SlideShare a Scribd company logo
Anti-Spoofing Algorithms for
Fingerprint Systems
Emanuela Marasco
12
Lane Department of Computer Science and Electrical Engineering
Security of Fingerprint Systems
13
[1] http://nexidbiometrics.com/brazilian-doctor-arrested-for-using-fake-fingerprints/
[2] http://secureidnews.com/news-item/apples-touch-id-spoofed/
• What about Impersonation?
• March 2013, Brazilian doctor accused to use spoof fingerprints to
check-in co-workers not present at work place
• September 2013, the iPhone5S equipped with Touch ID sensor
accepted a spoof fingerprint as live
Police recovered six silicone fingers
After two days only it was released
Fingerprint Spoofing
• Liveness detection distinguishes live human biometric presentations
from spoof artifacts [2],[3],[4]
• The liveness of a fingerprint is assessed by a numerical entity
14
[1] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. Optical Security and Counterfeit
Deterrence Techniques IV, 4677:275–289, January 2002.
[2] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002.
Making artificial fingerprints directly from a live finger [1]
• Fingerprint systems are vulnerable to spoof presentations [1]
[3] D. Yambay, L. Ghiani, P. Denti, G. Marcialis, F. Roli and S. Schuckers. LivDet 2011 – Fingerprint Liveness Detection Competition 2011. The 5th
International Conference on Biometrics (ICB), pages 208-215, March 2012.
[4] G. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, and S. Schuckers. First international fingerprint liveness detection
competition (LivDet09). The 15th International Conference on Image Analysis and Processing (ICIAP), pages 12–23, September 2009.
The considered dangerous scenarios
15
http://www2.washjeff.edu/users/ahollandminkley/Biometric/index.htmlThe images are taken from
• A person enrolls using a live finger
• A spoof artifact of the true finger is used during verification [1]
live spoof
Enrollment Verification
[1] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002.
Live or Spoof?
16
Images taken from LivDet09
Vulnerability Degree vs. Fingerprint Sensing
17
• Optical sensors: light entering the prism is reflected at valleys
and absorbed at the ridges
• Physiological vulnerability: materials with light reflectivity similar
to that of the skin
• Device: differences in ergonomics, arrangement of elements
• Capacitive sensors: the finger is modeled as the upper electrode
of a capacitor
• Fingerprint in gelatin are more dangerous
Spoof fingerprints obtained using the
same material (silicone) but scanned
by two different optical devices
(CrossMatch and Biometrika from
LivDet09
How to make Fingerprint Spoof?
18
• Materials which can be scanned (e.g., play-doh, gelatin, …)
[1] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002.
Known Spoofing Methods
19
Liveness Detection Approaches
20
Texture-based Features
21
Original Image De-noised Image Residual Noise
Original Image De-noised Image Residual Noise
L
I
V
E
S
P
O
O
F
• Standard deviation of the residual noise
• Noise components are due to the coarseness of the fake
finger surface
Texture-based Features
22
• First order statistics
Uniformity of grey
levels is less in
live
Perspiration-based Features
23
• Individual pore spacing
1. Image transformed into the ridge signal
2. Analysis in the Fourier domain
3. Total energy associated to the frequencies
corresponding to the spatial frequencies of pores
High
resolution
sensor
1000 dpi
• Intensity-based
• Spoofs are distributed in the dark
• Grey Level (GL) Ratio:
# of pixels with GL in (150, 253)/(1,149)
Data details
24
DATA SET LivDet13
Dataset Scanner
Live Training
Samples
Live Training
Fingers
Live Testing
Samples
Live Testing
Fingers
1 Biometrika 1000 200 1000 200
2 Italdata 1000 200 1000 200
DATA SET LivDet13
Dataset Scanner
Spoof Training
Samples
Spoof Training
Fingers
Spoof Testing
Samples
Spoof Testing
Fingers
1 Biometrika 1000 100 1000 100
2 Italdata 1000 100 1000 100
Classification Results
25
• Texture-based
• First order statistics
• Second order statistics
• Power spectrum analysis
• Local Binary Pattern
• Weber Local Descriptor
• Perspiration-based
• Intensity-based
• Quality-based
• Pores-based
Marasco and Sansone 2012 [1]
• FLR=12.6%; FSA=12.3%
LivDet09 databases
• FLR=11.61; FSA=6.2%
LivDet11 Digital Persona
• FLR=11.61; FSA=6.2%
LivDet13
Marasco and Sansone [1] combined
with Gragnaniello et al. [2]
• FLR=11.3; FSA=1.8%
LivDet13 Biometrika
• FLR=4.9; FSA=2.1%
LivDet13 Italdata
[1] E. Marasco and C. Sansone. Combining perspiration- and morphology-based static features for fingerprint liveness detection.
Pattern Recognition Letters, 33:1148–1156, 2012
[2] C. Sansone D. Gragnaniello, G. Poggi and L. Verdoliva. Fingerprint liveness detection based on weber local image descriptor.
IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs), pages 1–5, 2013
BBN-based to fuse liveness with
match scores
26
BBN: Bayesian Belief Network
• The liveness measure is assumed to influence match scores
• The joint probability is based on the topology of the network:
• IIII identity state
• SSSSgggg liveness state of gallery
• SSSSpppp liveness state of probe
Events:
P(I)P(Sg)P(Sp)Sg)|P(lgSp)|P(lpI)lp,lg,|P(m
Sg)Sp,I,lg,lp,P(m, =
Bayesian Inference
27
From previous slide
The probability of identity state is based
on both match scores and liveness values
Target: given liveness and match scores, what is the probability
that both probe and gallery samples pertain to the same identity
and both are live samples?
lg)lp,P(m,
Sg)Sp,I,lg,lp,P(m,
lg)lp,m,|SgSp,P(I, =
lg)lg)P(lp,lp,|P(m
Sg)P(I)Sg)P(Sp)P(|Sp)P(lg|I)P(lplp,lg,|P(m
=
lp)lg,|P(m
I)lp,lg,|P(I)P(m
P(lg)
Sg)P(Sg)|P(lg
P(lp)
Sp)P(Sp)|P(lp
=
lp)lg,|P(m
lp)lg,|lg)P(mlp,m,|P(I
lg)|Sg(P)lp|Sp(P=
lp)lg,m,|P(Ilg)|Sg(P)lp|Sp(P=
Independence between
andlg lp
)lplg,|I(P)I(P =
28
Results (Silicone, training rate 50%)
Method Verification
FMR% FNMR%
Spoof Detection
FSAR% FLRR%
Global
GFAR% GFRR%
4 (FB) 0.103 5.044 5.244 12.516 0.308 14.217
4 (NN) 0.002 5.187 5.297 12.558 0.241 15.696
• Method 1 achieves best spoof detection performance with a less
accurate liveness detector
Method Verification
FMR% FNMR%
Spoof Detection
FSAR% FLRR%
Global
GFAR% GFRR%
4 (FB) 0.089 15.866 0.316 12.434 0.046 4.195
4 (NN) 0.011 16.415 0.320 12.475 0.008 4.634
Results (Gelatin, training rate 50%)
• The lowest global error rates are achieved with gelatin, where
the liveness measure is accurate
Open Issues
29
• Testing in the presence of unknown spoof materials
• Learning-based
• Certification
• Integration with the matcher
• Performance metrics
Questions?
30

More Related Content

What's hot

Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
Alisha Korpal
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
Mudit Mishra
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
ajith chandran
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognition
Asrarulhaq Maktedar
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Facial expression recognition system : survey
Facial expression recognition system : surveyFacial expression recognition system : survey
Facial expression recognition system : survey
Mohamed Alhmdany
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Clare Nelson, CISSP, CIPP-E
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemThe_Archer
 

What's hot (20)

Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Face recognition
Face recognition Face recognition
Face recognition
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Biometrics
BiometricsBiometrics
Biometrics
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Week6 face detection
Week6 face detectionWeek6 face detection
Week6 face detection
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognition
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Facial expression recognition system : survey
Facial expression recognition system : surveyFacial expression recognition system : survey
Facial expression recognition system : survey
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 

Viewers also liked

Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
AIST
 
GPS[Global Positioning System]
GPS[Global Positioning System]GPS[Global Positioning System]
GPS[Global Positioning System]Ishwar Bulbule
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
Neel Parikh
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
Security Session
 
Face spoofing detection using texture analysis
Face spoofing detection  using texture analysisFace spoofing detection  using texture analysis
Face spoofing detection using texture analysis
SREEKUTTY SREEKUMAR
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
GPS ppt.
GPS ppt. GPS ppt.
GPS ppt.
Jawad Ali
 

Viewers also liked (9)

Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...
 
GPS Signals (1)
GPS Signals (1)GPS Signals (1)
GPS Signals (1)
 
GPS[Global Positioning System]
GPS[Global Positioning System]GPS[Global Positioning System]
GPS[Global Positioning System]
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
 
Face spoofing detection using texture analysis
Face spoofing detection  using texture analysisFace spoofing detection  using texture analysis
Face spoofing detection using texture analysis
 
Gps signal structure
Gps signal structureGps signal structure
Gps signal structure
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
GPS ppt.
GPS ppt. GPS ppt.
GPS ppt.
 

Similar to Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint Analaysis
ANIKLAL2
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
Agbona Azeez
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
ijtsrd
 
E0364024030
E0364024030E0364024030
E0364024030
inventionjournals
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
Abhishek Walia
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
INFOGAIN PUBLICATION
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
Abhishek Kumar
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
Rupinder Saini
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
Arnab Podder
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
ijseajournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESvasim hasina
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Dharmendrasingh417
 

Similar to Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013] (20)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint Analaysis
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
 
E0364024030
E0364024030E0364024030
E0364024030
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
L026070074
L026070074L026070074
L026070074
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 

Recently uploaded

digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 

Recently uploaded (20)

digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 

Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]

  • 1. Anti-Spoofing Algorithms for Fingerprint Systems Emanuela Marasco 12 Lane Department of Computer Science and Electrical Engineering
  • 2. Security of Fingerprint Systems 13 [1] http://nexidbiometrics.com/brazilian-doctor-arrested-for-using-fake-fingerprints/ [2] http://secureidnews.com/news-item/apples-touch-id-spoofed/ • What about Impersonation? • March 2013, Brazilian doctor accused to use spoof fingerprints to check-in co-workers not present at work place • September 2013, the iPhone5S equipped with Touch ID sensor accepted a spoof fingerprint as live Police recovered six silicone fingers After two days only it was released
  • 3. Fingerprint Spoofing • Liveness detection distinguishes live human biometric presentations from spoof artifacts [2],[3],[4] • The liveness of a fingerprint is assessed by a numerical entity 14 [1] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. Optical Security and Counterfeit Deterrence Techniques IV, 4677:275–289, January 2002. [2] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002. Making artificial fingerprints directly from a live finger [1] • Fingerprint systems are vulnerable to spoof presentations [1] [3] D. Yambay, L. Ghiani, P. Denti, G. Marcialis, F. Roli and S. Schuckers. LivDet 2011 – Fingerprint Liveness Detection Competition 2011. The 5th International Conference on Biometrics (ICB), pages 208-215, March 2012. [4] G. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, and S. Schuckers. First international fingerprint liveness detection competition (LivDet09). The 15th International Conference on Image Analysis and Processing (ICIAP), pages 12–23, September 2009.
  • 4. The considered dangerous scenarios 15 http://www2.washjeff.edu/users/ahollandminkley/Biometric/index.htmlThe images are taken from • A person enrolls using a live finger • A spoof artifact of the true finger is used during verification [1] live spoof Enrollment Verification [1] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002.
  • 5. Live or Spoof? 16 Images taken from LivDet09
  • 6. Vulnerability Degree vs. Fingerprint Sensing 17 • Optical sensors: light entering the prism is reflected at valleys and absorbed at the ridges • Physiological vulnerability: materials with light reflectivity similar to that of the skin • Device: differences in ergonomics, arrangement of elements • Capacitive sensors: the finger is modeled as the upper electrode of a capacitor • Fingerprint in gelatin are more dangerous Spoof fingerprints obtained using the same material (silicone) but scanned by two different optical devices (CrossMatch and Biometrika from LivDet09
  • 7. How to make Fingerprint Spoof? 18 • Materials which can be scanned (e.g., play-doh, gelatin, …) [1] S. Schuckers. Spoofing and anti-spoofing measures. Information Security Technical Report, 7(4):56–62, 2002.
  • 10. Texture-based Features 21 Original Image De-noised Image Residual Noise Original Image De-noised Image Residual Noise L I V E S P O O F • Standard deviation of the residual noise • Noise components are due to the coarseness of the fake finger surface
  • 11. Texture-based Features 22 • First order statistics Uniformity of grey levels is less in live
  • 12. Perspiration-based Features 23 • Individual pore spacing 1. Image transformed into the ridge signal 2. Analysis in the Fourier domain 3. Total energy associated to the frequencies corresponding to the spatial frequencies of pores High resolution sensor 1000 dpi • Intensity-based • Spoofs are distributed in the dark • Grey Level (GL) Ratio: # of pixels with GL in (150, 253)/(1,149)
  • 13. Data details 24 DATA SET LivDet13 Dataset Scanner Live Training Samples Live Training Fingers Live Testing Samples Live Testing Fingers 1 Biometrika 1000 200 1000 200 2 Italdata 1000 200 1000 200 DATA SET LivDet13 Dataset Scanner Spoof Training Samples Spoof Training Fingers Spoof Testing Samples Spoof Testing Fingers 1 Biometrika 1000 100 1000 100 2 Italdata 1000 100 1000 100
  • 14. Classification Results 25 • Texture-based • First order statistics • Second order statistics • Power spectrum analysis • Local Binary Pattern • Weber Local Descriptor • Perspiration-based • Intensity-based • Quality-based • Pores-based Marasco and Sansone 2012 [1] • FLR=12.6%; FSA=12.3% LivDet09 databases • FLR=11.61; FSA=6.2% LivDet11 Digital Persona • FLR=11.61; FSA=6.2% LivDet13 Marasco and Sansone [1] combined with Gragnaniello et al. [2] • FLR=11.3; FSA=1.8% LivDet13 Biometrika • FLR=4.9; FSA=2.1% LivDet13 Italdata [1] E. Marasco and C. Sansone. Combining perspiration- and morphology-based static features for fingerprint liveness detection. Pattern Recognition Letters, 33:1148–1156, 2012 [2] C. Sansone D. Gragnaniello, G. Poggi and L. Verdoliva. Fingerprint liveness detection based on weber local image descriptor. IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs), pages 1–5, 2013
  • 15. BBN-based to fuse liveness with match scores 26 BBN: Bayesian Belief Network • The liveness measure is assumed to influence match scores • The joint probability is based on the topology of the network: • IIII identity state • SSSSgggg liveness state of gallery • SSSSpppp liveness state of probe Events: P(I)P(Sg)P(Sp)Sg)|P(lgSp)|P(lpI)lp,lg,|P(m Sg)Sp,I,lg,lp,P(m, =
  • 16. Bayesian Inference 27 From previous slide The probability of identity state is based on both match scores and liveness values Target: given liveness and match scores, what is the probability that both probe and gallery samples pertain to the same identity and both are live samples? lg)lp,P(m, Sg)Sp,I,lg,lp,P(m, lg)lp,m,|SgSp,P(I, = lg)lg)P(lp,lp,|P(m Sg)P(I)Sg)P(Sp)P(|Sp)P(lg|I)P(lplp,lg,|P(m = lp)lg,|P(m I)lp,lg,|P(I)P(m P(lg) Sg)P(Sg)|P(lg P(lp) Sp)P(Sp)|P(lp = lp)lg,|P(m lp)lg,|lg)P(mlp,m,|P(I lg)|Sg(P)lp|Sp(P= lp)lg,m,|P(Ilg)|Sg(P)lp|Sp(P= Independence between andlg lp )lplg,|I(P)I(P =
  • 17. 28 Results (Silicone, training rate 50%) Method Verification FMR% FNMR% Spoof Detection FSAR% FLRR% Global GFAR% GFRR% 4 (FB) 0.103 5.044 5.244 12.516 0.308 14.217 4 (NN) 0.002 5.187 5.297 12.558 0.241 15.696 • Method 1 achieves best spoof detection performance with a less accurate liveness detector Method Verification FMR% FNMR% Spoof Detection FSAR% FLRR% Global GFAR% GFRR% 4 (FB) 0.089 15.866 0.316 12.434 0.046 4.195 4 (NN) 0.011 16.415 0.320 12.475 0.008 4.634 Results (Gelatin, training rate 50%) • The lowest global error rates are achieved with gelatin, where the liveness measure is accurate
  • 18. Open Issues 29 • Testing in the presence of unknown spoof materials • Learning-based • Certification • Integration with the matcher • Performance metrics