A Universal Anti-Spoofing Approach for Contactless Fingerprint Biometric
Systems
- URL: http://arxiv.org/abs/2310.15044v1
- Date: Mon, 23 Oct 2023 15:46:47 GMT
- Title: A Universal Anti-Spoofing Approach for Contactless Fingerprint Biometric
Systems
- Authors: Banafsheh Adami, Sara Tehranipoor, Nasser Nasrabadi, and Nima Karimian
- Abstract summary: We propose a universal presentation attack detection method for contactless fingerprints.
We generated synthetic contactless fingerprints using StyleGAN from live finger photos and integrating them to train a semi-supervised ResNet-18 model.
A novel joint loss function, combining the Arcface and Center loss, is introduced with a regularization to balance between the two loss functions.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the increasing integration of smartphones into our daily lives,
fingerphotos are becoming a potential contactless authentication method. While
it offers convenience, it is also more vulnerable to spoofing using various
presentation attack instruments (PAI). The contactless fingerprint is an
emerging biometric authentication but has not yet been heavily investigated for
anti-spoofing. While existing anti-spoofing approaches demonstrated fair
results, they have encountered challenges in terms of universality and
scalability to detect any unseen/unknown spoofed samples. To address this
issue, we propose a universal presentation attack detection method for
contactless fingerprints, despite having limited knowledge of presentation
attack samples. We generated synthetic contactless fingerprints using StyleGAN
from live finger photos and integrating them to train a semi-supervised
ResNet-18 model. A novel joint loss function, combining the Arcface and Center
loss, is introduced with a regularization to balance between the two loss
functions and minimize the variations within the live samples while enhancing
the inter-class variations between the deepfake and live samples. We also
conducted a comprehensive comparison of different regularizations' impact on
the joint loss function for presentation attack detection (PAD) and explored
the performance of a modified ResNet-18 architecture with different activation
functions (i.e., leaky ReLU and RelU) in conjunction with Arcface and center
loss. Finally, we evaluate the performance of the model using unseen types of
spoof attacks and live data. Our proposed method achieves a Bona Fide
Classification Error Rate (BPCER) of 0.12\%, an Attack Presentation
Classification Error Rate (APCER) of 0.63\%, and an Average Classification
Error Rate (ACER) of 0.37\%.
Related papers
- AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - Presentation Attack detection using Wavelet Transform and Deep Residual
Neural Net [5.425986555749844]
Biometric substances can be deceived by the imposters in several ways.
The bio-metric images, especially the iris and face, are vulnerable to different presentation attacks.
This research applies deep learning approaches to mitigate presentation attacks in a biometric access control system.
arXiv Detail & Related papers (2023-11-23T20:21:49Z) - Contactless Fingerprint Biometric Anti-Spoofing: An Unsupervised Deep
Learning Approach [0.0]
We introduce an innovative anti-spoofing approach that combines an unsupervised autoencoder with a convolutional block attention module.
The scheme has achieved an average BPCER of 0.96% with an APCER of 1.6% for presentation attacks involving various types of spoofed samples.
arXiv Detail & Related papers (2023-11-07T17:19:59Z) - SAM Meets UAP: Attacking Segment Anything Model With Universal Adversarial Perturbation [61.732503554088524]
We investigate whether it is possible to attack Segment Anything Model (SAM) with image-aversagnostic Universal Adrial Perturbation (UAP)
We propose a novel perturbation-centric framework that results in a UAP generation method based on self-supervised contrastive learning (CL)
The effectiveness of our proposed CL-based UAP generation method is validated by both quantitative and qualitative results.
arXiv Detail & Related papers (2023-10-19T02:49:24Z) - An Open Patch Generator based Fingerprint Presentation Attack Detection
using Generative Adversarial Network [3.5558308387389626]
Presentation Attack (PA) or spoofing is one of the threats caused by presenting a spoof of a genuine fingerprint to the sensor of Automatic Fingerprint Recognition Systems (AFRS)
This paper proposes a CNN based technique that uses a Generative Adversarial Network (GAN) to augment the dataset with spoof samples generated from the proposed Open Patch Generator (OPG)
An overall accuracy of 96.20%, 94.97%, and 92.90% has been achieved on the LivDet 2015, 2017, and 2019 databases, respectively under the LivDet protocol scenarios.
arXiv Detail & Related papers (2023-06-06T10:52:06Z) - Presentation Attack Detection with Advanced CNN Models for
Noncontact-based Fingerprint Systems [5.022332693793425]
We develop a Presentation attack detection (PAD) dataset of more than 7500 four-finger images.
PAD accuracy of Attack presentation classification error rate (APCER) 0.14% and Bonafide presentation classification error rate (BPCER) 0.18%.
arXiv Detail & Related papers (2023-03-09T18:01:10Z) - Dual Spoof Disentanglement Generation for Face Anti-spoofing with Depth
Uncertainty Learning [54.15303628138665]
Face anti-spoofing (FAS) plays a vital role in preventing face recognition systems from presentation attacks.
Existing face anti-spoofing datasets lack diversity due to the insufficient identity and insignificant variance.
We propose Dual Spoof Disentanglement Generation framework to tackle this challenge by "anti-spoofing via generation"
arXiv Detail & Related papers (2021-12-01T15:36:59Z) - Federated Test-Time Adaptive Face Presentation Attack Detection with
Dual-Phase Privacy Preservation [100.69458267888962]
Face presentation attack detection (fPAD) plays a critical role in the modern face recognition pipeline.
Due to legal and privacy issues, training data (real face images and spoof images) are not allowed to be directly shared between different data sources.
We propose a Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation framework.
arXiv Detail & Related papers (2021-10-25T02:51:05Z) - Spoofing Detection on Hand Images Using Quality Assessment [21.58895176617405]
This paper presents an anti-spoofing method toward hand biometrics.
A presentation attack detection approach is addressed by assessing the visual quality of genuine and fake hand images.
Ten quality metrics are measured from each sample for classification between original and fake hand image.
arXiv Detail & Related papers (2021-10-22T10:06:53Z) - Anomaly Detection-Based Unknown Face Presentation Attack Detection [74.4918294453537]
Anomaly detection-based spoof attack detection is a recent development in face Presentation Attack Detection.
In this paper, we present a deep-learning solution for anomaly detection-based spoof attack detection.
The proposed approach benefits from the representation learning power of the CNNs and learns better features for fPAD task.
arXiv Detail & Related papers (2020-07-11T21:20:55Z) - Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition [56.844587127848854]
We demonstrate that the state-of-the-art gait recognition model is vulnerable to such attacks.
We employ a generative adversarial network based architecture to semantically generate adversarial high-quality gait silhouettes or video frames.
The experimental results show that if only one-fortieth of the frames are attacked, the accuracy of the target model drops dramatically.
arXiv Detail & Related papers (2020-02-22T10:08:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.