SlideShare a Scribd company logo
1 of 24
Correlation Based Fingerprint
Liveness Detection
Under The Guidance of: Ashish Pawar
Prof. Mrs. Vidya Patil 30349
Biometrics
 Bio = “life” metrics = “measure”
 To analyse physiological and behavioural characteristics
 Biometric is based on anatomic uniqueness of a person
 Three ways authentication can be done:
1. Something the person knows(password)
2. Something the person has(key , special card)
3. Something the person is(fingerprint , footprint)
Biometric Identifiers
 Fingerprint Recognition
 Iris Recognition
 Face Detection
 Voice Recognition
 DNA
Why Fingerprint?
 Unique
 Reliable
 Fast and easy capture
Liveness
 It is a dichotomy of feature space into living and non-living
There are essentially three different ways to introduce liveness detection into
biometric systems:
1. Using extra hardware to acquire life signs
2. Using the information already captured by the system to detect life signs.
3. Using liveness information inherent to the biometric.
Relevance of liveness Detection
 Systems requiring high
security level
 Because fingerprints
cannot be changed
 Accurate authentication
Features and patterns
 Features
1. Sweat Pores
2. Ridges and valleys
3. Perspiration
 Patterns
1. Arch
2. Loop
3. Whorl
Fingerprint Spoofing Techniques
 Direct Casting
Direct Finger is used as source.
 Indirect Casting
Fingerprint obtained from secondary
sources.
Existing Methods
 Local Binary Pattern(LBP)
 Pore Detection
 Power Spectrum
 Ridges Wavelet
 Valley Wavelet
Comparison between existing methods
The above table gives the FerrFake rate
Comparison between existing methods
The above table gives the FerrLive rate
Overview of the proposed method
 Used for distinguishing spoofed and live.
 Makes use of correlation
 Based on the underlying assumption of same class
 Automatic Adaptation to new fingerprint images
Algorithms used
 Partial Least Square Method
1. It is mostly used for prediction
2. Used when factors are more as compared to observed values
3. In this method used for correlation
Working of PLS
X = TPT + E
Y = UQ T + F
Factors Responses
Population
Figure 3: Indirect modeling
T U
factors response
 Support Vector Machine(SVM)
1. SVM is a supervised learning method that generates ip/op
mapping function from a set of labelled training data
2. It basically calculates probability of input applied .
3. In this method it is combined along wih the classifier algorithms
like GMM,GC and QDA
FrameWork Architecture
Working
 Feature Extraction phase
Features are extracted using specific descriptor like LBP and LPQ.
 Correlation Phase
Correlation is performed using PLS
Here it is also used to model relation using below equation:
Lf = TPT + E
Sf = UQ T + F
Where Lf anf Sf are two matrices after feature extraction
 SVM Phase
Probablities are calculated for live and spoof classes
Denoted by xl,xs.
 Generative Classifier Phase
Here using above probabilities result is generated
Comaprison with existing Methods
Analysis on livedet 2011
Analysis on livedet2013
Advantage
 Cross – sensor Interoperability
 Less Error Rate as compared to existing methods
Thank You!

More Related Content

What's hot

Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
IRJET- Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
IRJET-  	  Recognition of Theft by Gestures using Kinect Sensor in Machine Le...IRJET-  	  Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
IRJET- Recognition of Theft by Gestures using Kinect Sensor in Machine Le...IRJET Journal
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniquesAbhineet Bhamra
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
 
Face Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control SystemFace Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control Systemijtsrd
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET Journal
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET Journal
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 

What's hot (18)

1304.2109
1304.21091304.2109
1304.2109
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
IRJET- Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
IRJET-  	  Recognition of Theft by Gestures using Kinect Sensor in Machine Le...IRJET-  	  Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
IRJET- Recognition of Theft by Gestures using Kinect Sensor in Machine Le...
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
 
Fingerprints recognition
Fingerprints recognitionFingerprints recognition
Fingerprints recognition
 
finger prints
finger printsfinger prints
finger prints
 
G0333946
G0333946G0333946
G0333946
 
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...
 
Face Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control SystemFace Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control System
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android App
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 

Viewers also liked

Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýSecurity Session
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 

Viewers also liked (6)

Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face recognition
face recognitionface recognition
face recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 

Similar to Correlation Based Fingerprint Liveness Detection

Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition reportlavanya693
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithmijcisjournal
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Gait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVMGait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVMIJEEE
 
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionKinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionIJCSIS Research Publications
 
Study of person identification using palmprint
Study of person identification using palmprintStudy of person identification using palmprint
Study of person identification using palmprinteSAT Publishing House
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfWhitney Anderson
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection TechniquesIRJET Journal
 
Design and development of pulmonary tuberculosis diagnosing system using image
Design and development of pulmonary tuberculosis diagnosing system using imageDesign and development of pulmonary tuberculosis diagnosing system using image
Design and development of pulmonary tuberculosis diagnosing system using imageIAEME Publication
 
Personal identity verification based ECG biometric using non-fiducial features
Personal identity verification based ECG biometric using  non-fiducial features Personal identity verification based ECG biometric using  non-fiducial features
Personal identity verification based ECG biometric using non-fiducial features IJECEIAES
 
Filtering of Frequency Components for Privacy Preserving Facial Recognition
Filtering of Frequency Components for Privacy Preserving Facial RecognitionFiltering of Frequency Components for Privacy Preserving Facial Recognition
Filtering of Frequency Components for Privacy Preserving Facial RecognitionArtur Filipowicz
 
RECOGNITION SYSTEM USING MYO ARMBAND FOR HAND GESTURES - SURVEY
RECOGNITION SYSTEM USING MYO ARMBAND FOR HAND GESTURES - SURVEYRECOGNITION SYSTEM USING MYO ARMBAND FOR HAND GESTURES - SURVEY
RECOGNITION SYSTEM USING MYO ARMBAND FOR HAND GESTURES - SURVEYIRJET Journal
 

Similar to Correlation Based Fingerprint Liveness Detection (20)

Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition report
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
Gait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVMGait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVM
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
D56021216
D56021216D56021216
D56021216
 
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionKinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Study of person identification using palmprint
Study of person identification using palmprintStudy of person identification using palmprint
Study of person identification using palmprint
 
A Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdfA Review of Lie Detection Techniques.pdf
A Review of Lie Detection Techniques.pdf
 
A Review of Lie Detection Techniques
A Review of Lie Detection TechniquesA Review of Lie Detection Techniques
A Review of Lie Detection Techniques
 
D04422730
D04422730D04422730
D04422730
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Design and development of pulmonary tuberculosis diagnosing system using image
Design and development of pulmonary tuberculosis diagnosing system using imageDesign and development of pulmonary tuberculosis diagnosing system using image
Design and development of pulmonary tuberculosis diagnosing system using image
 
Personal identity verification based ECG biometric using non-fiducial features
Personal identity verification based ECG biometric using  non-fiducial features Personal identity verification based ECG biometric using  non-fiducial features
Personal identity verification based ECG biometric using non-fiducial features
 
Filtering of Frequency Components for Privacy Preserving Facial Recognition
Filtering of Frequency Components for Privacy Preserving Facial RecognitionFiltering of Frequency Components for Privacy Preserving Facial Recognition
Filtering of Frequency Components for Privacy Preserving Facial Recognition
 
Paper
PaperPaper
Paper
 
RECOGNITION SYSTEM USING MYO ARMBAND FOR HAND GESTURES - SURVEY
RECOGNITION SYSTEM USING MYO ARMBAND FOR HAND GESTURES - SURVEYRECOGNITION SYSTEM USING MYO ARMBAND FOR HAND GESTURES - SURVEY
RECOGNITION SYSTEM USING MYO ARMBAND FOR HAND GESTURES - SURVEY
 
V01 i010401
V01 i010401V01 i010401
V01 i010401
 

Correlation Based Fingerprint Liveness Detection

  • 1. Correlation Based Fingerprint Liveness Detection Under The Guidance of: Ashish Pawar Prof. Mrs. Vidya Patil 30349
  • 2. Biometrics  Bio = “life” metrics = “measure”  To analyse physiological and behavioural characteristics  Biometric is based on anatomic uniqueness of a person  Three ways authentication can be done: 1. Something the person knows(password) 2. Something the person has(key , special card) 3. Something the person is(fingerprint , footprint)
  • 3. Biometric Identifiers  Fingerprint Recognition  Iris Recognition  Face Detection  Voice Recognition  DNA
  • 4. Why Fingerprint?  Unique  Reliable  Fast and easy capture
  • 5.
  • 6. Liveness  It is a dichotomy of feature space into living and non-living There are essentially three different ways to introduce liveness detection into biometric systems: 1. Using extra hardware to acquire life signs 2. Using the information already captured by the system to detect life signs. 3. Using liveness information inherent to the biometric.
  • 7. Relevance of liveness Detection  Systems requiring high security level  Because fingerprints cannot be changed  Accurate authentication
  • 8. Features and patterns  Features 1. Sweat Pores 2. Ridges and valleys 3. Perspiration  Patterns 1. Arch 2. Loop 3. Whorl
  • 9. Fingerprint Spoofing Techniques  Direct Casting Direct Finger is used as source.  Indirect Casting Fingerprint obtained from secondary sources.
  • 10. Existing Methods  Local Binary Pattern(LBP)  Pore Detection  Power Spectrum  Ridges Wavelet  Valley Wavelet
  • 11. Comparison between existing methods The above table gives the FerrFake rate
  • 12. Comparison between existing methods The above table gives the FerrLive rate
  • 13. Overview of the proposed method  Used for distinguishing spoofed and live.  Makes use of correlation  Based on the underlying assumption of same class  Automatic Adaptation to new fingerprint images
  • 14. Algorithms used  Partial Least Square Method 1. It is mostly used for prediction 2. Used when factors are more as compared to observed values 3. In this method used for correlation
  • 15. Working of PLS X = TPT + E Y = UQ T + F Factors Responses Population Figure 3: Indirect modeling T U factors response
  • 16.  Support Vector Machine(SVM) 1. SVM is a supervised learning method that generates ip/op mapping function from a set of labelled training data 2. It basically calculates probability of input applied . 3. In this method it is combined along wih the classifier algorithms like GMM,GC and QDA
  • 17.
  • 19. Working  Feature Extraction phase Features are extracted using specific descriptor like LBP and LPQ.  Correlation Phase Correlation is performed using PLS Here it is also used to model relation using below equation: Lf = TPT + E Sf = UQ T + F Where Lf anf Sf are two matrices after feature extraction
  • 20.  SVM Phase Probablities are calculated for live and spoof classes Denoted by xl,xs.  Generative Classifier Phase Here using above probabilities result is generated
  • 21. Comaprison with existing Methods Analysis on livedet 2011
  • 23. Advantage  Cross – sensor Interoperability  Less Error Rate as compared to existing methods