Skip to main content

A New Multi-filter Framework with Statistical Dense SIFT Descriptor for Spoofing Detection in Fingerprint Authentication Systems

  • Conference paper
  • First Online:
Artificial Intelligence and Soft Computing (ICAISC 2021)

Abstract

Fingerprint-based authentication systems represent what is most common in biometric authentication systems. Today’s simplest tasks, such as unlocking functions on a personal cell phone, may require its owner’s fingerprint. However, along with the advancement of this category of systems, have emerged fraud strategies that aim to guarantee undue access to illegitimate individuals. In this case, one of the most common frauds is that in which the impostor presents manufactured biometry, or spoofing, to the system, simulating the biometry of another user. In this work, we propose a new framework that makes two filtered versions of the fingerprint image in order to increase the amount of information that can be useful in the process of detecting fraud in fingerprint images. Besides, we propose a new texture descriptor based on the well-known dense Scale-Invariant Feature Transform (SIFT): the statistical dense SIFT, in which their descriptors are summarized using a set of signal processing functions. The proposed methodology is evaluated in benchmarks of two editions of LivDet competitions, assuming competitive results in comparison to techniques that configure the state of the art of the problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The CrossMatch sensor has a cataloging error, so we do not consider it in the evaluations.

References

  1. Afandi, F., Sarno, R.: Android application for advanced security system based on voice recognition, biometric authentication, and internet of things. In: 2020 International Conference on Smart Technology and Applications (ICoSTA), pp. 1–6. IEEE (2020)

    Google Scholar 

  2. Agarwal, R., Jalal, A., Arya, K.: A review on presentation attack detection system for fake fingerprint. Mod. Phys. Lett. B 34(05), 2030001 (2020)

    Article  Google Scholar 

  3. Ali, S.S., Baghel, V.S., Ganapathi, I.I., Prakash, S.: Robust biometric authentication system with a secure user template. Image Vis. Comput. 104, 104004 (2020)

    Article  Google Scholar 

  4. Alshdadi, A., Mehboob, R., Dawood, H., Alassafi, M.O., Alghamdi, R., Dawood, H.: Exploiting level 1 and level 3 features of fingerprints for liveness detection. Biomed. Sig. Process. Control 61, 102039 (2020)

    Article  Google Scholar 

  5. Annapurani, K., Sadiq, M., Malathy, C.: Fusion of shape of the ear and tragus-a unique feature extraction method for ear authentication system. Expert Syst. Appl. 42(1), 649–656 (2015)

    Article  Google Scholar 

  6. Bosch, A., Zisserman, A., Munoz, X.: Image classification using random forests and ferns. In: 2007 IEEE 11th International Conference on Computer Vision, pp. 1–8. IEEE (2007)

    Google Scholar 

  7. Cappelli, R., Maio, D., Maltoni, D.: Synthetic fingerprint-database generation. In: Object Recognition Supported by User Interaction for Service Robots, vol. 3, pp. 744–747. IEEE (2002)

    Google Scholar 

  8. Chang, Y., Jung, C., Ke, P., Song, H., Hwang, J.: Automatic contrast-limited adaptive histogram equalization with dual gamma correction. IEEE Access 6, 11782–11792 (2018)

    Article  Google Scholar 

  9. Chugh, T., Cao, K., Jain, A.K.: Fingerprint spoof buster: use of minutiae-centered patches. IEEE Trans. Inf. Forensics Secur. 13(9), 2190–2202 (2018)

    Article  Google Scholar 

  10. Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), vol. 1, pp. 886–893. IEEE (2005)

    Google Scholar 

  11. Dinca, L.M., Hancke, G.P.: The fall of one, the rise of many: a survey on multi-biometric fusion methods. IEEE Access 5, 6247–6289 (2017)

    Article  Google Scholar 

  12. Djebbar, F., Ayad, B.: Energy and entropy based features for wav audio steganalysis. J. Inf. Hiding Multimedia Sig. Process. 8(1), 168–181 (2017)

    Google Scholar 

  13. Erpenbeck, D., et al.: Basic statistics of SIFT features for texture analysis. In: Tolxdorff, T., Deserno, T.M., Handels, H., Meinzer, H.-P. (eds.) Bildverarbeitung für die Medizin 2016. I, pp. 98–103. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49465-3_19

    Chapter  Google Scholar 

  14. Ghiani, L., et al.: LivDet 2013 fingerprint liveness detection competition 2013. In: 2013 International Conference on Biometrics (ICB), pp. 1–6. IEEE (2013)

    Google Scholar 

  15. Ghiani, L., Yambay, D.A., Mura, V., Marcialis, G.L., Roli, F., Schuckers, S.A.: Review of the fingerprint liveness detection (LivDet) competition series: 2009 to 2015. Image Vis. Comput. 58, 110–128 (2017)

    Article  Google Scholar 

  16. Gragnaniello, D., Poggi, G., Sansone, C., Verdoliva, L.: An investigation of local descriptors for biometric spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 849–863 (2015)

    Article  Google Scholar 

  17. Jain, A., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Pattern Recogn. 38(12), 2270–2285 (2005)

    Article  Google Scholar 

  18. Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer, Cham (2007). https://doi.org/10.1007/978-0-387-71041-9

  19. Jain, A.K., Nandakumar, K., Ross, A.: 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recogn. Lett. 79, 80–105 (2016)

    Article  Google Scholar 

  20. Kiefer, R., Stevens, J., Patel, A., Patel, M.: A survey on spoofing detection systems for fake fingerprint presentation attacks. In: Senjyu, T., Mahalle, P.N., Perumal, T., Joshi, A. (eds.) ICTIS 2020. SIST, vol. 195, pp. 315–334. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-7078-0_30

    Chapter  Google Scholar 

  21. Leng, C., Zhang, H., Li, B., Cai, G., Pei, Z., He, L.: Local feature descriptor for image matching: a survey. IEEE Access 7, 6424–6434 (2018)

    Article  Google Scholar 

  22. Liu, C., Yuen, J., Torralba, A.: SIFT flow: dense correspondence across scenes and its applications. IEEE Trans. Pattern Anal. Mach. Intell. 33(5), 978–994 (2010)

    Article  Google Scholar 

  23. Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91–110 (2004)

    Article  Google Scholar 

  24. Marcel, S., Nixon, M.S., Fierrez, J., Evans, N.: Handbook of Biometric Anti-Spoofing: Presentation Attack Detection. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-92627-8

  25. Marcialis, G.L., et al.: First international fingerprint liveness detection competition—LivDet 2009. In: Foggia, P., Sansone, C., Vento, M. (eds.) ICIAP 2009. LNCS, vol. 5716, pp. 12–23. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04146-4_4

    Chapter  Google Scholar 

  26. Medikonda, J., Madasu, H., Panigrahi, B.K.: Information set based gait authentication system. Neurocomputing 207, 1–14 (2016)

    Article  Google Scholar 

  27. Nanni, L., Ghidoni, S., Brahnam, S.: Handcrafted vs. non-handcrafted features for computer vision classification. Pattern Recogn. 71, 158–172 (2017)

    Article  Google Scholar 

  28. Patil, M.S., Patil, S.S.: Wet and dry fingerprint enhancement by using multi resolution technique. In: 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), pp. 188–193. IEEE (2016)

    Google Scholar 

  29. Prasad, P.S., Sunitha Devi, B., Janga Reddy, M., Gunjan, V.K.: A survey of fingerprint recognition systems and their applications. In: Kumar, A., Mozar, S. (eds.) ICCCE 2018. LNEE, vol. 500, pp. 513–520. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-0212-1_53

    Chapter  Google Scholar 

  30. Raja, K.B., Raghavendra, R., Venkatesh, S., Gomez-Barrero, M., Rathgeb, C., Busch, C.: A study of hand-crafted and naturally learned features for fingerprint presentation attack detection. In: Marcel, S., Nixon, M.S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing. ACVPR, pp. 33–48. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-92627-8_2

    Chapter  Google Scholar 

  31. Samma, H., Suandi, S.A.: Transfer learning of pre-trained CNN models for fingerprint liveness detection. In: Biometric Systems. IntechOpen (2020)

    Google Scholar 

  32. Sharma, R.P., Dey, S.: Fingerprint liveness detection using local quality features. Vis. Comput. 35(10), 1393–1410 (2018). https://doi.org/10.1007/s00371-018-01618-x

    Article  Google Scholar 

  33. Silva, E., Boaventura, M., Boaventura, I., Contreras, R.: Face recognition using local mapped pattern and genetic algorithms. In: Proceedings of the International Conference on Pattern Recognition and Artificial Intelligence, pp. 11–17 (2018)

    Google Scholar 

  34. Susan, S., Hanmandlu, M.: Difference theoretic feature set for scale-, illumination-and rotation-invariant texture classification. IET Image Process. 7(8), 725–732 (2013)

    Article  Google Scholar 

  35. Tan, G., Zhang, Q., Hu, H., Zhu, X., Wu, X.: Fingerprint liveness detection based on guided filtering and hybrid image analysis. IET Image Process. 14(9), 1710–1715 (2020)

    Article  Google Scholar 

  36. Too, J., Abdullah, A.R.: A new and fast rival genetic algorithm for feature selection. J. Supercomput., 1–31 (2020). https://doi.org/10.1007/s11227-020-03378-9

  37. Toosi, A., Bottino, A., Cumani, S., Negri, P., Sottile, P.L.: Feature fusion for fingerprint liveness detection: a comparative study. IEEE Access 5, 23695–23709 (2017)

    Article  Google Scholar 

  38. Tripathi, K.: A comparative study of biometric technologies with reference to human interface. Int. J. Comput. Appl. 14(5), 10–15 (2011)

    Google Scholar 

  39. Vedaldi, A., Fulkerson, B.: VLFeat: an open and portable library of computer vision algorithms (2008). http://www.vlfeat.org/

  40. Veerashetty, S., Patil, N.B.: Novel LBP based texture descriptor for rotation, illumination and scale invariance for image texture analysis and classification using multi-kernel SVM. Multimedia Tools Appl. 79(15), 9935–9955 (2020). https://doi.org/10.1007/s11042-019-7345-6

    Article  Google Scholar 

  41. Velapure, A., Talware, R.: Performance analysis of fingerprint recognition using machine learning algorithms. In: Proceedings of the Third International Conference on Computational Intelligence and Informatics, pp. 227–236 (2020)

    Google Scholar 

  42. Yambay, D., Ghiani, L., Marcialis, G.L., Roli, F., Schuckers, S.: Review of fingerprint presentation attack detection competitions. In: Marcel, S., Nixon, M.S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing. ACVPR, pp. 109–131. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-92627-8_5

    Chapter  Google Scholar 

  43. Yuan, C., Xia, Z., Sun, X., Wu, Q.J.: Deep residual network with adaptive learning framework for fingerprint liveness detection. IEEE Trans. Cogn. Dev. Syst. 12(3), 461–473 (2019)

    Article  Google Scholar 

  44. Zafar, M.R., Shah, M.A.: Fingerprint authentication and security risks in smart devices. In: 2016 22nd International Conference on Automation and Computing (ICAC), pp. 548–553. IEEE (2016)

    Google Scholar 

  45. Zhang, Y., Zhou, B., Wu, H., Wen, C.: 2D fake fingerprint detection based on improved CNN and local descriptors for smart phone. In: You, Z., et al. (eds.) CCBR 2016. LNCS, vol. 9967, pp. 655–662. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46654-5_72

    Chapter  Google Scholar 

  46. Zheng, T.F., Li, L.: Robustness-Related Issues in Speaker Recognition. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-3238-7

Download references

Acknowledgments

This study was financed in part by the São Paulo Research Foundation (FAPESP), process #15/14358-0, by the Brazilian National Council for Scientific and Technological Development (CNPq), process #381991/2020-2, and by the “Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - Brasil” (CAPES) - Finance Code 001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rodrigo Colnago Contreras .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Contreras, R.C., Nonato, L.G., Boaventura, M., Boaventura, I.A.G., Coelho, B.G., Viana, M.S. (2021). A New Multi-filter Framework with Statistical Dense SIFT Descriptor for Spoofing Detection in Fingerprint Authentication Systems. In: Rutkowski, L., Scherer, R., Korytkowski, M., Pedrycz, W., Tadeusiewicz, R., Zurada, J.M. (eds) Artificial Intelligence and Soft Computing. ICAISC 2021. Lecture Notes in Computer Science(), vol 12855. Springer, Cham. https://doi.org/10.1007/978-3-030-87897-9_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-87897-9_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-87896-2

  • Online ISBN: 978-3-030-87897-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics