Skip to main content

Biometric Authentication Using Convolutional Neural Networks

  • Conference paper
  • First Online:
Advances in Information and Communication Technology and Systems (MCT 2019)

Abstract

Today biometric identity authentication technologies are widespread. These systems are implemented not only in enterprises, controlled-access facilities, but also on smartphones of ordinary users and in online applications. The problem of choosing one of the authentication methods remains urgent. This paper provides a comparative analysis of existing systems and concludes that one of the most common and persistent methods is facial authentication system. The most powerful types of attacks on the biometric system are attacks on the database of biometric templates and attacks on sensors for obtaining biometric characteristics. Attacks on biometric sensors or spoofing attack is aimed at impersonating another person through fake biometric data. The paper deals with the possibility of special attacks on the biometric system of authentication by face image. A new method of detecting fake attacks (spoofing attacks) is proposed. The method is based on the use of an artificial convolutional neural network which was trained using a Replay-Attack Database from Idiap Research Institute. The obtained results show high efficiency of the proposed method of detecting spoofing attacks: the probability that an attack will be detected is 94.98%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tsarov, R.Yu., Lemeha, T.M.: Biometric technology, Odessa (2016). 140 p.

    Google Scholar 

  2. Face recognition technology - a new era in video analytics, video surveillance and access control systems. https://securityrussia.com/blog/face-recognition.html

  3. Lutsenko, M., Kuznetsov, A., Gorbenko, Y.: Key generation from biometric data of Iris. In: The Fourth International Conference on Information and Telecommunication Technologies and Radio Electronics, UkrMiCo 2019, Odessa (2019)

    Google Scholar 

  4. Lutsenko, M., Kuznetsov, A., Gorbenko, Y., Oleshko, I., Pronchakov, Y., Kotukh, Y.: Key generation from biometric data of Iris. In: 2019 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), Odessa (2019 in press)

    Google Scholar 

  5. Lavrentieva, G.M., Novoselova, S.A., Kozlova, A.V., et al.: Detection methods for spoofing attacks of repeated reproduction on voice biometric systems. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(3), 428–436 (2018)

    Google Scholar 

  6. Yang, J.: Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014)

  7. Xu, Z.: Learning temporal features using the LSTM-CNN architecture for face anti-spoofing. In: ACPR, pp. 41–45 (2015)

    Google Scholar 

  8. FaceNet: A Unified Embedding for Face Recognition and Clustering. https://arxiv.org/pdf/1503.03832.pdf

  9. Lazarick, R.: Spoofs, subversion and suspicion: terms and concepts. In: Proceedings of the NIST International Biometric Performance Conference (IBPC) (2012)

    Google Scholar 

  10. Matsugu, M., Mori, K., Mitari, Y., Kaneda, Y.: Subject independent facial expression recognition with robust face detection using a convolutional neural network. Neural Netw. 16(5–6), 555–559 (2003)

    Google Scholar 

  11. Redmon, J., Farhadi, A.: YOLOv3: An Incremental Improvement. University of Washington. https://arxiv.org/abs/1804.02767

  12. YOLO: Real-Time Object Detection. https://pjreddie.com/darknet/yolo/

  13. Darknet. https://github.com/pjreddie/darknet

  14. Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning Internal Representations by Error Propagation, 1 September 1985. https://doi.org/10.21236/ada164453

  15. LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015). https://doi.org/10.1038/nature14539

    Article  Google Scholar 

  16. Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: BIOSIG-2012. IEEE BIOSIG (2012)

    Google Scholar 

  17. Ting, K.M.: Precision and recall. In: Sammut, C., Webb, G.I. (eds.) Encyclopedia of Machine Learning. Springer, Boston (2011)

    Google Scholar 

  18. Kingma, D.P., Ba, J.: Adam: A Method for Stochastic Optimization. Submitted on 22 Dec 2014 (v1), last revised 30 Jan 2017 (this version, v9). https://arxiv.org/abs/1412.6980

  19. Janocha, K., Czarnecki, W.M.: On Loss Functions for Deep Neural Networks in Classification. Faculty of Mathematics and Computer Science, Jagiellonian University, Krakow, Poland (2017)

    Google Scholar 

  20. Abadi, M., Agarwal, A., Barham, P., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). Software available from tensorflow.org

    Google Scholar 

  21. Bradski, G.: The OpenCV library, Dr. Dobb’s J. Softw. Tools 25, 120–125 (2000)

    Google Scholar 

  22. Jung, A.B.: imgaug (2018). https://github.com/aleju/imgaug

  23. Kuznetsov, A., Kiyan, A., Uvarova, A., Serhiienko, R., Smirnov, V.: New code based fuzzy extractor for biometric cryptography. In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, pp. 119–124 (2018). https://doi.org/10.1109/INFOCOMMST.2018.8632040

  24. Rassomakhin, S., Kuznetsov, A., Shlokin, V., Belozertsev, I., Serhiienko, R.: Mathematical model for the probabilistic minutia distribution in biometric fingerprint images. In: 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, pp. 514–518 (2018). https://doi.org/10.1109/dsmp.2018.8478496

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Alexandr Kuznetsov , Inna Oleshko , Kyrylo Chernov , Mykhaylo Bagmut or Tetiana Smirnova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kuznetsov, A., Oleshko, I., Chernov, K., Bagmut, M., Smirnova, T. (2021). Biometric Authentication Using Convolutional Neural Networks. In: Ilchenko, M., Uryvsky, L., Globa, L. (eds) Advances in Information and Communication Technology and Systems. MCT 2019. Lecture Notes in Networks and Systems, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-030-58359-0_6

Download citation

Publish with us

Policies and ethics