Abstract
Previously studied fingerprint readers usually used Minutiae feature. Minutiae uses both directional maps and skeleton images because of its high FMR (False Match Rate). But unlike security attacks on Minutiae, research on directional maps and skeletal image attacks is not going well. In this paper, fingerprint images are generated using the new Pix2Pix model and analyzed representation attack vulnerabilities for the images. When the restored fingerprint by the model was recognized to the fingerprint recognizer, it showed a high recognition success rate and demonstrated the vulnerability for representation attacks on fingerprint readers that also use skeletal images.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
German RL, Barber KS (2018) Current biometric adoption and trends, A UT CID Report
Daugman JG (2004) How iris recognition works. IEEE Trans Circuits Syst Video Technol 14(1):21–30
Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. NIPS
Bontrager P, Togelius J, Memon N (2017) DeepMasterPrint: generating fingerprints for presentation attacks. https://arxiv.org/abs/1705.07386v1
Arjovsky M, Chintala S, Bottou L (2017) Wasserstein gan. arXiv:1701.07875
Lee S, Jang SW, Kim D, Hahn H, Kim GY (2019) Synthesizing fingerprint from pattern type analysis features using cGAN, 19 April 2019
Mirza M, Simon O (2014) Conditional generative adversarial nets. https://arxiv.org/abs/1411.1784
Isola P, Zhu JY, Zhou T, Efros AA (2016) Image-to-image translation with conditional adversarial networks, https://arxiv.org/abs/1611.07004
Ronneberger O, Fischer P, Brox T (2015) U-Net: convolutional networks for biomedical image segmentation. https://arxiv.org/abs/1505.04597
Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: ICML'10 proceedings of the 27th international conference on international conference on machine learning, pp 807–814
Heusel M, Ramsauer H, Unterthiner T, Nessler B, Hochreiter, S (2017) GANs trained by a two time-scale update rule converge to a local nash equilibrium. In: NIPS, pp 6629–6640
Lee YJ, Seok KH A study on the performance of generative adversarial networks. J Korean Data Inf Sci Soc 1,155–1,167. https://doi.org/10.7465/jkdi.2018.29.5.1155,2018.09
Acknowledgements
This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2018-0-01419) supervised by the IITP (Institute for Information & communications Technology Promotion).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Moon, JH., Park, JH., Kim, GY. (2021). Restore Fingerprints Using Pix2Pix. In: Park, J.J., Fong, S.J., Pan, Y., Sung, Y. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 715. Springer, Singapore. https://doi.org/10.1007/978-981-15-9343-7_68
Download citation
DOI: https://doi.org/10.1007/978-981-15-9343-7_68
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9342-0
Online ISBN: 978-981-15-9343-7
eBook Packages: Computer ScienceComputer Science (R0)