSIG), Sep. 2018.
19
THANK YOU20

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Lossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image ProcessingLossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image Processing
priyadharshini murugan
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
NurrulHafizza
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
anupriti
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
RMK ENGINEERING COLLEGE, CHENNAI
 
Cloud Computing Poster
Cloud Computing PosterCloud Computing Poster
Cloud Computing Poster
Rajat Shukla
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Helmet Detection using Machine Learning
Helmet Detection using Machine LearningHelmet Detection using Machine Learning
Helmet Detection using Machine Learning
IRJET Journal
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
cclark_isec
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Networks
NetworksNetworks
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
NishmithaHc
 

What's hot (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Lossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image ProcessingLossless predictive coding in Digital Image Processing
Lossless predictive coding in Digital Image Processing
 
Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...Graphical Password Authentication using Cued click point technique with zero ...
Graphical Password Authentication using Cued click point technique with zero ...
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Steganography
Steganography Steganography
Steganography
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Cloud Computing Poster
Cloud Computing PosterCloud Computing Poster
Cloud Computing Poster
 
Mobile security
Mobile securityMobile security
Mobile security
 
Helmet Detection using Machine Learning
Helmet Detection using Machine LearningHelmet Detection using Machine Learning
Helmet Detection using Machine Learning
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Networks
NetworksNetworks
Networks
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 

Similar to Biometric presentation attack detection

Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
Shamika Ganesan
 
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET Journal
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
Whitney Anderson
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
IRJET Journal
 
Presentation MINI.pptx djreheukuyegyejej
Presentation MINI.pptx djreheukuyegyejejPresentation MINI.pptx djreheukuyegyejej
Presentation MINI.pptx djreheukuyegyejej
padamsravan8
 
x-RAYS PROJECT
x-RAYS PROJECTx-RAYS PROJECT
x-RAYS PROJECT
PunithaPalanisamy1
 
Pipeline anomaly detection
Pipeline anomaly detectionPipeline anomaly detection
Pipeline anomaly detection
GauravBiswas9
 
Covid Detection Using Lung X-ray Images
Covid Detection Using Lung X-ray ImagesCovid Detection Using Lung X-ray Images
Covid Detection Using Lung X-ray Images
IRJET Journal
 
A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...
IAESIJAI
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
ijaia
 
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOTCROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
IRJET Journal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
aciijournal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
aciijournal
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
aciijournal
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
aciijournal
 
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
TELKOMNIKA JOURNAL
 
Covid-19 Detection Using CNN MODEL
Covid-19 Detection Using CNN MODELCovid-19 Detection Using CNN MODEL
Covid-19 Detection Using CNN MODEL
IRJET Journal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
TELKOMNIKA JOURNAL
 
IRJET - Identification of Malarial Parasites using Deep Learning
IRJET -  	  Identification of Malarial Parasites using Deep LearningIRJET -  	  Identification of Malarial Parasites using Deep Learning
IRJET - Identification of Malarial Parasites using Deep Learning
IRJET Journal
 

Similar to Biometric presentation attack detection (20)

Robust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention NetworkRobust Malware Detection using Residual Attention Network
Robust Malware Detection using Residual Attention Network
 
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
 
Presentation MINI.pptx djreheukuyegyejej
Presentation MINI.pptx djreheukuyegyejejPresentation MINI.pptx djreheukuyegyejej
Presentation MINI.pptx djreheukuyegyejej
 
x-RAYS PROJECT
x-RAYS PROJECTx-RAYS PROJECT
x-RAYS PROJECT
 
Pipeline anomaly detection
Pipeline anomaly detectionPipeline anomaly detection
Pipeline anomaly detection
 
Covid Detection Using Lung X-ray Images
Covid Detection Using Lung X-ray ImagesCovid Detection Using Lung X-ray Images
Covid Detection Using Lung X-ray Images
 
A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...
 
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORKRECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
RECOGNITION OF CDNA MICROARRAY IMAGE USING FEEDFORWARD ARTIFICIAL NEURAL NETWORK
 
Af03401810185..
Af03401810185..Af03401810185..
Af03401810185..
 
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOTCROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
CROP PROTECTION AGAINST BIRDS USING DEEP LEARNING AND IOT
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
A NOVEL BIOMETRIC APPROACH FOR AUTHENTICATION IN PERVASIVE COMPUTING ENVIRONM...
 
Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)Advanced Computational Intelligence: An International Journal (ACII)
Advanced Computational Intelligence: An International Journal (ACII)
 
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...
 
Covid-19 Detection Using CNN MODEL
Covid-19 Detection Using CNN MODELCovid-19 Detection Using CNN MODEL
Covid-19 Detection Using CNN MODEL
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
IRJET - Identification of Malarial Parasites using Deep Learning
IRJET -  	  Identification of Malarial Parasites using Deep LearningIRJET -  	  Identification of Malarial Parasites using Deep Learning
IRJET - Identification of Malarial Parasites using Deep Learning
 

Recently uploaded

English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 

Recently uploaded (20)

English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 

Biometric presentation attack detection

  • 1. Biometric Presentation Attack Detection: Beyond the Visible Spectrum TAKEN FROM IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 15, 2020 1
  • 2. CONTENT  INTRODUCTION  DEFINATION  RELATED WORKS  PRESENTATION ATTACK DETECTION METHODOLOGY: HARDWARE  PRESENTATION ATTACK DETECTION METHODOLOGY: SOFTWARE  EXPERIMENTAL FRAMEWORK  EXPERIMENTAL RESULTS  CONCLUSION  REFERENCE 2
  • 3. INTRODUCTION Biometric recognition systems is based on the individuals’ biological (e.g., iris or fingerprint) or behavioural (e.g., signature or voice) characteristics. In spite of their numerous advantages, biometric systems are vulnerable to external attacks as any other security-related technology. The biometric capture device is probably the most exposed one. One can simply present the capture device with a presentation attack instrument (PAI), such as a gummy finger or a fingerprint overlay, in order to interfere with its intended behaviour. These attacks are known as presentation attacks (PAs). 3
  • 4. The initial approaches to PAD were based on the so-called handcrafted features, such as texture descriptors or motion analysis. However, deep learning (DL) has become a thriving topic in the biometric recognition in general. More specifically, convolutional neural networks (CNNs) and deep belief networks (DBNs) have been used for fingerprint PAD purposes. Selected SWIR wavelengths are used to discriminate skin from other materials. Human skin shows characteristic remission properties for multispectral SWIR wavelengths, which are independent of a person’s age, gender or skin type. 4
  • 5. DEFINITION  Bona fide Presentation: A normal or genuine presentation.  Presentation attack (PA): An attack carried out on the capture device to either conceal your identity or impersonate someone else.  Presentation attack instrument (PAI): biometric characteristic or object used in a presentation attack.  Attack Presentation Classification Error Rate (APCER): Proportion of attack presentations using the same PAI species incorrectly classified as bona fide presentations in a specific scenario.  Bona fide Presentation Classification Error Rate (BPCER):Proportion of bona fide presentations incorrectly classified as presentation attacks in a specific scenario. 5
  • 6. RELATED WORKS Key works on fingerprint PAD for both non-conventional sensors and conventional sensors. Non-Conventional Fingerprint Sensor 6
  • 7. Deep Learning for conventional sensors 7
  • 8. PRESENTATION ATTACK DETECTION METHODOLOGY: HARDWARE  The finger SWIR capture device contain a camera and SWIR sensor.  Captures 64 × 64 px images, with a 25 mm fixed focal length lens optimised for wavelengths within 900 – 1700 nm.  Region of interest(ROI) is extracted from background of size 18 × 58 px 8
  • 9. 9 Example of bonafides and PAs acquired by SWIR sensors
  • 10. PRESENTATION ATTACK DETECTION METHODOLOGY: SOFTWARE Two approaches are: i) handcrafted features ii) deep learning features A) Handcrafted features This method is builds upon the raw spectral signature(ss) of the pixels across all four wavelengths in order to capture bona fide presentation and PAI materials. SWIR sensor provides raw spectral signature(ss) as: 𝒔𝒔 𝒙, 𝒚 = {i1(x,y), … … … iN(x,y)} iN(x,y) represents the intensity value of pixels for n-th wavelength. 10
  • 11.  However, this original representation of the sensor is vulnerable to illumination changes.  Only the differences among wavelengths will be used as our set of handcrafted features. Therefore, for each pixel, the final normalised difference feature vector d(x, y) is computed as follows: d(x, y) ={d [ia,ib](x, y)} 1≤a<b≤N  For each pixel with coordinates (x,y), the normalised difference feature vector d(x,y) is used to classify as skin vs. non-skin with a Support Vector Machine (SVM) classifier. 11
  • 12. B) Deep Learning Features 1. Training CNN Models From Scratch:  The first approach is focused on training residual CNNs from scratch.  The characteristics of this network is the insertion of shortcut connections every few stacked layers, converting the plain network into its residual version.  The residual connections allow the use of deeper neural network architectures and at the same time decrease their training time significantly. 12
  • 13. 2. Adapting Pre-Trained CNN Models  The second approach evaluates the potential of state-of-the-art pre-trained models for fingerprint PAD.  Here the classifier is replaced and retrained and the weights of the last convolutional layers is adapted.  MobileNet and VGG19 network architectures pre-trained using the ImageNet database are proposed to use.  MobileNet network is based on depthwise separable convolutions, which factorize a standard convolution into: i) a depthwise convolution, and ii) a 1×1 convolution called pointwise convolution.  VGG19 network is one of the most popular network architecture, providing very good results due to its simplicity. 13
  • 14. EXPERIMENTAL FRAMEWORK A. DATABASE  Data were collected in two different stages and comprises both bona fide and PA samples.  For the bona fide samples, a total of 163 subjects participated during the first stage. For each of them, all 5 fingers of the right hand were captured. For the second stage, there were a total of 399 subjects.  For the PA samples, there are a total of 35 different PAI species. 14
  • 15. B. EXPERIMENTAL PROTOCOL  The main goal behind the experimental protocol design is to analyze and prove the soundness of our proposed fingerprint PAD approach in a realistic scenario.  For the development of our proposed fingerprint PAD methods, both training and validation datasets are used in order to train the weights of the systems and select the optimal network architectures. 15
  • 17.  Spectral signature pixel-wise approach has achieved a 12.61% D-EER.  It is not possible to get an APCER ≤ 2%, and for APCER ≈ 5%, the BPCER is over 20% .  For the case of training end-to-end residual CNN models from scratch, the best result obtained is a 2.25% D-EER. This result outperforms the handcrafted feature approach by an 82%.  Low APCERs below 1% can be achieved for BPCERs below 8%, thereby overcoming the main drawback of the handcrafted feature approach.  Three CNN approaches have been fused in two by two basis.  That yields convenient systems (i.e., low BPCER) even for highly secure (i.e., very low APCER) scenarios.  Our proposed fingerprint PAD system has achieved a final 1.35% D-EER. Furthermore, other operating points yield a BPCER of 2% for APCER ≤ 0.5%, and an APCER ≈ 7% for BPCER=0.1%. 17
  • 18. CONCLUSION  A fingerprint PAD scheme based on i) a new capture device able to acquire images within the short wave infrared (SWIR) spectrum, and ii) state-of-the-art deep learning techniques.  The best performance was reached for the fusion of two end-to-end CNNs: the residual CNN trained from scratch and the adapted VGG19 pre-trained model. A D-EER of 1.35% was obtained.  These results clearly outperform those achieved with the handcrafted features, which yielded a D-EER over 12%.  The use of SWIR images in combination with state-of-the-art CNNs offers a reliable and efficient solution to the threat posed by presentation attacks. 18
  • 19. Reference  J. Kolberg, M. Gomez-Barrero, S. Venkatesh, R. Raghavendra, and C. Busch, “Presentation attack detection for finger recognition,” in Handbook of Vascular Biometrics, S. Marcel, A. Uhl, R. Veldhuis, and C. Busch, Eds. Springer, 2019.  E. Park, W. Kim, Q. Li, J. Kim, and H. Kim, “Fingerprint liveness detection using CNN features of random sample patches,” in Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG), Sep. 2016.  R. Tolosana, M. Gomez-Barrero, J. Kolberg, A. Morales, C. Busch, and J. Ortega, “Towards fingerprint presentation attack detection based on convolutional neural networks and short wave infrared imaging,” in Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG), Sep. 2018. 19

Editor's Notes

  1. no need to carry tokens or memorise passwords
  2. The "handcrafted features" were commonly used with "traditional" machine learning approaches for object recognition and computer vision like Support Vector Machines. understanding of how an object moves within an environment.
  3. 1.Not many details about the acquired database or the experimental protocol are available. 2. the spectroscopic properties of living against the cadaver fingers were analyzed using four wavelengths. However, no PAIs were analysed in their work. 3. Finger vein image over same database was analyzed with help of gaussian pyramid and LBP.
  4. 1.CNN optimization was used , best accuracy was achieved 2. 2 Pre trained CNN cafenet and googlenet, performance was compared with Siamese ntw. ROI: Different approach to optimize CNN model, output were classified by SVM, no data agumantation required Patch: deep boltzman machine which learn more complex samples. Instead of using deep n/ws 10 different handcrafted descriptors were used, which were fed to self developed deep ntw for final fusion.
  5. Hamamatsu G11097-0606S InGaAs area image sensor, 4 wavelength 1200nm ,1300nm 1450nm,1550nm Fingerprint verification can be done with 1.3 MP camera and VIS NIS lens.
  6. 4 wavelength sample acquired from 2 bonafide and 3 PAIs Playdoh finger show some similarities wrt BP which makes PAD task harder. Change are different making it easier to discriminate from BP
  7. each individual score si generated by the individual PAD algorithms
  8. Due to having the finger slot open to outer world
  9. These ntw have outperformed the traditional ntw in many different datasets such as ImageNet for both image classification and object detection. Batch normalization is applied r8 after each convolution
  10. first layers of the CNN extract more general features related to directional edges and colours, whereas the last layers of the network are in charge of extracting more abstract features related to the specific task
  11. People from different gender, ethinicity,and age were considerd PAI species were categorized into 8 groups.
  12. 1.for APCER ≤ 0.5%, the corresponding BPCER values for the fused systems (solid lines) are significantly lower than those of the individual networks (dashed lines): close to 2% 2.for low BPCER ≤1%, the best APCER (≤10%) is achieved for either the residual CNN alone (dashed orange) or its fusion with the VGG19 (solid dark blue).