This document summarizes research on anti-spoofing algorithms for fingerprint systems. It discusses how fingerprint spoofing works and known spoofing methods. It also reviews approaches for fingerprint liveness detection, including texture-based features, perspiration-based features, and classification results on standard datasets. Finally, it proposes a Bayesian belief network approach to fuse liveness scores with fingerprint matching scores to improve spoof detection performance.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
Star Link Communication Pvt. Ltd., India's leading manufacturer of biometric attendance system and access control system, brings you this slideshow about biometrics and how the technology works.
This is a complete report on Bio-metrics, finger print detection. It include what finger print is, how to scan and refin finger print, how the mechanism of its detection work, applications, etc
Identifying unconscious patients using face and fingerprint recognitionAsrarulhaq Maktedar
The presentation is about our project which helps to identify any unconscious person with help of face or fingerprint recognition, which is based on biometrics.
The presentation also explains the algorithm we used in our project
SourceAFIS used for Fingerprint Recognition
CNN ( Convolution Neural Network ) used for Face Recognition
The presentation also includes IEEE Reference Papers
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
Presentation for September 2017 ISC2 Security Congress
Biometric Recognition for Multi-Factor Authentication
- Biological and Behavioral Biometrics
- Benefits and Issues
- What Every CISO Should Know
- Laws, Standards, and Guidelines
- How to Measure Biometric Recognition
- Attack Vectors
- Multimodal Biometric Recognition
- Continuous Authentication with Biometrics
- Face ID Update
- The Future
Star Link Communication Pvt. Ltd., India's leading manufacturer of biometric attendance system and access control system, brings you this slideshow about biometrics and how the technology works.
This is a complete report on Bio-metrics, finger print detection. It include what finger print is, how to scan and refin finger print, how the mechanism of its detection work, applications, etc
Identifying unconscious patients using face and fingerprint recognitionAsrarulhaq Maktedar
The presentation is about our project which helps to identify any unconscious person with help of face or fingerprint recognition, which is based on biometrics.
The presentation also explains the algorithm we used in our project
SourceAFIS used for Fingerprint Recognition
CNN ( Convolution Neural Network ) used for Face Recognition
The presentation also includes IEEE Reference Papers
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
Presentation for September 2017 ISC2 Security Congress
Biometric Recognition for Multi-Factor Authentication
- Biological and Behavioral Biometrics
- Benefits and Issues
- What Every CISO Should Know
- Laws, Standards, and Guidelines
- How to Measure Biometric Recognition
- Attack Vectors
- Multimodal Biometric Recognition
- Continuous Authentication with Biometrics
- Face ID Update
- The Future
This is a Fingerprint based class attendance system in higher institutions, The implementation take attendance of student in a class and give output of student eligibility status at the end of the semester or term
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
Sign Language SL is a medium of communication for physically disabled people. It is a gesture based language for communication of dumb and deaf people. These people communicate by using different actions of hands, where each different action means something. Sign language is the only way of conversation for deaf and dumb people. It is very difficult to understand this language for the common people. Hence sign language recognition has become an important task. There is a necessity for a translator to communicate with the world. Real time translator for sign language provides a medium to communicate with others. Previous methods employs sensor gloves, hat mounted cameras, armband etc. which has wearing difficulties and have noisy behaviour. To alleviate this problem, a real time gesture recognition system using Deep Learning DL is proposed. It enables to achieve improvements on the gesture recognition performance. Jeni Moni | Anju J Prakash ""A Deep Neural Framework for Continuous Sign Language Recognition by Iterative Training: Survey"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30032.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/30032/a-deep-neural-framework-for-continuous-sign-language-recognition-by-iterative-training-survey/jeni-moni
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
Fingerprint is one of the best apparatus to identify human because of its uniqueness, details information, hard to change and long-term indicators of human identity where there are several biometric feature that can be recycled to endorse the individuality. Identification of fingerprint is very important in forensic science, trace any part of human, collection of crime part and proof from a crime. This paper presents a new method of identifying fingerprint in biometrics security system. Fingerprint is one of the best example in biometric security because it can identify personal information and it is much secure than any other biometric identification system. The experimental result exhibits the performance of the proposed method.
Paper helps to learner to know about various bio metrics and comparison between them. this paper provide researchers a brief information so that they can choose their research area in biometric based on the comparison
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
In this modern era, a huge revolution in technology is the introduction of biometric recognition system. One of the most useful biometric recognition system is fingerprint recognition system. The fingerprint recognition system is considered to most important biometric system in addition to other biometrics recognition systems
Similar to Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013] (20)
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
2. Security of Fingerprint Systems
13
[1] http://nexidbiometrics.com/brazilian-doctor-arrested-for-using-fake-fingerprints/
[2] http://secureidnews.com/news-item/apples-touch-id-spoofed/
• What about Impersonation?
• March 2013, Brazilian doctor accused to use spoof fingerprints to
check-in co-workers not present at work place
• September 2013, the iPhone5S equipped with Touch ID sensor
accepted a spoof fingerprint as live
Police recovered six silicone fingers
After two days only it was released
3. Fingerprint Spoofing
• Liveness detection distinguishes live human biometric presentations
from spoof artifacts [2],[3],[4]
• The liveness of a fingerprint is assessed by a numerical entity
14
[1] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. Optical Security and Counterfeit
Deterrence Techniques IV, 4677:275–289, January 2002.
[2] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002.
Making artificial fingerprints directly from a live finger [1]
• Fingerprint systems are vulnerable to spoof presentations [1]
[3] D. Yambay, L. Ghiani, P. Denti, G. Marcialis, F. Roli and S. Schuckers. LivDet 2011 – Fingerprint Liveness Detection Competition 2011. The 5th
International Conference on Biometrics (ICB), pages 208-215, March 2012.
[4] G. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, and S. Schuckers. First international fingerprint liveness detection
competition (LivDet09). The 15th International Conference on Image Analysis and Processing (ICIAP), pages 12–23, September 2009.
4. The considered dangerous scenarios
15
http://www2.washjeff.edu/users/ahollandminkley/Biometric/index.htmlThe images are taken from
• A person enrolls using a live finger
• A spoof artifact of the true finger is used during verification [1]
live spoof
Enrollment Verification
[1] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002.
6. Vulnerability Degree vs. Fingerprint Sensing
17
• Optical sensors: light entering the prism is reflected at valleys
and absorbed at the ridges
• Physiological vulnerability: materials with light reflectivity similar
to that of the skin
• Device: differences in ergonomics, arrangement of elements
• Capacitive sensors: the finger is modeled as the upper electrode
of a capacitor
• Fingerprint in gelatin are more dangerous
Spoof fingerprints obtained using the
same material (silicone) but scanned
by two different optical devices
(CrossMatch and Biometrika from
LivDet09
7. How to make Fingerprint Spoof?
18
• Materials which can be scanned (e.g., play-doh, gelatin, …)
[1] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002.
10. Texture-based Features
21
Original Image De-noised Image Residual Noise
Original Image De-noised Image Residual Noise
L
I
V
E
S
P
O
O
F
• Standard deviation of the residual noise
• Noise components are due to the coarseness of the fake
finger surface
12. Perspiration-based Features
23
• Individual pore spacing
1. Image transformed into the ridge signal
2. Analysis in the Fourier domain
3. Total energy associated to the frequencies
corresponding to the spatial frequencies of pores
High
resolution
sensor
1000 dpi
• Intensity-based
• Spoofs are distributed in the dark
• Grey Level (GL) Ratio:
# of pixels with GL in (150, 253)/(1,149)
13. Data details
24
DATA SET LivDet13
Dataset Scanner
Live Training
Samples
Live Training
Fingers
Live Testing
Samples
Live Testing
Fingers
1 Biometrika 1000 200 1000 200
2 Italdata 1000 200 1000 200
DATA SET LivDet13
Dataset Scanner
Spoof Training
Samples
Spoof Training
Fingers
Spoof Testing
Samples
Spoof Testing
Fingers
1 Biometrika 1000 100 1000 100
2 Italdata 1000 100 1000 100
14. Classification Results
25
• Texture-based
• First order statistics
• Second order statistics
• Power spectrum analysis
• Local Binary Pattern
• Weber Local Descriptor
• Perspiration-based
• Intensity-based
• Quality-based
• Pores-based
Marasco and Sansone 2012 [1]
• FLR=12.6%; FSA=12.3%
LivDet09 databases
• FLR=11.61; FSA=6.2%
LivDet11 Digital Persona
• FLR=11.61; FSA=6.2%
LivDet13
Marasco and Sansone [1] combined
with Gragnaniello et al. [2]
• FLR=11.3; FSA=1.8%
LivDet13 Biometrika
• FLR=4.9; FSA=2.1%
LivDet13 Italdata
[1] E. Marasco and C. Sansone. Combining perspiration- and morphology-based static features for fingerprint liveness detection.
Pattern Recognition Letters, 33:1148–1156, 2012
[2] C. Sansone D. Gragnaniello, G. Poggi and L. Verdoliva. Fingerprint liveness detection based on weber local image descriptor.
IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs), pages 1–5, 2013
15. BBN-based to fuse liveness with
match scores
26
BBN: Bayesian Belief Network
• The liveness measure is assumed to influence match scores
• The joint probability is based on the topology of the network:
• IIII identity state
• SSSSgggg liveness state of gallery
• SSSSpppp liveness state of probe
Events:
P(I)P(Sg)P(Sp)Sg)|P(lgSp)|P(lpI)lp,lg,|P(m
Sg)Sp,I,lg,lp,P(m, =
16. Bayesian Inference
27
From previous slide
The probability of identity state is based
on both match scores and liveness values
Target: given liveness and match scores, what is the probability
that both probe and gallery samples pertain to the same identity
and both are live samples?
lg)lp,P(m,
Sg)Sp,I,lg,lp,P(m,
lg)lp,m,|SgSp,P(I, =
lg)lg)P(lp,lp,|P(m
Sg)P(I)Sg)P(Sp)P(|Sp)P(lg|I)P(lplp,lg,|P(m
=
lp)lg,|P(m
I)lp,lg,|P(I)P(m
P(lg)
Sg)P(Sg)|P(lg
P(lp)
Sp)P(Sp)|P(lp
=
lp)lg,|P(m
lp)lg,|lg)P(mlp,m,|P(I
lg)|Sg(P)lp|Sp(P=
lp)lg,m,|P(Ilg)|Sg(P)lp|Sp(P=
Independence between
andlg lp
)lplg,|I(P)I(P =
17. 28
Results (Silicone, training rate 50%)
Method Verification
FMR% FNMR%
Spoof Detection
FSAR% FLRR%
Global
GFAR% GFRR%
4 (FB) 0.103 5.044 5.244 12.516 0.308 14.217
4 (NN) 0.002 5.187 5.297 12.558 0.241 15.696
• Method 1 achieves best spoof detection performance with a less
accurate liveness detector
Method Verification
FMR% FNMR%
Spoof Detection
FSAR% FLRR%
Global
GFAR% GFRR%
4 (FB) 0.089 15.866 0.316 12.434 0.046 4.195
4 (NN) 0.011 16.415 0.320 12.475 0.008 4.634
Results (Gelatin, training rate 50%)
• The lowest global error rates are achieved with gelatin, where
the liveness measure is accurate
18. Open Issues
29
• Testing in the presence of unknown spoof materials
• Learning-based
• Certification
• Integration with the matcher
• Performance metrics