You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

24 August 2021

On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection

,
,
,
,
,
and
1
da/sec—Biometrics and Internet Security Research Group, Hochschule Darmstadt, 64295 Darmstadt, Germany
2
Federal Office for Information Security, 53133 Bonn, Germany
3
Fakultät Wirtschaft, Hochschule Ansbach, 91522 Ansbach, Germany
4
Jenetric GmbH, 07745 Jena, Germany
This article belongs to the Special Issue Biometric Sensors and Applications

Abstract

Within the last few decades, the need for subject authentication has grown steadily, and biometric recognition technology has been established as a reliable alternative to passwords and tokens, offering automatic decisions. However, as unsupervised processes, biometric systems are vulnerable to presentation attacks targeting the capture devices, where presentation attack instruments (PAI) instead of bona fide characteristics are presented. Due to the capture devices being exposed to the public, any person could potentially execute such attacks. In this work, a fingerprint capture device based on thin film transistor (TFT) technology has been modified to additionally acquire the impedances of the presented fingers. Since the conductance of human skin differs from artificial PAIs, those impedance values were used to train a presentation attack detection (PAD) algorithm. Based on a dataset comprising 42 different PAI species, the results showed remarkable performance in detecting most attack presentations with an APCER = 2.89% in a user-friendly scenario specified by a BPCER = 0.2%. However, additional experiments utilising unknown attacks revealed a weakness towards particular PAI species.

1. Introduction

Within the last decade, biometric recognition systems have been deployed in several applications used in our daily lives. Almost all new smartphones can be unlocked with biometrics, which is very user-friendly. On the other hand, border control utilises biometrics to enhance the security. Hence, the usage of biometric recognition itself is flexible and suits different scenarios. In this context, the fingerprint has always been one of the most used biometric characteristics [1].
However, with the capture devices being exposed to the public, biometric systems are vulnerable to external attacks [2]. This kind of attack is defined within the ISO/IEC 30107-1 [3] as a “presentation to the biometric data capture subsystem with the goal of interfering with the operation of the biometric system”. The intention of the attacker can be either to impersonate someone’s identity or to conceal his own identity. In both cases, a presentation attack instrument (PAI) instead of the bona fide characteristic is presented to the capture device. In this context, a group of PAIs made from the same material is called a PAI species. As a consequence, a secure biometric system requires an automated presentation attack detection (PAD) module, which needs to learn the differences between bona fide presentations (BPs) and attack presentations (APs) [4]. Correct assignment of the two classes is becoming more complicated with the many options available for creating PAIs. For fingerprint artefacts in particular, there are multiple recipes based on a variety of materials available [5].
The challenge of PAD was addressed by multiple international research projects, such as Tabula Rasa [6], BEAT [7], Odin [8], and RESPECT [9]. Additionally, the LivDet challenges [10,11] have invited researchers from academia and industry to benchmark their PAD algorithms on identical datasets since 2009. These efforts allowed significant research and development of new countermeasures across different biometric characteristics. In general, PAD methods can be categorised into software-based and hardware-based approaches. While the first category analyses the samples acquired with legacy fingerprint captures in a deeper way (i.e., PAD based solely on data of the biometric sensor), the latter one introduces additional sensors to capture complementary information solely used by the PAD algorithm (i.e., PAD based on data of additional dedicated PAD sensors). Examples of hardware-based methods are multispectral illuminations and pulse detection, which require additional modules and thus usually result in bigger capture devices than pure fingerprint sensors [12].
This work focused on adding a hardware-based sensor to an existing capture device and validating whether this additional information is suited to detecting APs for fingerprint recognition. The idea is that human skin has different conductivity than the artificial materials of PAIs, and hence can be discriminated from them. Therefore, this study aims to answer the question of whether a finger’s impedance is an effective feature for reliable fingerprint PAD. To that end, we describe the functionality of the capture device which was used to acquire a dataset of 757 BPs and 915 APs from 42 different PAI species. A fingerprint PAD algorithm was trained and evaluated on this dataset.
The development of fingerprint PAD methods requires a dataset with BPs and APs. As a consequence, PAIs need to be created from either cooperative target subjects or latent (or synthetic) fingerprints. In a cooperative approach, the bona fide finger is placed in a moulding material, which includes the negative fingerprint pattern after hardening. Subsequently, this mould can be filled with the casting material (e.g., latex or ecoflex) to retrieve the actual PAI. Depending on the properties of the moulding and casting materials, the mould can be reused for additional fabrications. For latent fingerprints, the representation needs to be digitised first. Then the negative image is used to create the mould (e.g., 3D printer or laser cutter), which can be filled again with the casting material.
The remainder of this article is structured as follows: Section 2 reviews the state-of-the-art for fingerprint PAD. Our capture device is introduced in Section 3, followed by the method for fingerprint PAD in Section 4. Subsequently, the experimental evaluation is presented and discussed in Section 5, and finally, Section 6 concludes the findings.

3. Capture Device and Data

Even if it is possible to implement software-based PAD methods to distinguish between BPs and APs, this work instead introduces a hardware-based adjustment to derive the decision based on additional data. The goal is to measure the impedance, since the conductivity of human skin differs from the conductivity other artificial materials.
The capture device is based on the Jenetric LIVETOUCH QUATTRO (https://www.jenetric.com/en/products/livetouch-quattro.html, accessed on 20 August 2021), which is depicted in Figure 1a. The optical thin film transistor (TFT) technology allows capturing up to four fingerprints at a time. In this process, the display beneath serves as illumination source (Figure 1b) and can be used for user guidance as well. While this technique enables reliable acquisitions of bona fide fingerprints, it also captures the fingerprint patterns from particular APs as shown in Figure 2. The main advantage of TFT sensors is their size. While it is possible to cover large areas (e.g., four fingers simultaneously), the glass is only 0.7 mm thick, and thus it is easy to include in various devices. As this offers huge potential for numerous applications, fingerprint PAD for TFT capture devices has relied so far on software-based analysis of fingerprint images. However, research has shown that APs can indeed have similar fingerprint quality as BPs [51], which can be a problem for purely software-based PAD solutions. On the other hand, adding established PAD sensors is difficult to do without losing the advantage of the TFT technology.
Figure 1. An illustration of the fingerprint capture device. ©Jenetric GmbH.
Figure 2. A bona fide fingerprint and five different PAIs.
In the proposed approach, we measure the impedance on top of the optical fingerprint sensor. To that end, the usage of transparent electrodes is necessary in order not to interfere with the fingerprint acquisition. Hence, a strip-shaped indium-tin-oxide (ITO) coating is applied to the top layer of the capture device. The electric circuit utilises an alternating current source with various specified frequencies and a peak-to-peak voltage of 1 V. Once a finger connects the two electrodes, the finger’s impedance can be measured. This PAD adjustment is illustrated in Figure 3. According to Ohm’s law, voltage drops within the circuit are indirectly proportional to the corresponding resistances. In our case, the resistance of human skin is a complex quantity, as it is composed of capacitive and ohmic resistances. Hence, the resistance of skin decreases with increasing frequency, which causes the voltage to increase.
Figure 3. The ITO conductors are structured vertically on the capture device to lie in the same direction as the fingers.
The prototype has a controllable output, and for the context of fingerprint PAD, nine frequencies in the range between 1 and 500 kHz are used. Finally, a second-order high-pass filter in combination with a bridge rectifier removes 50 Hz noise and smoothes the signal, which thus corresponds to a DC voltage. Those measured impedance values can then be used by PAD algorithms.

4. Presentation Attack Detection Method

With our fingerprint PAD approach, we aimed to keep things as simple as possible, while preserving full compatibility with the base fingerprint sensor. The finger’s impedance is measured at nine selected frequencies in the range from 1 to 500 kHz, which are listed in Table 2. The first frequency was chosen to have enough distance from the 50 Hz high-pass filter to avoid interference with the attenuation. Additionally, the frequency generator is technically capped at 1 MHz; thus, the remaining frequencies were selected such that the maximum possible range is covered with few selected measurement points, while also taking into account the decreasing resistance for increasing frequencies. Therefore, for each presentation, nine float values of PAD data are acquired. No conductivity results in a zero vector and the measured impedance values rise for conductive presentations. Hence, this nine-dimensional feature vector can directly be used for classification without further pre-processing.
Table 2. Nine different frequencies in the range from 1 to 500 kHz are used for the impedance measurements.
For this purpose, the SVM [52] is used as a classifier, since it constantly achieved remarkable performances across different fingerprint PAD studies [34,35,53,54,55,56,57]. The SVM is designed to work on high-dimensional input data and derive binary decisions by defining a hyperplane that separates both classes. Hence, it is perfectly suited for fingerprint PAD tasks. We are only interested in detecting whether an input is an AP and not which material was used to fabricate this particular PAI. In the training process, 5-fold cross-validation was used to automatically determine the best-suited hyperparameters for the RBF kernel on the available training data. During prediction, the test sample is mapped into the SVM feature space, where it can be compared to the hyperplane in order to retrieve a real-time classification result. The full fingerprint PAD processing pipeline is illustrated in Figure 4. Although the main contribution is the impedance measurement and not a classifier benchmark, the SVM approach is shown in comparison to k-nearest neighbours (KNN) and multi-layer perceptron (MLP) classifiers.
Figure 4. While capturing the fingerprint, the impedance is measured at nine selected frequencies. The resulting feature vector i = i 1 ,   i 2 ,   ,   i 9 is processed by the SVM to derive a decision.

5. Experimental Evaluation

In this section, we first introduce the database and experimental protocol, which were used to run the experiments with the goal of answering the question of whether the impedance-based technology presented here is suited for fingerprint PAD. We then present and discuss the results.

5.1. Database and Experimental Protocol

The data acquisition was split over three distinct locations. Each party collected BPs from all ten fingers, and in total, 59 subjects contributed 757 BPs. Since the data collection took place during a pandemic, fingers and the sensor surface were disinfected between collecting data from different subjects. Apart from that, the presented fingers had different moisture levels. In addition, each party created their own PAIs, which resulted in a total of 915 APs from 42 different PAI species for the dataset. On the other hand, this led to unequal numbers of APs per PAI species, as shown in Table 3. It should be noted that for some PAI species (e.g., 3D printed) it was not possible to capture the fingerprint with the optical sensor. However, those APs were still included (5) in the database in order to show that this PAI species was considered in the data collection. In a similar manner, the acquisition of particular PAI species was stopped when it turned out that those materials showed no conductive properties. Thus, the focus lay on acquiring APs with measurable impedance values. Hence, non conductive materials were, e.g., additionally coated with electric paint, or, e.g., glycerol was added during the casting process. Those augmentations are listed on the right-hand side of Table 3 and example photos are shown in Figure 5. While both nanotips and bare paint can be applied to solid PAIs, the viscous bare paint cannot be used on softer PAIs without destroying the ridge lines. An overview of the impedance values for all conductive presentations is plotted in the Figure A1 in Appendix A.
Table 3. A detailed list with the number of samples per PAI species.
Figure 5. Conductive augmentations can be created by applying, e.g., nanotips (a) or electric bare paint (b) to the fingerprint PAI (c).
The goal was to collect a wide variety of different PAI species in first place. Hence, the used materials were selected based on their availability and experience from former projects. All ingredients are easily purchasable, and their fabrication requires low expertise to allow sufficient numbers of PAIs for the data collection. Based on the results, more sophisticated PAIs exploiting the vulnerability of this capture device can be created.
For the experimental protocol, different dataset partitions were defined in order to evaluate the following scenarios. In general, all partitions were split into non-overlapping training and test sets to guarantee a fair evaluation of the proposed fingerprint PAD method. First, a mixed partitioning was used, where each conductive PAI species was present in both training and test sets. A maximum of 1/3 of APs from a particular PAI species were used for training, and the other samples were seen only during testing. This served as a baseline experiment with only known PAI species in the test set. Second, an additional set of experiments aimed to analyse the fingerprint PAD performance towards unknown PAI species. In this context, a leave-one-out protocol was applied were single PAI species were removed from the training set and only occurred during testing. The LOO partitions were created only for conductive materials or their conductive augmentations, respectively. In other words, one particular PAI species (e.g., playdoh) or all its augmentations (e.g., latex + nanotips and latex + bare paint) were not seen during training. Since the same augmentations were applied to multiple base materials, additional LOO partitions excluded all modifications with bare paint or nanotips, respectively.
The numbers of training and testing samples for the different partitions are summarised in Table 4. An identical number of APs and BPs was chosen for the training partition to prevent bias towards a particular class. Additional samples were moved to the test set for the baseline partition. The LOO partitions removed AP samples after filling the training set. In order to maintain a meaningful training set, a maximum of 15 conductive APs from the same PAI species were included in the training set, and finally, the remaining space was filled with random samples from non-conductive PAI species. Hence, the training set had no bias towards one class (AP or BP), nor towards particular PAI species. Therefore, the experiments allowed fair benchmarking of different LOO partitions and sound conclusions regarding the vulnerability towards unknown attacks.
Table 4. Numbers of samples per dataset partition. The same BPs of the baseline partition were used in all LOO partitions.

5.2. Metrics

The results of the impedance-based PAD algorithm were analysed with the following metrics defined in ISO/IEC 30107-3 [58]:
  • Attack Presentation Classification Error Rate (APCER): percentage of APs incorrectly classified as BPs.
  • Bona fide Presentation Classification Error Rate (BPCER): percentage of BPs incorrectly classified as APs.
For this purpose, the detection error tradeoff (DET) visualises the fingerprint PAD performance for all possible decision thresholds. While high security applications require a low APCER, low BPCERs represent convenient use cases. In order to benchmark the different results, two operation points were chosen: (i) detection equal error rate (D-EER), as the point where APCER = BPCER; and (ii) APCER0.2, as the APCER for a fixed BPCER of 0.2%, thereby representing a convenient scenario.

5.3. Results and Discussion

Based on the specified protocol, different experiments were evaluated. The DET plot of the baseline partition is shown in Figure 6a. The SVM approach significantly outperformed the other two approaches; thus, the further analysis and the LOO experiments focused on these results. The plot shows that there is one BP that will always be misclassified as an AP. Hence, a BPCER below 0.2% is not possible for this scenario. On the other hand, over 97% of all APs were correctly classified for both operation points, D-EER and APCER0.2.
Figure 6. DET plots for the different experiments: (a) baseline and (b) LOO.
The next set of experiments evaluated the generalisation capabilities of the fingerprint PAD algorithm towards unknown attacks. The results of the 16 LOO experiments are plotted in Figure 6b. Since the BPs within the test set remained identical to the baseline partition, the same sample kept getting wrongly classified across all LOO partitions. Additionally, the number of APs in the test set was generally lower for the LOO experiments than for the baseline. Thus, the corresponding DET curves ended earlier, and achieving very low APCERs was not possible in these cases. Depending on the PAI species used in the particular training set and their similarity to BPs, the BPCER could be significantly higher than for the baseline partition. On the other hand, some of the conductive PAI species that were left out during training were completely classified as APs without error. Those perfect classifications cannot be shown by the DET plot; thus, the specific error rates in terms of D-EER and APCER0.2 are additionally in Table 5 for all experiments.
Table 5. Results in terms of D-EER and APCER0.2 for the particular partitions.
For the baseline partition, a D-EER of 2.45% and an APCER0.2 of 2.89% were achieved. This translates to 20 misclassified APs, which mainly stemmed from the gelatin PAI species. As a consequence, the fingerprint PAD method reliably detected all other known PAI species in the baseline scenario. These findings were basically confirmed by the LOO experiments. For most LOO partitions, a D-EER below 1% was reported, with gelatin being the biggest outlier (D-EER = 19%). It should be noted that the computation of the D-EER anticipated both error rates to be equal at some point. Therefore, the computation reported BPCER/2 for those cases where all APs were correctly classified. Given the one misclassified BP, this resulted in a D-EER of 0.1%. When switching to the convenient threshold for BPCER = 0.2%, additional outliers were revealed. Following gelatin (APCER0.2 ≈ 25%), gelafix was misclassified in 7/37 cases (APCER0.2 = 19%). However, the least convenient performance was reported after leaving out all bare paint adjustments from training. This LOO group achieved an APCER0.2 > 90%, but the D-EER seemed stable at 1.15%. The reason for this behaviour lies in the fact that these unknown attacks have very similar impedance values as the BPs. Hence, the classifier mixed both classes such that the results allowed no separation for very low BPCERs.
Summarising the results, one can say that the concept of using an impedance-based fingerprint PAD module is generally suited for convenient use cases. Except for one constant error, the remaining BPs could be separated from APs and thus kept the false alarm rate low. Additionally, the reported baseline performance showed that a large share of the APs were correctly detected, which indicates strong security against APs in general. However, the following LOO experiments revealed that this fingerprint PAD method is indeed vulnerable against unknown attacks. In particular, PAI species that are conductive by nature (e.g., gelatin and gelafix) pose a severe threat when unknown to the PAD algorithm. Additionally, the results from the LOO bare paint partition show that unknown conductive adjustments are likely to be misclassified as BPs independently of the base material used for the PAI. Since there are more ways to add conductance to PAI species than the ones used in this work, impedance on its own might not be sufficient for secure fingerprint PAD.

5.4. Comparison to State-of-the-Art

This Section places our results next to already published ones of state-of-the-art fingerprint PAD approaches. However, since all experimental test sets differ, the focus is on a baseline scenario. Moreover, software-based methods that evaluated the LivDet protocols often only reported the average classification error rate (ACER), which is defined as:
A C E R = A P C E R + B P C E R 2
Since the error rates highly depend on the database size and the PAI species that are included, those specifications are presented. The main specifications for the comparison are summarised in Table 6. It should be noted that the numbers of PAI species, APs and BPs for the software-based solutions were added up for all evaluated datasets. However, the best performance is usually not achieved through cross-sensor or cross-database experiments; thus, only a fraction of the overall samples were used for this. In general, it is difficult to compare fingerprint PAD performances across totally different scenarios. However, it can be observed that the datasets for software-based methods usually comprised less PAI species than in the data for hardware-based methods. On the other hand, it is possible to evaluate a software-based PAD algorithm with multiple datasets to analyse the generalisation capabilities.
Table 6. Comparison of state-of-the-art with the proposed fingerprint PAD method regarding the main specifications. The error rates are presented in percentages.
On the other hand, the hardware-based approaches have shown remarkable numbers of PAI species and total database sizes. The reported performances are similar to that of our approach in the baseline scenario. Furthermore, the topic of unknown attacks is addressed by using one-class classifiers. In accordance with our LOO experiments, the overall error rates are generally higher than for the baseline results, which proves the need for further research in this area.
All in all, it can be said that our fingerprint PAD performance is among the state-of-the-art. However, a larger data collection effort is required to confirm these findings regarding the suitability in highly frequented real-world applications.

6. Conclusions and Future Work

In this study, an optical capture device was modified to additionally measure the finger’s impedance across nine selected frequencies. These additional data were then used to train an SVM for the task of fingerprint PAD. The idea is that all BPs show a common conductive response, but APs should differ in this regard, due to their physical properties differing from those of human skin. The collected dataset comprises a total of 1672 samples, including 42 different PAI species. The proposed fingerprint PAD method made a real-time decision based on the measured impedance values, thereby taking into account the conductivity itself and the separation between the different frequencies. The experiments showed remarkable results for the baseline scenario, such that an APCER = 2.89% was reached for a convenient use case defined by a BPCER = 0.2%. Hence, 41/42 PAI species were correctly classified in the best case. The only weakness was gelatin APs, which have natural conductance.
On the other hand, the LOO experiments showed additional limitations of this fingerprint PAD method unseen during training: gelafix and bare paint adjustments. While all other PAI species were reliably detected, even if unknown to the classifier, real-life applications can be considered unsafe when there is one attack that succeeds at remaining undetected regularly. Hence, it must be concluded that impedance on its own is not sufficient for secure fingerprint PAD, although all BPs (except for one) were correctly classified.
In this context, it was shown that complementary information channels can be fused to improve the overall PAD performance [47,60]. For this particular capture device, the optical fingerprint image could be used as a second data source, thereby combining software and hardware-based fingerprint PAD approaches. Furthermore, since the display is the illumination source for the optical capture process, differently coloured illuminations are already available, which should allow a multi-spectral fingerprint PAD approach similar to [61,62].

Author Contributions

Sensor fabrication and the software for the new capture device were performed by D.G. Data collection was led by J.K., D.G. and R.B. for their particular locations. J.K. performed the data curation, experimental protocol, and experiments. The article was written by J.K.; edited by M.G.-B.; and reviewed by D.G., R.B., J.R., A.v.T. and C.B. Supervision was performed by M.G.-B. and J.R.; C.B. was in charge of the project management. Finally, R.B. and A.v.T. were responsible for the funding acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the German Federal Office for Information Security within the research project DIRECT-PAD.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data is available for in-house testing during an internship at da/sec (https://dasec.h-da.de, accessed on 20 August 2021).

Acknowledgments

Additional thanks goes to Jannis Priesnitz, Rolf Huesmann, and Julian Stoldt for organising a joint data collection. Furthermore, the authors would like to thank Jenetric GmbH for their support by providing the capture device and contributing to the data collection.

Conflicts of Interest

The authors declare no conflict of interest. The funders contributed with a part of the data collection and reviewing the manuscript.

Abbreviations

The following abbreviations are used in this manuscript:
ACERAverage Classification Error Rate
APAttack Presentation
APCERAttack Presentation Classification Error Rate
BPBona fide Presentation
BPCERBona fide Presentation Classification Error Rate
CNNConvolutional Neural Network
D-EERDetection Equal Error Rate
DETDetection Error Tradeoff
GANGenerative Adversarial Network
GMMGaussian Mixture Model
ITOIndium-Tin-Oxide
KNNK-nearest Neighbours
LOOLeave-one-out
MLPMulti-Layer Perceptron
OCTOptical Coherence Technology
PADPresentation Attack Detection
PAIPresentation Attack Instrument
SVMSupport Vector Machine
TFTThin Film Transistor

Appendix A

Medians and standard deviations of the impedance values for all conductive presentations across all nine frequencies are plotted in Figure A1.
Figure A1. For each frequency (ai), the plots visualise the impedance values using the median (orange), ± 25 % (box), the standard deviation (end of line), and outliers (green dots) for all conductive presentations.

References

  1. Maltoni, D.; Maio, D.; Jain, A.K.; Prabhakar, S. Handbook of Fingerprint Recognition; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009. [Google Scholar] [CrossRef]
  2. Zwiesele, A.; Munde, A.; Busch, C.; Daum, H. BioIS Study—Comparative Study of Biometric Identification Systems. In Proceedings of the IEEE International Carnahan Conference on Security Technology (CCST), Ottawa, ON, Canada, 23–25 October 2000; IEEE Computer Society: Ottawa, Canada, 2000; pp. 60–63. [Google Scholar] [CrossRef]
  3. ISO/IEC JTC1 SC37 Biometrics. ISO/IEC 30107-1. Information Technology—Biometric Presentation Attack Detection—Part 1: Framework; ISO/IEC, 2016. [Google Scholar]
  4. Marcel, S.; Nixon, M.S.; Fierrez, J.; Evans, N. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection; Springer: Cham, Switzerland, 2019. [Google Scholar] [CrossRef] [Green Version]
  5. Kanich, O.; Drahansky, M.; Mézl, M. Use of Creative Materials for Fingerprint Spoofs. In Proceedings of the International Workshop on Biometrics and Forensics (IWBF), Sassari, Italy, 7–8 June 2018; pp. 1–8. [Google Scholar] [CrossRef]
  6. TABULA RASA. Trusted Biometrics under Spoofing Attacks. 2010. Available online: http://www.tabularasa-euproject.org/ (accessed on 20 August 2021).
  7. Marcel, S. BEAT–Biometrics Evaluation and Testing. Biom. Technol. Today 2013, 1, 5–7. [Google Scholar] [CrossRef]
  8. ODNI; IARPA. IARPA-BAA-16-04 (Thor). Available online: https://www.iarpa.gov/index.php/research-programs/odin/odin-baa (accessed on 20 August 2021).
  9. RESPECT. Reliable, Secure and Privacy Preserving Multi-biometric Person Authentication. 2019. Available online: http://www.respect-project.eu/ (accessed on 20 August 2021).
  10. Yambay, D.; Ghiani, L.; Marcialis, G.L.; Roli, F.; Schuckers, S. Review of Fingerprint Presentation Attack Detection Competitions. In Handbook of Biometric Anti-Spoofing; Springer: Cham, Switzerland, 2019; pp. 109–131. [Google Scholar] [CrossRef]
  11. Yambay, D.; Czajka, A.; Bowyer, K.; Vatsa, M.; Singh, R.; Schuckers, S. Review of Iris Presentation Attack Detection Competitions. In Handbook of Biometric Anti-Spoofing; Springer: Cham, Switzerland, 2019; pp. 169–183. [Google Scholar] [CrossRef]
  12. Spinoulas, L.; Hussein, M.; Geissbühler, D.; Mathai, J.; Almeida, O.G.; Clivaz, G.; Marcel, S.; AbdAlmageed, W. Multispectral Biometrics System Framework: Application to Presentation Attack Detection. IEEE Sens. J. 2021, 21, 15022–15041. [Google Scholar] [CrossRef]
  13. Husseis, A.; Liu-Jimenez, J.; Goicoechea-Telleria, I.; Sanchez-Reillo, R. A Survey in Presentation Attack and Presentation Attack Detection. In Proceedings of the International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019; pp. 1–13. [Google Scholar] [CrossRef]
  14. Kiefer, R.; Stevens, J.; Patel, A.; Patel, M. A Survey on Spoofing Detection Systems for Fake Fingerprint Presentation Attacks. In Proceedings of the International Conference on Information and Communication Technology for Intelligent Systems, Ahmedabad, India, 15–16 May 2020; pp. 315–334. [Google Scholar] [CrossRef]
  15. Marasco, E.; Ross, A. A Survey on Antispoofing Schemes for Fingerprint Recognition Systems. ACM Comput. Surv. (CSUR) 2014, 47, 1–36. [Google Scholar] [CrossRef]
  16. Singh, J.M.; Madhun, A.; Li, G.; Ramachandra, R. A Survey on Unknown Presentation Attack Detection for Fingerprint. In Proceedings of the International Conference on Intelligent Technologies and Applications, Grimstad, Norway, 28–30 September 2020; pp. 189–202. [Google Scholar] [CrossRef]
  17. Sousedik, C.; Busch, C. Presentation Attack Detection Methods for Fingerprint Recognition Systems: A Survey. IET Biom. 2014, 3, 219–233. [Google Scholar] [CrossRef] [Green Version]
  18. Marcialis, G.M.; Lewicke, A.; Tan, B.; Coli, P.; Grimberg, D.; Congiu, A.; Tidu, A.; Roli, F.; Schuckers, S. First International Fingerprint Liveness Detection Competition—LivDet 2009. In Proceedings of the International Conference on Image Analysis and Processing, Vietri sul Mare, Italy, 8–11 September 2009; pp. 12–23. [Google Scholar] [CrossRef] [Green Version]
  19. Yambay, D.; Ghiani, L.; Denti, P.; Marcialis, G.L.; Roli, F.; Schuckers, S. LivDet 2011 Fingerprint Liveness Detection Competition 2011. In Proceedings of the International Conference on Biometrics (ICB), Washington, DC, USA, 11–13 October 2011; pp. 208–215. [Google Scholar] [CrossRef]
  20. Ghiani, L.; Yambay, D.; Mura, V.; Tocco, S.; Marcialis, G.L.; Roli, F.; Schuckers, S.A. LivDet 2013 Fingerprint Liveness Detection Competition 2013. In Proceedings of the International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  21. Mura, V.; Ghiani, L.; Marcialis, G.L.; Roli, F.; Yambay, D.; Schuckers, S. LivDet 2015 Fingerprint Liveness Detection Competition 2015. In Proceedings of the International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA, 8–11 September 2015; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  22. Mura, V.; Orrù, G.; Casula, R.; Sibiriu, A.; Loi, G.; Tuveri, P.; Ghiani, L.; Marcialis, G.L. LivDet 2017 Fingerprint Liveness Detection Competition 2017. In Proceedings of the International Conference on Biometrics (ICB), Gold Coast, Australia, 20–23 February 2018; pp. 297–302. [Google Scholar] [CrossRef] [Green Version]
  23. Orrù, G.; Casula, R.; Tuveri, P.; Bazzoni, C.; Dessalvi, G.; Micheletto, M.; Ghiani, L.; Marcialis, G.L. LivDet in Action—Fingerprint Liveness Detection Competition 2019. In Proceedings of the International Conference on Biometrics (ICB), Crete, Greece, 4–7 June 2019; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  24. Marasco, E.; Sansone, C. On the Robustness of Fingerprint Liveness Detection Algorithms against New Materials used for Spoofing. Biosignals 2011, 8, 553–555. [Google Scholar] [CrossRef] [Green Version]
  25. Nogueira, R.F.; de Alencar Lotufo, R.; Machado, R.C. Evaluating software-based fingerprint liveness detection using Convolutional Networks and Local Binary Patterns. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), Rome, Italy, 17 October 2014; pp. 22–29. [Google Scholar] [CrossRef] [Green Version]
  26. Rattani, A.; Scheirer, W.J.; Ross, A. Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials. IEEE Trans. Inf. Forensics Secur. (TIFS) 2015, 10, 2447–2460. [Google Scholar] [CrossRef]
  27. Sequeira, A.F.; Cardoso, J.S. Fingerprint Liveness Detection in the Presence of Capable Intruders. Sensors 2015, 15, 14615–14638. [Google Scholar] [CrossRef] [Green Version]
  28. Ding, Y.; Ross, A. An Ensemble of One-Class SVMs for Fingerprint Spoof Detection Across Different Fabrication Materials. In Proceedings of the International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, United Arab Emirates, 4–7 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
  29. Toosi, A.; Bottino, A.; Cumani, S.; Negri, P.; Sottile, P.L. Feature Fusion for Fingerprint Liveness Detection: A Comparative Study. IEEE Access 2017, 5, 23695–23709. [Google Scholar] [CrossRef]
  30. Menotti, D.; Chiachia, G.; Pinto, A.; Schwartz, W.R.; Pedrini, H.; Falcao, A.X.; Rocha, A. Deep Representations for Iris, Face, and Fingerprint Spoofing Detection. IEEE Trans. Inf. Forensics Secur. 2015, 10, 864–879. [Google Scholar] [CrossRef] [Green Version]
  31. Kim, S.; Park, B.; Song, B.; Yang, S. Deep Belief Network based Statistical Feature Learning for Fingerprint Liveness Detection. Pattern Recognit. Lett. 2016, 77, 58–65. [Google Scholar] [CrossRef]
  32. Nogueira, R.F.; de Alencar Lotufo, R.; Machado, R.C. Fingerprint Liveness Detection Using Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. (TIFS) 2016, 11, 1206–1213. [Google Scholar] [CrossRef]
  33. Toosi, A.; Cumani, S.; Bottino, A. CNN Patch-Based Voting for Fingerprint Liveness Detection. In Proceedings of the International Joint Conference Computational Intelligence (IJCCI), Funchal, Portugal, 1–3 November 2017; pp. 158–165. [Google Scholar] [CrossRef]
  34. González-Soler, L.J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C. Fingerprint Presentation Attack Detection based on Local Features Encoding for Unknown Attacks. IEEE Access 2021, 9, 5806–5820. [Google Scholar] [CrossRef]
  35. González-Soler, L.J.; Gomez-Barrero, M.; Kolberg, J.; Chang, L.; Pérez-Suárez, A.; Busch, C. Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors. IET Biom. 2021, 10, 374–391. [Google Scholar] [CrossRef]
  36. Venkata Reddy, P.; Kumar, A.; Rahman, S.M.K.; Mundra, T.S. A New Antispoofing Approach for Biometric Devices. IEEE Trans. Biomed. Circuits Syst. (TBCAS) 2008, 2, 328–337. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  37. Hengfoss, C.; Kulcke, A.; Mull, G.; Edler, C.; Püschel, K.; Jopp, E. Dynamic Liveness and Forgeries Detection of the Finger Surface on the Basis of Spectroscopy in the 400–1650nm Region. Forensic Sci. Int. 2011, 212, 61–68. [Google Scholar] [CrossRef] [PubMed]
  38. Drahansky, M.; Dolezel, M.; Michal, J.; Brezinova, E.; Yim, J.; Shim, K. New Optical Methods for Liveness Detection on Fingers. BioMed Res. Int. 2013, 2013, 197925. [Google Scholar] [CrossRef]
  39. Jiang, X.; Tang, H.Y.; Lu, Y.; Ng, E.J.; Tsai, J.M.; Boser, B.E.; Horsley, D.A. Ultrasonic Fingerprint Sensor with Transmit Beamforming based on a PMUT Array bonded to CMOS Circuitry. IEEE Trans. Ultrason. Ferroelectr. Freq. Control (TUFFC) 2017, 64, 1401–1408. [Google Scholar] [CrossRef]
  40. Chugh, T.; Cao, K.; Jain, A. Fingerprint Spoof Buster: Use of Minutiae-Centered Patches. IEEE Trans. Inf. Forensics Secur. (TIFS) 2018, 13, 2190–2202. [Google Scholar] [CrossRef]
  41. Engelsma, J.J.; Jain, A.K. Generalizing Fingerprint Spoof Detector: Learning a One-class Classifier. In Proceedings of the International Conference on Biometrics (ICB), Crete, Greece, 4–7 June 2019; pp. 1–8. [Google Scholar] [CrossRef] [Green Version]
  42. Kolberg, J.; Gomez-Barrero, M.; Venkatesh, S.; Ramachandra, R.; Busch, C. Presentation Attack Detection for Finger Recognition. In Handbook of Vascular Biometrics; Springer: Cham, Switzerland, 2020; pp. 435–463. [Google Scholar] [CrossRef] [Green Version]
  43. Pereira, J.A.; Sequeira, A.F.; Pernes, D.; Cardoso, J.S. A Robust Fingerprint Presentation Attack Detection Method Against Unseen Attacks Through Adversarial Learning. In Proceedings of the International Conference on Biometrics Special Interest Group (BIOSIG), Online, 16–18 September 2020; pp. 1–5. [Google Scholar]
  44. Chugh, T.; Jain, A. Fingerprint Spoof Detector Generalization. IEEE Trans. Inf. Forensics Secur. (TIFS) 2020, 16, 42–55. [Google Scholar] [CrossRef]
  45. Grosz, S.A.; Chugh, T.; Jain, A.K. Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach. In Proceedings of the International Conference on Biometrics (IJCB), Houston, TX, USA, 28 September–1 October 2020. [Google Scholar] [CrossRef]
  46. Kolberg, J.; Grimmer, M.; Gomez-Barrero, M.; Busch, C. Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection. Trans. Biom. Behav. Identity Sci. (TBIOM) 2021, 3, 190–202. [Google Scholar] [CrossRef]
  47. Kolberg, J.; Gomez-Barrero, M.; Busch, C. On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain. IET Biom. 2021, 10, 359–373. [Google Scholar] [CrossRef]
  48. Liu, F.; Liu, H.; Zhang, W.; Liu, G.; Shen, L. One-Class Fingerprint Presentation Attack Detection Using Auto-Encoder Network. IEEE Trans. Image Process. (TIP) 2021, 30, 2394–2407. [Google Scholar] [CrossRef] [PubMed]
  49. Peng, C.; Chen, M.; Jiang, X. Under-Display Ultrasonic Fingerprint Recognition With Finger Vessel Imaging. IEEE Sens. J. 2021, 21, 7412–7419. [Google Scholar] [CrossRef]
  50. Engelsma, J.J.; Cao, K.; Jain, A.K. RaspiReader: Open Source Fingerprint Reader. IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI) 2018, 41, 2511–2524. [Google Scholar] [CrossRef] [Green Version]
  51. Kauba, C.; Debiasi, L.; Uhl, A. Enabling Fingerprint Presentation Attacks: Fake Fingerprint Fabrication Techniques and Recognition Performance. arXiv 2020, arXiv:2012.00606. [Google Scholar]
  52. Cortes, C.; Vapnik, V. Support-vector Networks. Mach. Learn. 1995, 20, 273–297. [Google Scholar] [CrossRef]
  53. Gomez-Barrero, M.; Kolberg, J.; Busch, C. Towards Multi-Modal Finger Presentation Attack Detection. In Proceedings of the International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Las Palmas de Gran Canaria, Spain, 26–29 November 2018; pp. 547–552. [Google Scholar] [CrossRef]
  54. Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H. Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging. In Proceedings of the International Conference on Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 26–28 September 2018; pp. 1–6. [Google Scholar] [CrossRef]
  55. Kolberg, J.; Gomez-Barrero, M.; Busch, C. Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging. In Proceedings of the International Conference on Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 18–20 September 2019; pp. 1–5. [Google Scholar]
  56. Qian, X.; Hua, X.S.; Chen, P.; Ke, L. PLBP: An Effective Local Binary Patterns Texture Descriptor with Pyramid Representation. Pattern Recognit. 2011, 44, 2502–2515. [Google Scholar] [CrossRef]
  57. Husseis, A.; Liu-Jimenez, J.; Sanchez-Reillo, R. Fingerprint Presentation Attack Detection Utilizing Spatio-Temporal Features. Sensors 2021, 21, 2059. [Google Scholar] [CrossRef]
  58. ISO/IEC JTC1 SC37 Biometrics. ISO/IEC 30107-3. Information Technology—Biometric Presentation Attack Detection—Part 3: Testing and Reporting; ISO/IEC, 2017. [Google Scholar]
  59. Plesh, R.; Bahmani, K.; Jang, G.; Yambay, D.; Brownlee, K.; Swyka, T.; Johnson, P.; Ross, A.; Schuckers, S. Fingerprint Presentation Attack Detection utilizing Time-Series, Color Fingerprint Captures. In Proceedings of the International Conference on Biometrics (ICB), Crete, Greece, 4–7 June 2019; pp. 1–8. [Google Scholar] [CrossRef]
  60. Gomez-Barrero, M.; Kolberg, J.; Busch, C. Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside. In Proceedings of the International Conference on Biometrics (ICB), Crete, Greece, 4–7 June 2019; pp. 1–8. [Google Scholar] [CrossRef]
  61. Rowe, R.K.; Nixon, K.A.; Butler, P.W. Multispectral Fingerprint Image Acquisition. In Advances in Biometrics: Sensors, Algorithms and Systems; Springer: London, UK, 2008; pp. 3–23. [Google Scholar] [CrossRef]
  62. Gomez-Barrero, M.; Tolosana, R.; Kolberg, J.; Busch, C. Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection. In AI and Deep Learning in Biometric Security: Trends, Potential and Challenges; CRC Press: Boca Raton, FL, USA, 2021; pp. 105–132. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.