Advertisement

Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial Networks

  • Hakil KimEmail author
  • Xuenan Cui
  • Man-Gyu Kim
  • Thi Hai Binh Nguyen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11378)

Abstract

Fingerprint recognition systems have been known to be exposed to several security threats. Those are fake fingerprints, attacking at communication channels and software modules, and stealing fingerprint templates from database storages. For a long time, stolen templates are not seriously investigated because it was believed that fingerprint templates did not reveal the original fingerprints used to extract the templates. However, recent studies have proved that a fingerprint can be reconstructed from its minutiae, although the reconstructed fingerprints may have many spurious minutiae and unnatural patterns. This paper proposes an algorithm based on conditional generative adversarial networks (conditional GANs) to reconstruct fingerprints from sets of minutiae. The fingerprints generated by the proposed networks are very similar to the real fingerprints and can be used to fool fingerprint recognition systems. The acceptance rates of the generated fingerprints range from 42% to 98%, depending on the features and security levels used in the matching algorithms.

Keywords

Fingerprint reconstruction Conditional adversarial network Synthetic fingerprint 

References

  1. 1.
    Cao, K., Jain, A.K.: Learning fingerprint reconstruction: from minutiae to image. IEEE Trans. Inf. Forensics Secur. 10(1), 104–117 (2015)CrossRefGoogle Scholar
  2. 2.
    Cappelli, R., Ferrara, M., Maltoni, D.: Minutia cylinder-code a new representation and matching technique for fingerprint recognition. IEEE Trans. Patt. Anal. Mach. Intell. 32(12), 2128–2141 (2010)CrossRefGoogle Scholar
  3. 3.
    Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Fingerprint image reconstruction from standard templates. IEEE Trans. Patt. Anal. Mach. Intell. 29(9), 1489–1503 (2007)CrossRefGoogle Scholar
  4. 4.
    Feng, J., Jain, A.K.: FM model based fingerprint reconstruction from minutiae template. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 544–553. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-01793-3_56CrossRefGoogle Scholar
  5. 5.
    Hill, C.J.: Risk of masquerade arising from the storage of biometrics, Master degree thesis, Department of Computer Science, Australian National University, Australia, November 2001Google Scholar
  6. 6.
    Isola, P., Zhu, J., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5967–5976, July 2017Google Scholar
  7. 7.
    Li, S., Kot, A.C.: An improved scheme for full fingerprint reconstruction. IEEE Trans. Inf. Forensics Secur. 7(6), 1906–1912 (2012)CrossRefGoogle Scholar
  8. 8.
    Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, London (2003)zbMATHGoogle Scholar
  9. 9.
    Neurotechnology: Verifinger SDK. https://www.neurotechnology.com/verifinger.html. Accessed 09 May 2018
  10. 10.
    Ross, A., Shah, J., Jain, A.K.: From template to image: reconstructing fingerprints from minutiae points. IEEE Trans. Patt. Anal. Mach. Intell. 29(4), 544–560 (2007)CrossRefGoogle Scholar
  11. 11.
    Trauring, M.: Automatic comparison of finger-ridge patterns. Nature 197, 938–940 (1963)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Hakil Kim
    • 1
    Email author
  • Xuenan Cui
    • 1
  • Man-Gyu Kim
    • 1
  • Thi Hai Binh Nguyen
    • 1
  1. 1.School of Information and Communication EngineeringInha UniversityIncheonSouth Korea

Personalised recommendations