Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks

  • Han-Ul Jang
  • Hak-Yeol Choi
  • Dongkyu Kim
  • Jeongho Son
  • Heung-Kyu Lee
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 424)

Abstract

Recently, as biometric technology grows rapidly, the importance of fingerprint spoof detection technique is emerging. In this paper, we propose a technique to detect forged fingerprints using contrast enhancement and Convolutional Neural Networks (CNNs). The proposed method detects the fingerprint spoof by performing contrast enhancement to improve the recognition rate of the fingerprint image, judging whether the sub-block of fingerprint image is falsified through CNNs composed of 6 weight layers and totalizing the result. Our fingerprint spoof detector has a high accuracy of 99.8% on average and has high accuracy even after experimenting with one detector in all datasets.

Keywords

Biometrics Fingerprint spoof detection Convolutional neural networks Multimedia security 

Notes

Acknowledgments

This work was supported by the Institute for Information & communications Technology Promotion (IITP) grant funded by the Korean government (MSIP) (No. R0126-16-1024, Managerial Technology Development and Digital Contents Security of 3D Printing based on Micro Licensing Technology), and the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2016R1A2B2009595).

References

  1. 1.
    Jain, A., Chen, Y., Demirkus, M.: Pores and ridges: high-resolution fingerprint matching using level 3 features. IEEE Trans. Pattern Anal. Mach. Intell. 29(1), 15–27 (2007)CrossRefGoogle Scholar
  2. 2.
    Galbally, J., Fierrez, J., Alonso-Fernandez, F., Martinez-Diaz, M.: Evaluation of direct attacks to fingerprint verification systems. Telecommun. Syst. 47(3–4), 243–254 (2011)CrossRefGoogle Scholar
  3. 3.
    Galbally, J., Alonso-Fernandez, F., Fierrez, J., Ortega-Garcia, J.: A high performance fingerprint liveness detection method based on quality related features. Future Gener. Comput. Syst. 28(1), 311–321 (2012)CrossRefGoogle Scholar
  4. 4.
    Dubey, R., Goh, J., Thing, V.: Fingerprint liveness detection from single image using low level features and shape analysis. IEEE Trans. Inf. Forensics Secur. 6013(c), 1 (2016)Google Scholar
  5. 5.
    Huang, Q., Chang, S., Liu, C., Niu, B., Tang, M., Zhou, Z.: An evaluation of fake fingerprint databases utilizing SVM classification. Pattern Recogn. Lett. 60, 1–7 (2015)CrossRefGoogle Scholar
  6. 6.
    Rattani, A., Ross, A.: Automatic adaptation of fingerprint liveness detector to new spoof materials. In: IEEE International Joint Conference on Biometrics, pp. 1–8. IEEE (2014)Google Scholar
  7. 7.
    Marasco, E., Wild, P., Cukic, B.: Robust and interoperable fingerprint spoof detection via convolutional neural networks. In: IEEE Symposium on Technologies for Homeland Security (HST), 1–6. IEEE (2016)Google Scholar
  8. 8.
    Nogueira, R.F., de Alencar Lotufo, R., Machado, R.C.: Fingerprint liveness detection using convolutional networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206–1213 (2016)CrossRefGoogle Scholar
  9. 9.
    Greenberg, S., Aladjem, M., Kogan, D.: Fingerprint image enhancement using filtering techniques. Real-Time Imaging 8(3), 227–236 (2002)CrossRefMATHGoogle Scholar
  10. 10.
    Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: International Conference on Learning Representations, pp. 1–14(2015)Google Scholar
  11. 11.
    Ioffe, S., Szegedy, C.: Batch normalization accelerating deep network training by reducing internal covariate shift, pp. 1–11, arXiv:1502.03167 (2015)
  12. 12.
    Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T.: Caffe. In: Proceedings of the ACM International Conference on Multimedia - MM 2014, pp. 675–678. ACM Press, New York (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  • Han-Ul Jang
    • 1
  • Hak-Yeol Choi
    • 1
  • Dongkyu Kim
    • 1
  • Jeongho Son
    • 1
  • Heung-Kyu Lee
    • 1
  1. 1.School of ComputingKAISTDaejeonRepublic of Korea

Personalised recommendations