Anomaly Detection with Convolutional Autoencoders for Fingerprint
Presentation Attack Detection
- URL: http://arxiv.org/abs/2008.07989v2
- Date: Mon, 19 Oct 2020 14:08:47 GMT
- Title: Anomaly Detection with Convolutional Autoencoders for Fingerprint
Presentation Attack Detection
- Authors: Jascha Kolberg and Marcel Grimmer and Marta Gomez-Barrero and
Christoph Busch
- Abstract summary: Presentation attack detection (PAD) methods are used to determine whether samples stem from a bona fide subject or from a presentation attack instrument (PAI)
We propose a new PAD technique based on autoencoders (AEs) trained only on bona fide samples (i.e. one-class) captured in the short wave infrared domain.
- Score: 11.879849130630406
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In recent years, the popularity of fingerprint-based biometric authentication
systems significantly increased. However, together with many advantages,
biometric systems are still vulnerable to presentation attacks (PAs). In
particular, this applies for unsupervised applications, where new attacks
unknown to the system operator may occur. Therefore, presentation attack
detection (PAD) methods are used to determine whether samples stem from a bona
fide subject or from a presentation attack instrument (PAI). In this context,
most works are dedicated to solve PAD as a two-class classification problem,
which includes training a model on both bona fide and PA samples. In spite of
the good detection rates reported, these methods still face difficulties
detecting PAIs from unknown materials. To address this issue, we propose a new
PAD technique based on autoencoders (AEs) trained only on bona fide samples
(i.e. one-class), which are captured in the short wave infrared domain. On the
experimental evaluation over a database of 19,711 bona fide and 4,339 PA images
including 45 different PAI species, a detection equal error rate (D-EER) of
2.00% was achieved. Additionally, our best performing AE model is compared to
further one-class classifiers (support vector machine, Gaussian mixture model).
The results show the effectiveness of the AE model as it significantly
outperforms the previously proposed methods.
Related papers
- Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models [8.979820109339286]
Smartphone-based contactless fingerphoto authentication has become a reliable alternative to traditional contact-based fingerprint biometric systems.
Despite its convenience, fingerprint authentication through fingerphotos is more vulnerable to presentation attacks.
We propose a novel unsupervised approach based on a state-of-the-art deep-learning-based diffusion model, the Denoising Probabilistic Diffusion Model (DDPM)
The proposed approach detects Presentation Attacks (PA) by calculating the reconstruction similarity between the input and output pairs of the DDPM.
arXiv Detail & Related papers (2024-09-27T11:07:48Z) - AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - Contactless Fingerprint Biometric Anti-Spoofing: An Unsupervised Deep
Learning Approach [0.0]
We introduce an innovative anti-spoofing approach that combines an unsupervised autoencoder with a convolutional block attention module.
The scheme has achieved an average BPCER of 0.96% with an APCER of 1.6% for presentation attacks involving various types of spoofed samples.
arXiv Detail & Related papers (2023-11-07T17:19:59Z) - Unleashing Mask: Explore the Intrinsic Out-of-Distribution Detection
Capability [70.72426887518517]
Out-of-distribution (OOD) detection is an indispensable aspect of secure AI when deploying machine learning models in real-world applications.
We propose a novel method, Unleashing Mask, which aims to restore the OOD discriminative capabilities of the well-trained model with ID data.
Our method utilizes a mask to figure out the memorized atypical samples, and then finetune the model or prune it with the introduced mask to forget them.
arXiv Detail & Related papers (2023-06-06T14:23:34Z) - Threatening Patch Attacks on Object Detection in Optical Remote Sensing
Images [55.09446477517365]
Advanced Patch Attacks (PAs) on object detection in natural images have pointed out the great safety vulnerability in methods based on deep neural networks.
We propose a more Threatening PA without the scarification of the visual quality, dubbed TPA.
To the best of our knowledge, this is the first attempt to study the PAs on object detection in O-RSIs, and we hope this work can get our readers interested in studying this topic.
arXiv Detail & Related papers (2023-02-13T02:35:49Z) - MixDefense: A Defense-in-Depth Framework for Adversarial Example
Detection Based on Statistical and Semantic Analysis [14.313178290347293]
We propose a multilayer defense-in-depth framework for AE detection, namely MixDefense.
We leverage the noise' features extracted from the inputs to discover the statistical difference between natural images and tampered ones for AE detection.
We show that the proposed MixDefense solution outperforms the existing AE detection techniques by a considerable margin.
arXiv Detail & Related papers (2021-04-20T15:57:07Z) - Detection of Adversarial Supports in Few-shot Classifiers Using Feature
Preserving Autoencoders and Self-Similarity [89.26308254637702]
We propose a detection strategy to highlight adversarial support sets.
We make use of feature preserving autoencoder filtering and also the concept of self-similarity of a support set to perform this detection.
Our method is attack-agnostic and also the first to explore detection for few-shot classifiers to the best of our knowledge.
arXiv Detail & Related papers (2020-12-09T14:13:41Z) - On the Generalisation Capabilities of Fingerprint Presentation Attack
Detection Methods in the Short Wave Infrared Domain [13.351759885287526]
Presentation attack detection methods are of utmost importance in order to distinguish between bona fide and attack presentations.
We evaluate the generalisability of multiple PAD algorithms on a dataset of 19,711 bona fide and 4,339 PA samples, including 45 different PAI species.
arXiv Detail & Related papers (2020-10-19T14:50:24Z) - Anomaly Detection-Based Unknown Face Presentation Attack Detection [74.4918294453537]
Anomaly detection-based spoof attack detection is a recent development in face Presentation Attack Detection.
In this paper, we present a deep-learning solution for anomaly detection-based spoof attack detection.
The proposed approach benefits from the representation learning power of the CNNs and learns better features for fPAD task.
arXiv Detail & Related papers (2020-07-11T21:20:55Z) - A Survey on Unknown Presentation Attack Detection for Fingerprint [4.424609902825527]
Biometrics researchers have developed Presentation Attack Detection (PAD) methods as a countermeasure to presentation attacks (PA)
PAD is usually done by training a machine learning classifier for known attacks for a given dataset, and they achieve high accuracy.
We present a comprehensive survey on existing PAD algorithms for fingerprint recognition systems, specifically from the standpoint of detecting unknown PAD.
arXiv Detail & Related papers (2020-05-17T18:46:23Z) - Unsupervised Anomaly Detection with Adversarial Mirrored AutoEncoders [51.691585766702744]
We propose a variant of Adversarial Autoencoder which uses a mirrored Wasserstein loss in the discriminator to enforce better semantic-level reconstruction.
We put forward an alternative measure of anomaly score to replace the reconstruction-based metric.
Our method outperforms the current state-of-the-art methods for anomaly detection on several OOD detection benchmarks.
arXiv Detail & Related papers (2020-03-24T08:26:58Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.