Skip to main content

A Survey on Unknown Presentation Attack Detection for Fingerprint

  • Conference paper
  • First Online:
Intelligent Technologies and Applications (INTAP 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1382))

Included in the following conference series:

Abstract

Fingerprint recognition systems are widely deployed in various real-life applications as they have achieved high accuracy. The widely used applications include border control, automated teller machine (ATM), and attendance monitoring systems. However, these critical systems are prone to spoofing attacks (a.k.a presentation attacks (PA)). PA for fingerprint can be performed by presenting gummy fingers made from different materials such as silicone, gelatine, play-doh, ecoflex, 2D printed paper, 3D printed material, or latex. Biometrics Researchers have developed Presentation Attack Detection (PAD) methods as a countermeasure to PA. PAD is usually done by training a machine learning classifier for known attacks for a given dataset, and they achieve high accuracy in this task. However, generalizing to unknown attacks is an essential problem from applicability to real-world systems, mainly because attacks cannot be exhaustively listed in advance. In this survey paper, we present a comprehensive survey on existing PAD algorithms for fingerprint recognition systems, specifically from detecting unknown PAD. We categorize PAD algorithms, point out their advantages/disadvantages, and future directions for this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Information technology - biometric presentation attack detection - part 1: Framework. Standard, International Organization for Standardization, Geneva, CH, iSO 30107–1:2016(E), January 2016

    Google Scholar 

  2. Abhyankar, A., Schuckers, S.: Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recogn. 42(3), 452–464 (2009). https://doi.org/10.1016/j.patcog.2008.06.012. http://www.sciencedirect.com/science/article/pii/S0031320308002458

  3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41 (2009). https://doi.org/10.1145/1541880.1541882

  4. Chugh, T., Jain, A.K.: Fingerprint presentation attack detection: generalization and efficiency. In: 2019 International Conference on Biometrics (ICB), pp. 1–8. IEEE (2019)

    Google Scholar 

  5. Chugh, T., Jain, A.K.: Fingerprint spoof generalization. ArXiv abs/1912.02710 (2019)

    Google Scholar 

  6. Connell, R., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics (2003). https://doi.org/10.1007/978-1-4757-4036-3

  7. Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005) - Volume 1, CVPR 2005, vol. 01, pp. 886–893. IEEE Computer Society, Washington (2005). https://doi.org/10.1109/CVPR.2005.177

  8. Ding, Y., Ross, A.: An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6. IEEE (2016)

    Google Scholar 

  9. Engelsma, J.J., Jain, A.K.: Generalizing fingerprint spoof detector: learning a one-class classifier. arXiv preprint arXiv:1901.03918 (2019)

  10. Faundez-Zanuy, M.: Biometric security technology. IEEE Aerosp. Electron. Syst. Mag. 21, 15–26 (2006). https://doi.org/10.1109/MAES.2006.1662038

  11. Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119–139 (1997). https://doi.org/10.1006/jcss.1997.1504. http://www.sciencedirect.com/science/article/pii/S002200009791504X

  12. Gajawada, R., Popli, A., Chugh, T., Namboodiri, A.M., Jain, A.K.: Universal material translator: towards spoof fingerprint generalization. In: 2019 International Conference on Biometrics (ICB), pp. 1–8 (2019)

    Google Scholar 

  13. Galbally, J., Fierrez, J., Cappelli, R.: An introduction to fingerprint presentation attack detection. In: Marcel, S., Nixon, M.S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing. ACVPR, pp. 3–31. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-92627-8_1

    Chapter  Google Scholar 

  14. Gomez-Barrero, M., Kolberg, J., Busch, C.: Multi-modal fingerprint presentation attack detection: analysing the surface and the inside. In: 2019 International Conference on Biometrics (ICB), pp. 1–8 (2019)

    Google Scholar 

  15. Gomez-Barrero, M., Kolberg, J., Busch, C.: Towards multi-modal finger presentation attack detection. In: 2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 547–552 (2018)

    Google Scholar 

  16. González-Soler, L.J., Chang, L., Hernández-Palancar, J., Pérez-Suárez, A., Gomez-Barrero, M.: Fingerprint presentation attack detection method based on a bag-of-words approach. In: Mendoza, M., Velastín, S. (eds.) CIARP 2017. LNCS, vol. 10657, pp. 263–271. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75193-1_32

    Chapter  Google Scholar 

  17. Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC-3(6), 610–621 (1973)

    Google Scholar 

  18. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778 (2016)

    Google Scholar 

  19. Hussein, M., Spinoulas, L., Xiong, F., Abd-Almageed, W.: Fingerprint presentation attack detection using a novel multi-spectral capture device and patch-based convolutional neural networks, pp. 1–8, December 2018. https://doi.org/10.1109/WIFS.2018.8630773

  20. Jégou, H., Perronnin, F., Douze, M., Sánchez, J., Pérez, P., Schmid, C.: Aggregating local image descriptors into compact codes. IEEE Trans. Pattern Anal. Mach. Intell. 34(9), 1704–1716 (2012)

    Article  Google Scholar 

  21. Madhun, A.S.M.: FiPrAD - A Guideline for Fingerprint Presentation Attack Database Creation (2018). http://hdl.handle.net/11250/2595890. Accessed 09 May 2020

  22. Marasco, E., Sansone, C.: An anti-spoofing technique using multiple textural features in fingerprint scanners. In: 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, pp. 8–14 (2010)

    Google Scholar 

  23. Marasco, E., Ross, A.: A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. 47(2) (2014). https://doi.org/10.1145/2617756

  24. Marasco, E., Sansone, C.: On the robustness of fingerprint liveness detection algorithms against new materials used for spoofing, pp. 553–558, January 2011

    Google Scholar 

  25. Marcel, S., Nixon, M.S., Fierrez, J., Evans, N.: Handbook of Biometric Anti-Spoofing (2019). https://doi.org/10.1007/978-3-319-92627-8_1

  26. Matyáš, V., Říha, Z.: Biometric authentication — security and usability. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 227–239. Springer, Boston, MA (2002). https://doi.org/10.1007/978-0-387-35612-9_17

    Chapter  Google Scholar 

  27. Mehrotra, K.G., Mohan, C.K., Huang, H.M.: Introduction. Anomaly Detection Principles and Algorithms. TSC, pp. 3–19. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67526-8_1

    Chapter  Google Scholar 

  28. Moon, Y.S., Chen, J.S., Chan, K.C., So, K., Woo, K.C.: Wavelet based fingerprint liveness detection. Electron. Lett. 41(20), 1112–1113 (2005)

    Article  Google Scholar 

  29. Mura, V., Ghiani, L., Marcialis, G.L., Roli, F., Yambay, D., Schuckers, S.: LivDet 2015 fingerprint liveness detection competition 2015. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–6 (2015)

    Google Scholar 

  30. news, B.: Doctor ‘used silicone fingers’ to sign in for colleagues (2016). https://www.bbc.com/news/world-latin-america-21756709. Accessed 29 Mar 2020

  31. Nikam, S., S., A.: Curvelet-based fingerprint anti-spoofing. Signal Image Video Process. 4, 75–87 (2010). https://doi.org/10.1007/s11760-008-0098-8

  32. Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002). https://doi.org/10.1109/TPAMI.2002.1017623

    Article  MATH  Google Scholar 

  33. Ojansivu, V., Heikkilä, J.: Blur insensitive texture classification using local phase quantization. In: Elmoataz, A., Lezoray, O., Nouboud, F., Mammass, D. (eds.) ICISP 2008. LNCS, vol. 5099, pp. 236–243. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69905-7_27

    Chapter  Google Scholar 

  34. Park, E., Cui, X., Kim, W., Liu, J., Kim, H.: Patch-based fake fingerprint detection using a fully convolutional neural network with a small number of parameters and an optimal threshold, March 2018

    Google Scholar 

  35. Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. (CSUR) 50(1), 1–37 (2017)

    Article  Google Scholar 

  36. Rattani, A., Scheirer, W.J., Ross, A.: Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans. Inf. Forensics Secur. 10(11), 2447–2460 (2015)

    Article  Google Scholar 

  37. Rattani, A., Ross, A.: Automatic adaptation of fingerprint liveness detector to new spoof materials. In: IEEE International Joint Conference on Biometrics, pp. 1–8 (2014)

    Google Scholar 

  38. Rattani, A., Ross, A.: Minimizing the impact of spoof fabrication material on fingerprint liveness detector, October 2014. https://doi.org/10.1109/ICIP.2014.7026011

  39. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556, September 2014

  40. Soler, L.J.G., Gomez-Barrero, M., Chang, L., Suárez, A.P., Busch, C.: Fingerprint presentation attack detection based on local features encoding for unknown attacks. ArXiv abs/1908.10163 (2019)

    Google Scholar 

  41. Sousedik, C., Busch, C.: Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biometrics 3(4), 219–233 (2014)

    Article  Google Scholar 

  42. Szegedy, C., et al.: Going deeper with convolutions. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–9 (2015)

    Google Scholar 

  43. Sánchez, J., Mensink, T., Verbeek, J.: Image classification with the fisher vector: theory and practice. Int. J. Comput. Vision 105 (2013). https://doi.org/10.1007/s11263-013-0636-x

  44. Tan, B., Lewicke, A., Yambay, D., Schuckers, S.: The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. In: 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010, December 2010. https://doi.org/10.1109/WIFS.2010.5711436

  45. Tan, B., Schuckers, S.: Liveness detection using an intensity based approach in fingerprint scanners (2005)

    Google Scholar 

  46. Thomson, I.: German minister fingered as hacker ‘steals’ her thumbprint from a photo (2014). https://www.theregister.co.uk/2014/12/29/german_minister_fingered_as_hackers_steal_her_thumbprint_from_a_photo/. Accessed 29 Mar 2020

  47. Tolosana, R., Gomez-Barrero, M., Busch, C., Ortega-Garcia, J.: Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans. Inf. Forensics Secur. 15, 1261–1275 (2020)

    Article  Google Scholar 

  48. Tolosana, R., Gomez-Barrero, M., Busch, C., Ortega-Garcia, J.: Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans. Inf. Forensics Secur. PP, 1–1 (2019). https://doi.org/10.1109/TIFS.2019.2934867

  49. Tolosana, R., Gomez-Barrero, M., Kolberg, J., Morales, A., Busch, C., Ortega-Garcia, J.: Towards fingerprint presentation attack detection based on convolutional neural networks and short wave infrared imaging. In: 2018 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–5 (2018)

    Google Scholar 

  50. Toto, S.: Woman uses tape to trick biometric airport fingerprint scan (2009). https://techcrunch.com/2009/01/02/woman-uses-tape-to-trick-biometric-airport-fingerprint-scan/. 29 Mar 2020

  51. Zhang, L., Zhou, Z., Li, H.: Binary Gabor pattern: an efficient and robust descriptor for texture classification, pp. 81–84, September 2012. https://doi.org/10.1109/ICIP.2012.6466800

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jag Mohan Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, J.M., Madhun, A., Li, G., Ramachandra, R. (2021). A Survey on Unknown Presentation Attack Detection for Fingerprint. In: Yildirim Yayilgan, S., Bajwa, I.S., Sanfilippo, F. (eds) Intelligent Technologies and Applications. INTAP 2020. Communications in Computer and Information Science, vol 1382. Springer, Cham. https://doi.org/10.1007/978-3-030-71711-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71711-7_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71710-0

  • Online ISBN: 978-3-030-71711-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics