Abstract
Fingerprint recognition systems are widely deployed in various real-life applications as they have achieved high accuracy. The widely used applications include border control, automated teller machine (ATM), and attendance monitoring systems. However, these critical systems are prone to spoofing attacks (a.k.a presentation attacks (PA)). PA for fingerprint can be performed by presenting gummy fingers made from different materials such as silicone, gelatine, play-doh, ecoflex, 2D printed paper, 3D printed material, or latex. Biometrics Researchers have developed Presentation Attack Detection (PAD) methods as a countermeasure to PA. PAD is usually done by training a machine learning classifier for known attacks for a given dataset, and they achieve high accuracy in this task. However, generalizing to unknown attacks is an essential problem from applicability to real-world systems, mainly because attacks cannot be exhaustively listed in advance. In this survey paper, we present a comprehensive survey on existing PAD algorithms for fingerprint recognition systems, specifically from detecting unknown PAD. We categorize PAD algorithms, point out their advantages/disadvantages, and future directions for this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Information technology - biometric presentation attack detection - part 1: Framework. Standard, International Organization for Standardization, Geneva, CH, iSO 30107–1:2016(E), January 2016
Abhyankar, A., Schuckers, S.: Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recogn. 42(3), 452–464 (2009). https://doi.org/10.1016/j.patcog.2008.06.012. http://www.sciencedirect.com/science/article/pii/S0031320308002458
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41 (2009). https://doi.org/10.1145/1541880.1541882
Chugh, T., Jain, A.K.: Fingerprint presentation attack detection: generalization and efficiency. In: 2019 International Conference on Biometrics (ICB), pp. 1–8. IEEE (2019)
Chugh, T., Jain, A.K.: Fingerprint spoof generalization. ArXiv abs/1912.02710 (2019)
Connell, R., Pankanti, S., Ratha, N., Senior, A.: Guide to Biometrics (2003). https://doi.org/10.1007/978-1-4757-4036-3
Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005) - Volume 1, CVPR 2005, vol. 01, pp. 886–893. IEEE Computer Society, Washington (2005). https://doi.org/10.1109/CVPR.2005.177
Ding, Y., Ross, A.: An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6. IEEE (2016)
Engelsma, J.J., Jain, A.K.: Generalizing fingerprint spoof detector: learning a one-class classifier. arXiv preprint arXiv:1901.03918 (2019)
Faundez-Zanuy, M.: Biometric security technology. IEEE Aerosp. Electron. Syst. Mag. 21, 15–26 (2006). https://doi.org/10.1109/MAES.2006.1662038
Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119–139 (1997). https://doi.org/10.1006/jcss.1997.1504. http://www.sciencedirect.com/science/article/pii/S002200009791504X
Gajawada, R., Popli, A., Chugh, T., Namboodiri, A.M., Jain, A.K.: Universal material translator: towards spoof fingerprint generalization. In: 2019 International Conference on Biometrics (ICB), pp. 1–8 (2019)
Galbally, J., Fierrez, J., Cappelli, R.: An introduction to fingerprint presentation attack detection. In: Marcel, S., Nixon, M.S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing. ACVPR, pp. 3–31. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-92627-8_1
Gomez-Barrero, M., Kolberg, J., Busch, C.: Multi-modal fingerprint presentation attack detection: analysing the surface and the inside. In: 2019 International Conference on Biometrics (ICB), pp. 1–8 (2019)
Gomez-Barrero, M., Kolberg, J., Busch, C.: Towards multi-modal finger presentation attack detection. In: 2018 14th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 547–552 (2018)
González-Soler, L.J., Chang, L., Hernández-Palancar, J., Pérez-Suárez, A., Gomez-Barrero, M.: Fingerprint presentation attack detection method based on a bag-of-words approach. In: Mendoza, M., Velastín, S. (eds.) CIARP 2017. LNCS, vol. 10657, pp. 263–271. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-75193-1_32
Haralick, R.M., Shanmugam, K., Dinstein, I.: Textural features for image classification. IEEE Trans. Syst. Man Cybern. SMC-3(6), 610–621 (1973)
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778 (2016)
Hussein, M., Spinoulas, L., Xiong, F., Abd-Almageed, W.: Fingerprint presentation attack detection using a novel multi-spectral capture device and patch-based convolutional neural networks, pp. 1–8, December 2018. https://doi.org/10.1109/WIFS.2018.8630773
Jégou, H., Perronnin, F., Douze, M., Sánchez, J., Pérez, P., Schmid, C.: Aggregating local image descriptors into compact codes. IEEE Trans. Pattern Anal. Mach. Intell. 34(9), 1704–1716 (2012)
Madhun, A.S.M.: FiPrAD - A Guideline for Fingerprint Presentation Attack Database Creation (2018). http://hdl.handle.net/11250/2595890. Accessed 09 May 2020
Marasco, E., Sansone, C.: An anti-spoofing technique using multiple textural features in fingerprint scanners. In: 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, pp. 8–14 (2010)
Marasco, E., Ross, A.: A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. 47(2) (2014). https://doi.org/10.1145/2617756
Marasco, E., Sansone, C.: On the robustness of fingerprint liveness detection algorithms against new materials used for spoofing, pp. 553–558, January 2011
Marcel, S., Nixon, M.S., Fierrez, J., Evans, N.: Handbook of Biometric Anti-Spoofing (2019). https://doi.org/10.1007/978-3-319-92627-8_1
Matyáš, V., Říha, Z.: Biometric authentication — security and usability. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security. ITIFIP, vol. 100, pp. 227–239. Springer, Boston, MA (2002). https://doi.org/10.1007/978-0-387-35612-9_17
Mehrotra, K.G., Mohan, C.K., Huang, H.M.: Introduction. Anomaly Detection Principles and Algorithms. TSC, pp. 3–19. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67526-8_1
Moon, Y.S., Chen, J.S., Chan, K.C., So, K., Woo, K.C.: Wavelet based fingerprint liveness detection. Electron. Lett. 41(20), 1112–1113 (2005)
Mura, V., Ghiani, L., Marcialis, G.L., Roli, F., Yambay, D., Schuckers, S.: LivDet 2015 fingerprint liveness detection competition 2015. In: 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–6 (2015)
news, B.: Doctor ‘used silicone fingers’ to sign in for colleagues (2016). https://www.bbc.com/news/world-latin-america-21756709. Accessed 29 Mar 2020
Nikam, S., S., A.: Curvelet-based fingerprint anti-spoofing. Signal Image Video Process. 4, 75–87 (2010). https://doi.org/10.1007/s11760-008-0098-8
Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 971–987 (2002). https://doi.org/10.1109/TPAMI.2002.1017623
Ojansivu, V., Heikkilä, J.: Blur insensitive texture classification using local phase quantization. In: Elmoataz, A., Lezoray, O., Nouboud, F., Mammass, D. (eds.) ICISP 2008. LNCS, vol. 5099, pp. 236–243. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69905-7_27
Park, E., Cui, X., Kim, W., Liu, J., Kim, H.: Patch-based fake fingerprint detection using a fully convolutional neural network with a small number of parameters and an optimal threshold, March 2018
Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surv. (CSUR) 50(1), 1–37 (2017)
Rattani, A., Scheirer, W.J., Ross, A.: Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans. Inf. Forensics Secur. 10(11), 2447–2460 (2015)
Rattani, A., Ross, A.: Automatic adaptation of fingerprint liveness detector to new spoof materials. In: IEEE International Joint Conference on Biometrics, pp. 1–8 (2014)
Rattani, A., Ross, A.: Minimizing the impact of spoof fabrication material on fingerprint liveness detector, October 2014. https://doi.org/10.1109/ICIP.2014.7026011
Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556, September 2014
Soler, L.J.G., Gomez-Barrero, M., Chang, L., Suárez, A.P., Busch, C.: Fingerprint presentation attack detection based on local features encoding for unknown attacks. ArXiv abs/1908.10163 (2019)
Sousedik, C., Busch, C.: Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biometrics 3(4), 219–233 (2014)
Szegedy, C., et al.: Going deeper with convolutions. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–9 (2015)
Sánchez, J., Mensink, T., Verbeek, J.: Image classification with the fisher vector: theory and practice. Int. J. Comput. Vision 105 (2013). https://doi.org/10.1007/s11263-013-0636-x
Tan, B., Lewicke, A., Yambay, D., Schuckers, S.: The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. In: 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010, December 2010. https://doi.org/10.1109/WIFS.2010.5711436
Tan, B., Schuckers, S.: Liveness detection using an intensity based approach in fingerprint scanners (2005)
Thomson, I.: German minister fingered as hacker ‘steals’ her thumbprint from a photo (2014). https://www.theregister.co.uk/2014/12/29/german_minister_fingered_as_hackers_steal_her_thumbprint_from_a_photo/. Accessed 29 Mar 2020
Tolosana, R., Gomez-Barrero, M., Busch, C., Ortega-Garcia, J.: Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans. Inf. Forensics Secur. 15, 1261–1275 (2020)
Tolosana, R., Gomez-Barrero, M., Busch, C., Ortega-Garcia, J.: Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans. Inf. Forensics Secur. PP, 1–1 (2019). https://doi.org/10.1109/TIFS.2019.2934867
Tolosana, R., Gomez-Barrero, M., Kolberg, J., Morales, A., Busch, C., Ortega-Garcia, J.: Towards fingerprint presentation attack detection based on convolutional neural networks and short wave infrared imaging. In: 2018 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–5 (2018)
Toto, S.: Woman uses tape to trick biometric airport fingerprint scan (2009). https://techcrunch.com/2009/01/02/woman-uses-tape-to-trick-biometric-airport-fingerprint-scan/. 29 Mar 2020
Zhang, L., Zhou, Z., Li, H.: Binary Gabor pattern: an efficient and robust descriptor for texture classification, pp. 81–84, September 2012. https://doi.org/10.1109/ICIP.2012.6466800
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Singh, J.M., Madhun, A., Li, G., Ramachandra, R. (2021). A Survey on Unknown Presentation Attack Detection for Fingerprint. In: Yildirim Yayilgan, S., Bajwa, I.S., Sanfilippo, F. (eds) Intelligent Technologies and Applications. INTAP 2020. Communications in Computer and Information Science, vol 1382. Springer, Cham. https://doi.org/10.1007/978-3-030-71711-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-71711-7_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71710-0
Online ISBN: 978-3-030-71711-7
eBook Packages: Computer ScienceComputer Science (R0)