Skip to main content
Log in

Dynamic differential annealing-based anti-spoofing model for fingerprint detection using CNN

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Data security and privacy play a significant role in human life over the past few years. In the present digital era, advanced technologies utilize wide reliance and ubiquity to assist the counter theft system. Due to the enhanced crime rate, determining the solution becomes a burdensome process to recognize the fingerprint. To overcome such shortcomings, this paper proposes a convolution neural network and dynamic differential annealing (CNN-DDA)-based spoofed fingerprint detection. Here a CNN-DDA approach is proposed to analyze and evaluate the false or forged fingerprint concerning spoof forgery authentication system. The main intention of CNN-DDA architecture employs in investigating a complicated and problematic relationship among various features thus enabling highly detailed features. The proposed CNN-DDA-based spoofed fingerprint detection uses various datasets namely LivDet 2015 and LivDet 2013 for evaluation. Also, the real image set is captured using various fingerprint scanners such as Gelatine, wood glue, ecoflex and modasil. The experimental analysis is conducted for various evaluation measures such as accuracy rate, classification error value rate and processing time. The results revealed that the proposed approach provides high spoofed fingerprint detection with a better accuracy rate, less processing time and classification error.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Abbreviations

\(M_{{{\text{KJ}}}}^{P}\) :

Weight function between the \(J\,{\text{th}}\) output map and the \(K\,{\text{th}}\) input map

\(Z_{J}^{P}\) :

\(J\,{\text{th}}\) Output feature map present in the \(P\,{\text{th}}\) layer

\(Z_{K}^{P - 1}\) :

\(K\,{\text{th}}\) Output feature map present in the \((P - 1){\text{th}}\) layer

\(*\) :

Bias value

\(F\) :

Activation function

\(D_{P}^{J}\) :

Convolution operation

\(d_{w}\) :

Maximum pool sub-sampling function

\(\gamma_{J}^{P}\) :

Bias function of pooling layer

\(Z_{{}}^{P - 1}\) :

The input vector

\(Z_{{}}^{P}\) :

Final output vectors

\(D_{{}}^{J}\) :

Bias function of fully connected layer

\(w^{p}\) :

Weight among the \(P\,{\text{th}}\) layer and the \((P - 1){\text{th}}\) layer

\(N_{S}^{J}\) :

New solution with respect to J iteration number

\(R_{{{\text{GS}}}}^{{}}\) :

Randomly generated solution

\(R_{{{\text{CS}}}}^{K} \,{\text{and}}\,\,R_{{{\text{CS}}}}^{I}\) :

Randomly chosen solution in terms of K and I index

\(\Delta t\) :

Temperature change

\(F_{G}\) :

Forging parameter

\(R\;{\text{and}}\;{\text{Re}}\) :

Random and the remainder value

\({\text{Pr}}\) :

Probability rate

\(S_{P}\) :

Sub population

\(\Delta D\) :

Fitness value differences

p :

Size of the population

t :

Temperature variable

\(S_{F}\) :

Scaling factor

\(A_{R}\) :

Accuracy

\(n({\text{TF}})\,\,{\text{and}}\,\,n({\text{FF}})\) :

Number of the corrected and false fingerprint

\(n(x)\) :

Total number of fingerprint images recognized as true

\(n(y)\) :

Total number of fingerprint images recognized as false

\(A_{{{\text{TF}}}}\) :

True fingerprint accuracy

\(A_{{{\text{FF}}}}\) :

False fingerprint accuracy

\(E_{{{\text{HTR}}}}\) :

Half total error

\(F_{{{\text{AR}}}}\) :

False acceptance rate

References

  1. Prasad PS, Devi BS, Reddy MJ, Gunjan VK (2018) A survey of fingerprint recognition systems and their applications. In: international conference on communications and cyber physical engineering 2018, Springer, pp. 513–520

  2. Gupta P, Tiwari K, Arora G (2019) Fingerprint indexing schemes–a survey. Neurocomputing 335:352–365

    Article  Google Scholar 

  3. Jose, J., Gautam, N., Tiwari, M., Tiwari, T., Suresh, A., Sundararaj, V. and Rejeesh, M.R., 2021. An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion. Biomedical Signal Processing and Control, 66, p.102480.

  4. Anand V, Kanhangad V (2020) PoreNet: CNN-based pore descriptor for high-resolution fingerprint recognition. IEEE Sens J. https://doi.org/10.1109/JSEN.2020.2987287

    Article  Google Scholar 

  5. Webb L, Mathekga M (2014) Towards a complete rule-based classification approach for flat fingerprints. In: 2nd international symposium on computing and networking, pp 549–555. IEEE

  6. Hu C, Yin J, Zhu E, Chen H, Li Y (2010) A composite fingerprint segmentation based on log-gaborfilter and orientation reliability. In: 17Th IEEE international conference on image processing, pp 3097–3100. IEEE

  7. Saad MA, Pinson MH, Nicholas DG, Van Kets N, Van Wallendael G, Da Silva R, Jaladi RV, Corriveau PJ (2015) Impact of camera pixel count and monitor resolution perceptual image quality. In: colour and visual computing symposium (CVCS), pp 1–6. IEEE

  8. Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619

    Article  Google Scholar 

  9. Ring T (2015) Spoofing: are the hackers beating biometrics? Biometric Technol Today 2015:5–9

    Article  Google Scholar 

  10. Marasco E, Ross A (2015) A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput Surv (CSUR) 47(2):28

    Article  Google Scholar 

  11. Liu F, Liu G, Zhao Q, Shen L (2020) Robust and high-security fingerprint recognition system using optical coherence tomography. Neurocomputing 402:14–28

    Article  Google Scholar 

  12. Uliyan Diaa M, Sadeghi S, Jalab HA (2020) Anti-spoofing method for fingerprint recognition using patch based deep learning machine. Eng Sci Technolo Int J 23(2):264–273

    Google Scholar 

  13. Tofiq AB, Abdulhameed OY (2020) Fingerprint recognition based on shark smell optimization and genetic algorithm. Int J Adv Intell Inf 6(2):123–134

    Google Scholar 

  14. Kai C, Jain AK (2018) Automated latent fingerprint recognition. IEEE Trans Pattern Anal Mach Intell 41(4):788–800

    Google Scholar 

  15. Alsmirat Mohammad A, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688

    Article  Google Scholar 

  16. Chenhao L, Kumar A (2018) Contactless and partial 3D fingerprint recognition using multi-view deep representation. Pattern Recogn 83:314–327

    Article  Google Scholar 

  17. Sameh I, Egila MG, Shawky H, Elsaid MKH, El-Shafai W, Fathi E, El-Samie A (2020) Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption. Multimed Tools Appl 79(19):14053–14078

    Google Scholar 

  18. Szymkowski M, Saeed K (2017) A multimodal face and fingerprint recognition biometrics system. In: IFIP international conference on computer information systems and industrial management (pp. 131–140). Springer, Cham

  19. Genovese A, E Munoz, V Piuri, F Scotti, G Sforza (2016) Towards touchless pore fingerprint biometrics: a neural approach. In: 2016 IEEE congress on evolutionary computation (CEC), pp. 4265–4272. IEEE

  20. Yuanrong Xu, Guangming Lu, Yao Lu, Zhang D (2019) High resolution fingerprint recognition using pore and edge descriptors. Pattern Recogn Lett 125:773–779

    Article  Google Scholar 

  21. Haixiang Z, Liu L, Sun Li, Cheng L, Wei Z, Sun G (2020) Short-term global horizontal irradiance forecasting based on a hybrid CNN-LSTM model with spatiotemporal correlations. Renew Energy 160:26–41

    Article  Google Scholar 

  22. Ji S, Xu W, Yang M, Yu K (2012) 3D convolutional neural networks for human action recognition. IEEE Trans Pattern Anal Mach Intell 35(1):221–231

    Article  Google Scholar 

  23. Suppan C, Hebesberger T, Pichler A, Rehrl J, Kolednik O (2018) On the microstructure control of the bendability of advanced high strength steels. Mater Sci Eng A 735:89–98

    Article  Google Scholar 

  24. Sun W, Wu Y, Yang S, Hutchinson C (2018) Advanced high strength steel (AHSS) development through chemical patterning of austenite. Scr Mater 146:60–63

    Article  Google Scholar 

  25. Ghafil HN, Jármai K (2020) Dynamic differential annealed optimization: new metaheuristic optimization algorithm for engineering applications. Appl Soft Comput 93:106392

    Article  Google Scholar 

  26. Xing EP, MI Jordan, S Russell (2012) A generalized mean field algorithm for variational inference in exponential families. arXiv preprint arXiv: 1212.2512

  27. Yang J, H Yu, W Kunz (2000) An efficient LDA algorithm for face recognition. In: proceedings of the international conference on automation, robotics, and computer vision (ICARCV 2000), pp. 34–47

  28. Jianping G, Lan Du, Zhang Y, Xiong T (2012) A new distance-weighted k-nearest neighbor classifier. J Inf Comput Sci 9(6):1429–1436

    Google Scholar 

  29. Ghiani L et al (2017) Review of the fingerprint liveness detection (LivDet) competition series: 2009 to 2015. Image Vis Comput 58:110–128

    Article  Google Scholar 

  30. Mura V et al., (2017) LivDet 2017 fingerprint liveness detection competition. In: 2017, international conference on biometrics (ICB), IEEE, 2018

  31. Ghiani L et al., (2013) Livdet 2013 fingerprint liveness detection competition. In: international conference on biometrics (ICB), IEEE

  32. Nogueira RF, de AlencarLotufo R, Machado RC (2014) Evaluating software-based fingerprint liveness detection using convolutional networks and local binary patterns. In: biometric measurements and systems for security and medical applications (BIOMS) proceedings, 2014 IEEE Workshop, IEEE

  33. Nikam SB, S Agarwal (2008) Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems. In: 2008 first international conference on emerging trends in engineering and technology, pp. 675–680. IEEE

  34. Jiang Y, Liu X (2015) Spoof fingerprint detection based on co-occurrence matrix. Int J Signal Process Image Process Pattern Recogn 8(8):373–384

    Google Scholar 

  35. Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126

    Google Scholar 

  36. Sundararaj V (2019) Optimal task assignment in mobile cloud computing by queue based Ant-Bee algorithm. Wirel Pers Commun 104(1):173–197

    Article  Google Scholar 

  37. Sundararaj V (2019) Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int J Biomed Eng Technol 31(4):325–345

    Article  Google Scholar 

  38. Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288

    Article  Google Scholar 

  39. Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, MR R, Sundararaj R (2020) CCGPA-MPPT: cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Progr Photovolt Res Appl 28(11):1128–1145

    Article  Google Scholar 

  40. Nanjappan M, Natesan G, Krishnadoss P (2021) An adaptive neuro-fuzzy inference system and black widow optimization approach for optimal resource utilization and task scheduling in a cloud environment. Wireless Pers Commun 121(3):1891–1916. https://doi.org/10.1007/s11277-021-08744-1

    Article  Google Scholar 

  41. Jerald Nirmal Kumar S, Ravimaran S, Gowthul Alam MM (2020) An effective non-commutative encryption approach with optimized genetic algorithm for ensuring data protection in cloud computing. Comput Model Eng Sci 125(2):671–697. https://doi.org/10.32604/cmes.2020.09361

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Uma Maheswari.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maheswari, B.U., Rajakumar, M.P. & Ramya, J. Dynamic differential annealing-based anti-spoofing model for fingerprint detection using CNN. Neural Comput & Applic 34, 8617–8633 (2022). https://doi.org/10.1007/s00521-021-06758-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-021-06758-1

Keywords

Navigation