Innovative Deep Learning Architecture for Enhanced Altered Fingerprint Recognition
- URL: http://arxiv.org/abs/2509.20537v1
- Date: Wed, 24 Sep 2025 20:12:37 GMT
- Title: Innovative Deep Learning Architecture for Enhanced Altered Fingerprint Recognition
- Authors: Dana A Abdullah, Dana Rasul Hamad, Bishar Rasheed Ibrahim, Sirwan Abdulwahid Aula, Aso Khaleel Ameen, Sabat Salih Hamadamin,
- Abstract summary: We present DeepAFRNet, a deep learning recognition model that matches and recognizes distorted fingerprint samples.<n>The approach uses a VGG16 backbone to extract high-dimensional features and cosine similarity to compare embeddings.<n>With strict thresholds, DeepAFRNet achieves accuracies of 96.7 percent, 98.76 percent, and 99.54 percent for the three levels.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Altered fingerprint recognition (AFR) is challenging for biometric verification in applications such as border control, forensics, and fiscal admission. Adversaries can deliberately modify ridge patterns to evade detection, so robust recognition of altered prints is essential. We present DeepAFRNet, a deep learning recognition model that matches and recognizes distorted fingerprint samples. The approach uses a VGG16 backbone to extract high-dimensional features and cosine similarity to compare embeddings. We evaluate on the SOCOFing Real-Altered subset with three difficulty levels (Easy, Medium, Hard). With strict thresholds, DeepAFRNet achieves accuracies of 96.7 percent, 98.76 percent, and 99.54 percent for the three levels. A threshold-sensitivity study shows that relaxing the threshold from 0.92 to 0.72 sharply degrades accuracy to 7.86 percent, 27.05 percent, and 29.51 percent, underscoring the importance of threshold selection in biometric systems. By using real altered samples and reporting per-level metrics, DeepAFRNet addresses limitations of prior work based on synthetic alterations or limited verification protocols, and indicates readiness for real-world deployments where both security and recognition resilience are critical.
Related papers
- Argus: A Multi-Agent Sensitive Information Leakage Detection Framework Based on Hierarchical Reference Relationships [17.30790083446847]
We propose Argus, a multi-agent collaborative framework for detecting sensitive information.<n>Argus employs a three-tier detection mechanism that integrates key content, file context, and project reference relationships.<n> Experimental results show that Argus achieves up to 94.86% accuracy in leak detection, with a precision of 96.36%, recall of 94.64%, and an F1 score of 0.955.
arXiv Detail & Related papers (2025-12-09T07:42:10Z) - Adaptive thresholding pattern for fingerprint forgery detection [3.351714665243138]
Fingerprint liveness detection systems have been affected by spoofing.<n>It is crucial to develop some techniques to distinguish the fake fingerprints from the real ones.<n>In this paper, we propose a fingerprint detection algorithm based on a forgery thresholding pattern.
arXiv Detail & Related papers (2025-11-19T10:39:38Z) - CLUE: Non-parametric Verification from Experience via Hidden-State Clustering [64.50919789875233]
We show that correctness of a solution is encoded as a geometrically separable signature within the trajectory of hidden activations.<n>ClUE consistently outperforms LLM-as-a-judge baselines and matches or exceeds modern confidence-based methods in reranking candidates.
arXiv Detail & Related papers (2025-10-02T02:14:33Z) - Watermarking and Anomaly Detection in Machine Learning Models for LORA RF Fingerprinting [0.0]
We present a stronger RFFI system combining watermarking for ownership proof and anomaly detection for spotting suspicious inputs.<n>On the LoRa dataset, our system achieves 94.6% accuracy, 98% watermark success, and 0.94 AUROC, offering verifiable, tamper-resistant authentication.
arXiv Detail & Related papers (2025-09-18T17:21:33Z) - Deep Learning Models for Robust Facial Liveness Detection [56.08694048252482]
This study introduces a robust solution through novel deep learning models addressing the deficiencies in contemporary anti-spoofing techniques.<n>By innovatively integrating texture analysis and reflective properties associated with genuine human traits, our models distinguish authentic presence from replicas with remarkable precision.
arXiv Detail & Related papers (2025-08-12T17:19:20Z) - Person Recognition at Altitude and Range: Fusion of Face, Body Shape and Gait [70.00430652562012]
FarSight is an end-to-end system for person recognition that integrates biometric cues across face, gait, and body shape modalities.<n>FarSight incorporates novel algorithms across four core modules: multi-subject detection and tracking, recognition-aware video restoration, modality-specific biometric feature encoding, and quality-guided multi-modal fusion.
arXiv Detail & Related papers (2025-05-07T17:58:25Z) - Structural damage detection via hierarchical damage information with volumetric assessment [1.4470320778878742]
Structural health monitoring (SHM) is essential for ensuring the safety and longevity of infrastructure.<n>This study introduces the Guided Detection Network (Guided-DetNet), a framework designed to address these challenges.<n>Guided-DetNet is characterized by a Generative Attention Module (GAM), Hierarchical Elimination Algorithm (HEA), and Volumetric Contour Visual Assessment (VCVA)
arXiv Detail & Related papers (2024-07-29T04:33:04Z) - Lazy Layers to Make Fine-Tuned Diffusion Models More Traceable [70.77600345240867]
A novel arbitrary-in-arbitrary-out (AIAO) strategy makes watermarks resilient to fine-tuning-based removal.
Unlike the existing methods of designing a backdoor for the input/output space of diffusion models, in our method, we propose to embed the backdoor into the feature space of sampled subpaths.
Our empirical studies on the MS-COCO, AFHQ, LSUN, CUB-200, and DreamBooth datasets confirm the robustness of AIAO.
arXiv Detail & Related papers (2024-05-01T12:03:39Z) - Adaptive White-Box Watermarking with Self-Mutual Check Parameters in
Deep Neural Networks [14.039159907367985]
Fragile watermarking is a technique used to identify tampering in AI models.
Previous methods have faced challenges including risks of omission, additional information transmission, and inability to locate tampering precisely.
We propose a method for detecting tampered parameters and bits, which can be used to detect, locate, and restore parameters that have been tampered with.
arXiv Detail & Related papers (2023-08-22T07:21:06Z) - A Universal Latent Fingerprint Enhancer Using Transformers [47.87570819350573]
This study aims to develop a fast method, which we call ULPrint, to enhance various latent fingerprint types.
In closed-set identification accuracy experiments, the enhanced image was able to improve the performance of the MSU-AFIS from 61.56% to 75.19%.
arXiv Detail & Related papers (2023-05-31T23:01:11Z) - Towards Reducing Labeling Cost in Deep Object Detection [61.010693873330446]
We propose a unified framework for active learning, that considers both the uncertainty and the robustness of the detector.
Our method is able to pseudo-label the very confident predictions, suppressing a potential distribution drift.
arXiv Detail & Related papers (2021-06-22T16:53:09Z) - Improving Face Recognition by Clustering Unlabeled Faces in the Wild [77.48677160252198]
We propose a novel identity separation method based on extreme value theory.
It greatly reduces the problems caused by overlapping-identity label noise.
Experiments on both controlled and real settings demonstrate our method's consistent improvements.
arXiv Detail & Related papers (2020-07-14T12:26:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.