A Survey on Deep Learning Techniques for Fingerprint Presentation Attack Detection
Abstract
1. Introduction
Systematic Review Protocol
- RQ1: How many types of FPAD methods in terms of capture device are included?
- RQ2: What DL techniques are used in the FPAD methods?
- RQ3: Which publicly available datasets are currently used in FPAD?
- RQ4: What are the current challenges and the future trends of FPAD techniques?
- We present the comprehensive survey on deep-learning-based FPAD techniques, together with the taxonomy, for both contact and contactless fingerprints, and compare these approaches on the different attributes of design;
- We present a comprehensive survey on the PAIs that are widely employed in both contact and contactless fingerprint biometrics;
- We present a study on the usage of deep learning interpretation tools on FPAD methods;
- We outline the main challenges and the potential future work for reliable fingerprint detection.
2. Fingerprint Recognition Systems (FRS)
3. Fingerprint Presentation Attack Instrument (PAI)
4. Existing Datasets for Fingerprint PAD
5. Deep Learning-Based Fingerprint Presentation Attack Detection
5.1. Structured Comparison Across Scenarios and Deployment Constraints
5.2. Adversarial Robustness and Security Threat Models
5.3. Contact-Based FPAD
5.3.1. End-to-End Deep Learning
| Author | Year | Backbone | Loss Function | Main Contribution |
|---|---|---|---|---|
| Nogueira et al. [66] | 2014 | DCNN | SVM | Deep feature with SVM |
| Wang et al. [67] | 2015 | DCNN | Binary CE loss | Voting strategy |
| Menotti et al. [69] | 2015 | DCNN | Binary CE loss | SpoofNet |
| Kim et al. [70] | 2016 | DBN | MSE loss | Deep Belief Network |
| Park et al. [68] | 2016 | DCNN | Binary CE loss | Patch-based method |
| Lazimul and Binoy [78] | 2017 | DCNN | Binary CE loss | Fingerprint Image Enhancement |
| Jang et al. [79] | 2017 | DCNN | Binary CE loss | Contrast enhancement and CNN |
| Chugh et al. [71] | 2017 | Inception-v3 | Binary CE loss | Extract patch near minutiae |
| Chugh et al. [30] | 2018 | MobileNet-v1 | Binary CE loss | Define a global Spoofness Score |
| Pala [80] | 2017 | DCNN | Triples loss | Triplet embedding representation |
| Jung and Heo [81] | 2018 | DCNN | SRE loss | Employ SRE loss function |
| Nguyen et al. [74] | 2018 | SqueezeNet | Binary CE loss | Optimized lightweight SqueezeNet |
| Chugh and Jain [26] | 2019 | DCNN | Binary CE loss | Universal Material Generator |
| Park et al. [77] | 2019 | SqueezeNet | Three class CE loss | Tiny and low-cost network |
| Yuan et al. [82] | 2019 | DCNN | Binary CE loss | Image Scale Equalization (ISE) layer |
| Zhang et al. [83] | 2019 | ResNet | Binary CE loss | Slim-ResCNN framework |
| Zhang et al. [84] | 2020 | DenseNet | Binary CE loss | Lightweight FLDNet |
| Jian et al. [85] | 2020 | DenseNet | Binary CE loss | Genetic algorithm on DenseNet |
| Liu et al. [86] | 2021 | MobileNet V3 | Binary CE loss | Rethinking strategy |
| Rai et al. [87] | 2023 | MobileNet V1 | Support Vector Classifier | Feature extraction and SVC |
| Grosz et al. [88] | 2023 | Vision transformer | MSE loss | Joint model for matching and detection |
| Raja et al. [89] | 2023 | Vision transformer | Binary CE loss | DeiT-base model |
| Yuan et al. [90] | 2024 | Attention residual CNN | Custom loss | Siamese attention residual network |
| Cheniti et al. [91] | 2025 | VGG16 and ResNet50 | Binary CE loss | A dual-pre-trained design |
5.3.2. FPAD Using Transfer Learning/Fine-Tuning
5.3.3. Generalized Deep Learning
| Author | Year | Backbone | Loss Function | Main Contribution |
|---|---|---|---|---|
| Pereira et al. [101] | 2020 | Species-invariant network | Adversarial loss | Adversarial learning |
| Chugh and Jain [102] | 2020 | Universal Material Generator | Adversarial and style loss | Style transfer-based approach |
| Sandouka et al. [103] | 2021 | GAN, EfficientNet V2 | Adversarial loss, reconstruction loss | Unified GAN |
| Sandouka et al. [104] | 2021 | Transformer, CycleGAN | Adversarial loss, cycle consistency loss | Domain transfer |
| Lee et al. [106] | 2022 | CNN, CycleGAN | Adversarial loss, binary CE loss | Style transfer |
| Liu et al. [107] | 2022 | MobileNet V2 | PA-Adaptation loss, binary CE loss | Feature denoising model |
| Anshul et al. [108] | 2023 | Auxiliary Classifier GAN | Adversarial loss | Enhanced GAN |
| Rai et al. [109] | 2024 | GAN | Adversarial loss | Open Patch Generator |
5.4. Contactless-Based FPAD
Anomaly Detection
5.5. Smartphone-Based FPAD
| Author | Year | Backbone | Loss Function | Main Contribution |
|---|---|---|---|---|
| Zhang et al. [124] | 2016 | CNN | Binary CE loss | Handcrafted features and SVM |
| Fujio et al. [125] | 2018 | AlexNet | Binary CE loss | CNN-based method |
| Marasco and Vurity [126] | 2021 | AlexNet, ResNet18 | Binary CE loss | Evaluate different CNNs |
| Marasco et al. [127] | 2022 | 6 CNN models | Binary CE loss | Explore various color spaces |
| Purnapatra et al. [44] | 2023 | DenseNet 121 and NASNet | Binary CE loss | A new fingerphoto dataset |
| Li and Raghavendra [129] | 2023 | 8 CNN models | SVM | Compare 8 CNNs |
| Adami et al. [131] | 2023 | ResNet18 | Arcface loss and centre loss | Semi-supervised approach |
| Priesnitz et al. [138] | 2023 | 9 different models | Binary CE loss | Benchmark various models |
| Li and Raghavendra [130] | 2024 | 8 CNN models | SVM | Apply different preprocessing strategy |
| Priesnitz et al. [133] | 2024 | 4 CNN models | Binary CE loss | Explore generalizability and explainability ability |
| Liu et al. [134] | 2024 | Autoencoder | MSE loss | An unsupervised approach |
| Li et al. [136] | 2024 | Diffusion | MSE loss | one-class approach |
| Adami et al. [135] | 2024 | Autoencoder | MSE loss | An unsupervised approach |
| Vurity et al. [139] | 2025 | MobileNet-V3 | Binary CE loss | Multiple color spaces |
| Adami and Karimian [140] | 2025 | Swin-UNet | Binary CE loss | Domain adaptation |
| Li et al. [137] | 2025 | LLM | NA | Attempt to use LLM for PAD |
5.6. FPAD Using Hybrid Feature Extraction Methods
5.7. Practical Deployment Considerations
| Author | Year | Backbone | Loss Function | Main Contribution |
|---|---|---|---|---|
| Tolosana et al. [142] | 2018 | RenNet, MobileNet, VGG19 | Binary CE loss | Combine deep and SWIR features |
| Gomez et al. [143] | 2019 | ResNet and VGG | Binary CE loss | Combine LSCI and SWIR features |
| Plesh et al. [144] | 2019 | Inception-V3 | Binary CE loss | Combine time-series feature with deep feature |
| Jomaa et al. [141] | 2020 | MobileNet-v2 | Binary CE loss | Combine ECG feature and deep feature |
| Kolberg et al. [145] | 2021 | LRCN, CNN and AutoEncoder | Binary CE loss | Combine laser and SWIR features |
6. Interpretability of Fingerprint Presentation Attack Detection
7. Performance Evaluation Metrics
7.1. Evaluation Metrics from LivDet Competitions
- Frej: Rate of failure to enroll. Failure to enroll indicates inability to extract features from the fingerprints of certain individual.
- Fcorrlive: Rate of the live fingerprint to be classified correctly.
- Fcorrfake: Rate of the fake fingerprint to be classified correctly.
- Ferrlive: Rate of the live fingerprint to be misclassified.
- Ferrfake: Rate of the fake fingerprint to be misclassified.
7.2. ISO/IEC Metrics for PAD
- Liveness Accuracy: Rate of samples correctly classified by the PAD system.
- APCER (Attack Presentation Classification Error Rate): Percentage ratio of presentation attack test samples misidentified as bona fide samples.
- BPCER (Bona fide Presentation Classification Error Rate): Percentage ratio of bona fide test samples misidentified as presentation attack samples.
- FNMR (False Non-Match Rate): Rate of genuine fingerprints to be classified as an impostor.
- FMR (False Match Rate): Rate of zero-effort impostors classified as genuine.
- IAPMR (Impostor Attack Presentation Match Rate): Rate of impostor attack presentations classified as genuine.
- Integrated Matching Accuracy: Rate of samples correctly classified by the integrated system.
7.3. Critical Discussion of Metrics and Benchmarking Bias
7.4. Benchmark
7.4.1. Contact-Based FPAD Method Benchmark
7.4.2. Smartphone FPAD Method Benchmark
8. Future Work
8.1. Generalization to Unknown Attack Detection
8.2. Interpretability to Fingerprint Presentation Attack Detection
8.3. Lightweight Models for Fingerphoto Presentation Attack Detection
8.4. Lack of a Large-Scale Publicly Available Dataset
8.5. Potential Adversarial Presentation Attack
8.6. Multimodal Fusion for Fingerprint PAD
- Decision-level: Independently calibrate PAD scores per modality, fuse identity via weighted logit-sum or logistic regression only across modalities that pass PAD. Report single-modality vs. fused performance.
- Score-level: Multiply match evidence by a PAD-derived weight, and add quality-aware gating using no-reference metrics: blur (face), occlusion/eyelid (iris), moisture/pressure (fingerprint).
- Feature-level: Learn a lightweight cross-attention between face/iris embeddings and fingerprint texture features to share presentation-artifact cues (e.g., specular patterns, paper/print periodicity). Use modality-dropout so the system degrades gracefully if one stream is absent.
8.7. Large Language Models (LLMs) for FPAD
9. Discussion
9.1. RQ1: How Many Types of FPAD Methods in Terms of Capture Device Are Included?
9.2. RQ2: What DL Techniques Are Used in the FPAD Methods?
9.3. RQ3: Which Publicly Available Datasets Are Currently Used in FPAD?
9.4. RQ4: What Are the Current Challenges and the Future Trends of FPAD Techniques?
10. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Automated Fingerprint Identification System. Innovatrics. 2003. Available online: https://www.innovatrics.com/glossary/afis-automated-fingerprint-identification-system/ (accessed on 12 February 2026).
- Spoofing Adhaar. 2022. Available online: http://timesofindia.indiatimes.com/articleshow/83324403.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst/ (accessed on 12 February 2026).
- Al-Ajlan, A. Survey on fingerprint liveness detection. In Proceedings of the 2013 International Workshop on Biometrics and Forensics (IWBF); IEEE: Piscataway, NJ, USA, 2013; pp. 1–5. [Google Scholar]
- Sousedik, C.; Busch, C. Presentation attack detection methods for fingerprint recognition systems: A survey. IET Biom. 2014, 3, 219–233. [Google Scholar] [CrossRef]
- Marasco, E.; Ross, A. A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. (CSUR) 2014, 47, 1–36. [Google Scholar] [CrossRef]
- Kulkarni, S.S.; Patil, H.Y. Survey on fingerprint spoofing detection techniques and databases. Int. J. Comput. Appl. 2015, 975, 8887. [Google Scholar]
- Yang, W.; Wang, S.; Hu, J.; Zheng, G.; Valli, C. Security and accuracy of fingerprint-based biometrics: A review. Symmetry 2019, 11, 141. [Google Scholar] [CrossRef]
- Singh, J.M.; Madhun, A.; Li, G.; Ramachandra, R. A survey on unknown presentation attack detection for fingerprint. In Proceedings of the International Conference on Intelligent Technologies and Applications; Springer: Berlin/Heidelberg, Germany, 2021; pp. 189–202. [Google Scholar]
- Habib, A.; Selwal, A. Robust anti-spoofing techniques for fingerprint liveness detection: A Survey. In Proceedings of the IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2021; Volume 1033, p. 012026. [Google Scholar]
- Sharma, D.; Selwal, A. FinPAD: State-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives. Pattern Recognit. Lett. 2021, 152, 225–252. [Google Scholar] [CrossRef]
- Ametefe, D.; Sarnin, S.; Ali, D.; Zaheer, M. Fingerprint Liveness Detection Schemes: A Review on Presentation Attack. Comput. Methods Biomech. Biomed. Eng. Imaging Vis. 2022, 10, 217–240. [Google Scholar] [CrossRef]
- LIVDET. Spoofing Adhaar. 2022. Available online: https://livdet.diee.unica.it (accessed on 12 February 2026).
- Maltoni, D.; Maio, D.; Jain, A.K.; Prabhakar, S. Handbook of Fingerprint Recognition, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar] [CrossRef]
- Karras, T.; Laine, S.; Aila, T. A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition; IEEE: Piscataway, NJ, USA, 2019; pp. 4401–4410. [Google Scholar]
- Bontrager, P.; Roy, A.; Togelius, J.; Memon, N.; Ross, A. Deepmasterprints: Generating masterprints for dictionary attacks via latent variable evolution. In Proceedings of the 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS); IEEE: Piscataway, NJ, USA, 2018; pp. 1–9. [Google Scholar]
- Gajawada, R.; Popli, A.; Chugh, T.; Namboodiri, A.; Jain, A.K. Universal material translator: Towards spoof fingerprint generalization. In Proceedings of the 2019 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2019; pp. 1–8. [Google Scholar]
- Engelsma, J.J.; Grosz, S.A.; Jain, A.K. PrintsGAN: Synthetic fingerprint generator. arXiv 2022, arXiv:2201.03674. [Google Scholar] [CrossRef]
- Kim, H.; Cui, X.; Kim, M.G.; Nguyen, T.H.B. Fingerprint generation and presentation attack detection using deep neural networks. In Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR); IEEE: Piscataway, NJ, USA, 2019; pp. 375–378. [Google Scholar]
- Grosz, S.A.; Jain, A.K. Spoofgan: Synthetic fingerprint spoof images. IEEE Trans. Inf. Forensics Secur. 2022, 18, 730–743. [Google Scholar] [CrossRef]
- Roy, A.; Memon, N.; Togelius, J.; Ross, A. Evolutionary methods for generating synthetic masterprint templates: Dictionary attack in fingerprint recognition. In Proceedings of the 2018 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2018; pp. 39–46. [Google Scholar]
- Makrushin, A.; Trebeljahr, M.; Seidlitz, S.; Dittmann, J. On feasibility of GAN-based fingerprint morphing. In Proceedings of the 2021 IEEE 23rd International Workshop on Multimedia Signal Processing (MMSP); IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
- Ferrara, M.; Cappelli, R.; Maltoni, D. On the feasibility of creating double-identity fingerprints. IEEE Trans. Inf. Forensics Secur. 2016, 12, 892–900. [Google Scholar] [CrossRef]
- Espinoza, M.; Champod, C.; Margot, P. Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic Sci. Int. 2011, 204, 41–49. [Google Scholar] [CrossRef]
- Kanich, O.; Drahanskỳ, M.; Mézl, M. Use of creative materials for fingerprint spoofs. In Proceedings of the 2018 International Workshop on Biometrics and Forensics (IWBF); IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
- Prabakaran, E.; Pillay, K. Synthesis and characterization of fluorescent N-CDs/ZnONPs nanocomposite for latent fingerprint detection by using powder brushing method. Arab. J. Chem. 2020, 13, 3817–3835. [Google Scholar] [CrossRef]
- Chugh, T.; Jain, A.K. Fingerprint spoof generalization. arXiv 2019, arXiv:1912.02710. [Google Scholar] [CrossRef]
- Micheletto, M.; Orrù, G.; Casula, R.; Yambay, D.; Marcialis, G.L.; Schuckers, S.C. Review of the Fingerprint Liveness Detection (LivDet) competition series: From 2009 to 2021. arXiv 2022, arXiv:2202.07259. [Google Scholar] [CrossRef]
- Jia, J.; Cai, L.; Zhang, K.; Chen, D. A new approach to fake finger detection based on skin elasticity analysis. In Proceedings of the Advances in Biometrics: International Conference, ICB 2007, Seoul, Republic of Korea, 27–29 August 2007; Proceedings; Springer: Berlin/Heidelberg, Germany, 2007; pp. 309–318. [Google Scholar]
- Antonelli, A.; Cappelli, R.; Maio, D.; Maltoni, D. Fake finger detection by skin distortion analysis. IEEE Trans. Inf. Forensics Secur. 2006, 1, 360–373. [Google Scholar] [CrossRef]
- Chugh, T.; Cao, K.; Jain, A.K. Fingerprint spoof buster: Use of minutiae-centered patches. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2190–2202. [Google Scholar] [CrossRef]
- Taneja, A.; Tayal, A.; Malhorta, A.; Sankaran, A.; Vatsa, M.; Singh, R. Fingerphoto spoofing in mobile devices: A preliminary study. In Proceedings of the 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS); IEEE: Piscataway, NJ, USA, 2016; pp. 1–7. [Google Scholar]
- Kolberg, J.; Priesnitz, J.; Rathgeb, C.; Busch, C. COLFISPOOF: A New Database for Contactless Fingerprint Presentation Attack Detection Research. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision; IEEE: Piscataway, NJ, USA, 2023; pp. 653–661. [Google Scholar]
- Marcialis, G.L.; Lewicke, A.; Tan, B.; Coli, P.; Grimberg, D.; Congiu, A.; Tidu, A.; Roli, F.; Schuckers, S. First international fingerprint liveness detection competition—LivDet 2009. In Proceedings of the Image Analysis and Processing–ICIAP 2009: 15th International Conference Vietri sul Mare, Italy, 8–11 September 2009; Proceedings 15; Springer: Berlin/Heidelberg, Germany, 2009; pp. 12–23. [Google Scholar]
- Yambay, D.; Ghiani, L.; Denti, P.; Marcialis, G.L.; Roli, F.; Schuckers, S. LivDet 2011—Fingerprint liveness detection competition 2011. In Proceedings of the 2012 5th IAPR international conference on biometrics (ICB); IEEE: Piscataway, NJ, USA, 2012; pp. 208–215. [Google Scholar]
- Ghiani, L.; Yambay, D.; Mura, V.; Tocco, S.; Marcialis, G.L.; Roli, F.; Schuckcrs, S. Livdet 2013 fingerprint liveness detection competition 2013. In Proceedings of the 2013 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2013; pp. 1–6. [Google Scholar]
- Mura, V.; Ghiani, L.; Marcialis, G.L.; Roli, F.; Yambay, D.A.; Schuckers, S.A. LivDet 2015 fingerprint liveness detection competition 2015. In Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS); IEEE: Piscataway, NJ, USA, 2015; pp. 1–6. [Google Scholar] [CrossRef]
- Mura, V.; Orrù, G.; Casula, R.; Sibiriu, A.; Loi, G.; Tuveri, P.; Ghiani, L.; Marcialis, G.L. LivDet 2017 fingerprint liveness detection competition 2017. In Proceedings of the 2018 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2018; pp. 297–302. [Google Scholar]
- Orrù, G.; Casula, R.; Tuveri, P.; Bazzoni, C.; Dessalvi, G.; Micheletto, M.; Ghiani, L.; Marcialis, G.L. Livdet in action-fingerprint liveness detection competition 2019. In Proceedings of the 2019 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
- Casula, R.; Micheletto, M.; Orrù, G.; Delussu, R.; Concas, S.; Panzino, A.; Marcialis, G.L. LivDet 2021 fingerprint liveness detection competition-into the unknown. In Proceedings of the 2021 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
- Micheletto, M.; Casula, R.; Orrù, G.; Carta, S.; Concas, S.; La Cava, S.M.; Fierrez, J.; Marcialis, G.L. LivDet2023-fingerprint liveness detection competition: Advancing generalization. In Proceedings of the 2023 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2023; pp. 1–8. [Google Scholar]
- Galbally, J.; Fierrez, J.; Alonso-Fernandez, F.; Martinez-Diaz, M. Evaluation of direct attacks to fingerprint verification systems. Telecommun. Syst. 2011, 47, 243–254. [Google Scholar] [CrossRef]
- Sun, H.; Wang, H.; Zhang, Y.; Liang, R.; Chen, P.; Feng, J. ZJUT-EIFD: A synchronously collected external and internal fingerprint database. IEEE Trans. Pattern Anal. Mach. Intell. 2023, 46, 2267–2284. [Google Scholar] [CrossRef] [PubMed]
- Wasnik, P.; Ramachandra, R.; Stokkenes, M.; Raja, K.; Busch, C. Improved fingerphoto verification system using multi-scale second order local structures. In Proceedings of the 2018 International Conference of the Biometrics Special Interest Group (BIOSIG); IEEE: Piscataway, NJ, USA, 2018; pp. 1–5. [Google Scholar]
- Purnapatra, S.; Miller-Lynch, C.; Miner, S.; Liu, Y.; Bahmani, K.; Dey, S.; Schuckers, S. Presentation Attack Detection with Advanced CNN Models for Noncontact-based Fingerprint Systems. arXiv 2023, arXiv:2303.05459. [Google Scholar]
- Drahansky, M.; Notzel, R.; Funk, W. Liveness detection based on fine movements of the fingertip surface. In Proceedings of the 2006 IEEE Information Assurance Workshop; IEEE: Piscataway, NJ, USA, 2006; pp. 42–47. [Google Scholar]
- Yau, W.Y.; Tran, H.L.; Teoh, E.K. Fake finger detection using an electrotactile display system. In Proceedings of the 2008 10th International Conference on Control, Automation, Robotics and Vision; IEEE: Piscataway, NJ, USA, 2008; pp. 962–966. [Google Scholar]
- Reddy, P.V.; Kumar, A.; Rahman, S.; Mundra, T.S. A new antispoofing approach for biometric devices. IEEE Trans. Biomed. Circuits Syst. 2008, 2, 328–337. [Google Scholar] [CrossRef]
- Cheng, Y.; Larin, K.V. In vivo two-and three-dimensional imaging of artificial and real fingerprints with optical coherence tomography. IEEE Photonics Technol. Lett. 2007, 19, 1634–1636. [Google Scholar] [CrossRef]
- Bossen, A.; Lehmann, R.; Meier, C. Internal fingerprint identification with optical coherence tomography. IEEE Photonics Technol. Lett. 2010, 22, 507–509. [Google Scholar] [CrossRef]
- Liu, M.; Buma, T. Biometric mapping of fingertip eccrine glands with optical coherence tomography. IEEE Photonics Technol. Lett. 2010, 22, 1677–1679. [Google Scholar] [CrossRef]
- Lowe, D. Object recognition from local scale-invariant features. In Proceedings of the Seventh IEEE International Conference on Computer Vision; IEEE: Piscataway, NJ, USA, 1999; Volume 2, pp. 1150–1157. [Google Scholar] [CrossRef]
- Kannala, J.; Rahtu, E. Bsif: Binarized statistical image features. In Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012); IEEE: Piscataway, NJ, USA, 2012; pp. 1363–1366. [Google Scholar]
- Guo, Z.; Zhang, L.; Zhang, D. A completed modeling of local binary pattern operator for texture classification. IEEE Trans. Image Process. 2010, 19, 1657–1663. [Google Scholar] [CrossRef] [PubMed]
- Ojansivu, V.; Heikkilä, J. Blur insensitive texture classification using local phase quantization. In Proceedings of the International Conference on Image and Signal Processing; Springer: Berlin/Heidelberg, Germany, 2008; pp. 236–243. [Google Scholar]
- Ghiani, L.; Marcialis, G.L.; Roli, F. Fingerprint liveness detection by local phase quantization. In Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012); IEEE: Piscataway, NJ, USA, 2012; pp. 537–540. [Google Scholar]
- Ghiani, L.; Hadid, A.; Marcialis, G.L.; Roli, F. Fingerprint liveness detection using binarized statistical image features. In Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS); IEEE: Piscataway, NJ, USA, 2013; pp. 1–6. [Google Scholar]
- Gragnaniello, D.; Poggi, G.; Sansone, C.; Verdoliva, L. Fingerprint liveness detection based on weber local image descriptor. In Proceedings of the 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications; IEEE: Piscataway, NJ, USA, 2013; pp. 46–50. [Google Scholar]
- Zhang, Y.; Fang, S.; Xie, Y.; Xu, T. Fake fingerprint detection based on wavelet analysis and local binary pattern. In Proceedings of the Chinese Conference on Biometric Recognition; Springer: Berlin/Heidelberg, Germany, 2014; pp. 191–198. [Google Scholar]
- Gragnaniello, D.; Poggi, G.; Sansone, C.; Verdoliva, L. Local contrast phase descriptor for fingerprint liveness detection. Pattern Recognit. 2015, 48, 1050–1058. [Google Scholar] [CrossRef]
- Krizhevsky, A.; Sutskever, I.; Hinton, G.E. ImageNet Classification with Deep Convolutional Neural Networks. In Proceedings of the Advances in Neural Information Processing Systems 25 (NeurIPS 2012); Pereira, F., Burges, C.J.C., Bottou, L., Weinberger, K.Q., Eds.; ACM: Red Hook, NY, USA, 2012; pp. 1097–1105. [Google Scholar]
- Russakovsky, O.; Deng, J.; Su, H.; Krause, J.; Satheesh, S.; Ma, S.; Huang, Z.; Karpathy, A.; Khosla, A.; Bernstein, M.; et al. Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 2015, 115, 211–252. [Google Scholar] [CrossRef]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar]
- Huang, G.; Liu, Z.; Van Der Maaten, L.; Weinberger, K.Q. Densely connected convolutional networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017; pp. 4700–4708. [Google Scholar]
- Srivastava, N.; Hinton, G.; Krizhevsky, A.; Sutskever, I.; Salakhutdinov, R. Dropout: A simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 2014, 15, 1929–1958. [Google Scholar]
- Ioffe, S.; Szegedy, C. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In Proceedings of the International Conference on Machine Learning; PMLR: Cambridge, MA, USA, 2015; pp. 448–456. [Google Scholar]
- Nogueira, R.F.; de Alencar Lotufo, R.; Machado, R.C. Evaluating software-based fingerprint liveness detection using convolutional networks and local binary patterns. In Proceedings of the 2014 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) Proceedings; IEEE: Piscataway, NJ, USA, 2014; pp. 22–29. [Google Scholar]
- Wang, C.; Li, K.; Wu, Z.; Zhao, Q. A DCNN based fingerprint liveness detection algorithm with voting strategy. In Proceedings of the Chinese Conference on Biometric Recognition; Springer: Berlin/Heidelberg, Germany, 2015; pp. 241–249. [Google Scholar]
- Park, E.; Kim, W.; Li, Q.; Kim, J.; Kim, H. Fingerprint liveness detection using CNN features of random sample patches. In Proceedings of the 2016 International Conference of the Biometrics Special Interest Group (BIOSIG); IEEE: Piscataway, NJ, USA, 2016; pp. 1–4. [Google Scholar]
- Menotti, D.; Chiachia, G.; Pinto, A.; Schwartz, W.R.; Pedrini, H.; Falcao, A.X.; Rocha, A. Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 2015, 10, 864–879. [Google Scholar] [CrossRef]
- Kim, S.; Park, B.; Song, B.S.; Yang, S. Deep belief network based statistical feature learning for fingerprint liveness detection. Pattern Recognit. Lett. 2016, 77, 58–65. [Google Scholar] [CrossRef]
- Chugh, T.; Cao, K.; Jain, A.K. Fingerprint spoof detection using minutiae-based local patches. In Proceedings of the 2017 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2017; pp. 581–589. [Google Scholar]
- Szegedy, C.; Vanhoucke, V.; Ioffe, S.; Shlens, J.; Wojna, Z. Rethinking the inception architecture for computer vision. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 2818–2826. [Google Scholar]
- Howard, A.G.; Zhu, M.; Chen, B.; Kalenichenko, D.; Wang, W.; Weyand, T.; Andreetto, M.; Adam, H. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv 2017, arXiv:1704.04861. [Google Scholar] [CrossRef]
- Nguyen, T.H.B.; Park, E.; Cui, X.; Nguyen, V.H.; Kim, H. fPADnet: Small and efficient convolutional neural network for presentation attack detection. Sensors 2018, 18, 2532. [Google Scholar] [CrossRef]
- Iandola, F.N.; Han, S.; Moskewicz, M.W.; Ashraf, K.; Dally, W.J.; Keutzer, K. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5 MB model size. arXiv 2016, arXiv:1602.07360. [Google Scholar]
- Gatys, L.A.; Ecker, A.S.; Bethge, M. A neural algorithm of artistic style. arXiv 2015, arXiv:1508.06576. [Google Scholar] [CrossRef]
- Park, E.; Cui, X.; Nguyen, T.H.B.; Kim, H. Presentation attack detection using a tiny fully convolutional network. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3016–3025. [Google Scholar] [CrossRef]
- Lazimul, L.T.; Binoy, D. Fingerprint liveness detection using convolutional neural network and fingerprint image enhancement. In Proceedings of the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS); IEEE: Piscataway, NJ, USA, 2017; pp. 731–735. [Google Scholar]
- Jang, H.U.; Choi, H.Y.; Kim, D.; Son, J.; Lee, H.K. Fingerprint spoof detection using contrast enhancement and convolutional neural networks. In Proceedings of the International Conference on Information Science and Applications; Springer: Berlin/Heidelberg, Germany, 2017; pp. 331–338. [Google Scholar]
- Pala, F.; Bhanu, B. Deep Triplet Embedding Representations for Liveness Detection. In Deep Learning for Biometrics; Bhanu, B., Kumar, A., Eds.; Advances in Computer Vision and Pattern Recognition; Springer: Cham, Switzerland, 2017; pp. 287–307. [Google Scholar]
- Jung, H.; Heo, Y. Fingerprint liveness map construction using convolutional neural network. Electron. Lett. 2018, 54, 564–566. [Google Scholar] [CrossRef]
- Yuan, C.; Xia, Z.; Jiang, L.; Cao, Y.; Wu, Q.J.; Sun, X. Fingerprint liveness detection using an improved CNN with image scale equalization. IEEE Access 2019, 7, 26953–26966. [Google Scholar] [CrossRef]
- Zhang, Y.; Shi, D.; Zhan, X.; Cao, D.; Zhu, K.; Li, Z. Slim-ResCNN: A deep residual convolutional neural network for fingerprint liveness detection. IEEE Access 2019, 7, 91476–91487. [Google Scholar] [CrossRef]
- Zhang, Y.; Pan, S.; Zhan, X.; Li, Z.; Gao, M.; Gao, C. FLDNet: Light dense CNN for fingerprint liveness detection. IEEE Access 2020, 8, 84141–84152. [Google Scholar] [CrossRef]
- Jian, W.; Zhou, Y.; Liu, H. Densely connected convolutional network optimized by genetic algorithm for fingerprint liveness detection. IEEE Access 2020, 9, 2229–2243. [Google Scholar] [CrossRef]
- Liu, H.; Zhang, W.; Liu, F.; Wu, H.; Shen, L. Fingerprint presentation attack detector using global-local model. IEEE Trans. Cybern. 2021, 52, 12315–12328. [Google Scholar] [CrossRef] [PubMed]
- Rai, A.; Dey, S.; Patidar, P.; Rai, P. MoSFPAD: An end-to-end Ensemble of MobileNet and Support Vector Classifier for Fingerprint Presentation Attack Detection. arXiv 2023, arXiv:2303.01465. [Google Scholar] [CrossRef]
- Grosz, S.A.; Wijewardena, K.P.; Jain, A.K. ViT unified: Joint fingerprint recognition and presentation attack detection. In Proceedings of the 2023 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2023; pp. 1–9. [Google Scholar]
- Raja, K.; Ramachandra, R.; Venkatesh, S.; Gomez-Barrero, M.; Rathgeb, C.; Busch, C. Vision Transformers for Fingerprint Presentation Attack Detection. In Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment, 3rd ed.; Springer: Cham, Switzerland, 2023; pp. 17–56. [Google Scholar]
- Yuan, C.; Xu, Z.; Li, X.; Zhou, Z.; Huang, J.; Guo, P. An Interpretable Siamese Attention Res-CNN for Fingerprint Spoofing Detection. IET Biom. 2024, 2024, 6630173. [Google Scholar] [CrossRef]
- Cheniti, M.; Akhtar, Z.; Chandaliya, P.K. Dual-model synergy for fingerprint spoof detection using vgg16 and resnet50. J. Imaging 2025, 11, 42. [Google Scholar] [CrossRef]
- Schroff, F.; Kalenichenko, D.; Philbin, J. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015; pp. 815–823. [Google Scholar]
- Jung, H.Y.; Heo, Y.S.; Lee, S. Fingerprint liveness detection by a template-probe convolutional neural network. IEEE Access 2019, 7, 118986–118993. [Google Scholar] [CrossRef]
- Yuan, C.; Xia, Z.; Sun, X.; Wu, Q.J. Deep residual network with adaptive learning framework for fingerprint liveness detection. IEEE Trans. Cogn. Dev. Syst. 2019, 12, 461–473. [Google Scholar] [CrossRef]
- Xie, L.; Yuille, A. Genetic cnn. In Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, 22–29 October 2017; pp. 1379–1388. [Google Scholar]
- Nogueira, R.F.; de Alencar Lotufo, R.; Machado, R.C. Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1206–1213. [Google Scholar] [CrossRef]
- Toosi, A.; Cumani, S.; Bottino, A. CNN Patch-Based Voting for Fingerprint Liveness Detection. In Proceedings of the International Joint Conference on Computational Intelligence, Portugal, Madeira, Portugal, 1–3 November 2017; pp. 158–165. [Google Scholar]
- Toosi, A.; Cumani, S.; Bottino, A. Assessing transfer learning on convolutional neural networks for patch-based fingerprint liveness detection. In Proceedings of the International Joint Conference on Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2017; pp. 263–279. [Google Scholar]
- Ametefe, D.S.; Seroja, S.S..; Ali, D.M. Fingerprint presentation attack detection using deep transfer learning and densenet201 network/Divine S. Ametefe, Suzi S. Seroja, and Darmawaty M. Ali. J. Electr. Electron. Syst. Res. 2021, 19, 95–105. [Google Scholar] [CrossRef]
- Rajaram, K.; NG, B.A.; Guptha, A.S. CLNet: A contactless fingerprint spoof detection using deep neural networks with a transfer learning approach. Multimed. Tools Appl. 2024, 83, 27703–27722. [Google Scholar] [CrossRef]
- Pereira, J.A.; Sequeira, A.F.; Pernes, D.; Cardoso, J.S. A robust fingerprint presentation attack detection method against unseen attacks through adversarial learning. In Proceedings of the 2020 International Conference of the Biometrics Special Interest Group (BIOSIG); IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar]
- Chugh, T.; Jain, A.K. Fingerprint spoof detector generalization. IEEE Trans. Inf. Forensics Secur. 2020, 16, 42–55. [Google Scholar] [CrossRef]
- Sandouka, S.B.; Bazi, Y.; Alhichri, H.; Alajlan, N. Unified Generative Adversarial Networks for Multidomain Fingerprint Presentation Attack Detection. Entropy 2021, 23, 1089. [Google Scholar] [CrossRef]
- Sandouka, S.B.; Bazi, Y.; Alajlan, N. Transformers and generative adversarial networks for liveness detection in multitarget fingerprint sensors. Sensors 2021, 21, 699. [Google Scholar] [CrossRef]
- Zhu, J.Y.; Park, T.; Isola, P.; Efros, A.A. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, 22–29 October 2017; pp. 2223–2232. [Google Scholar]
- Lee, S.H.; Lim, M.Y.; Park, S.H.; Yoo, H.J.; Lee, Y.K. Towards Cross-materials: Fingerprint Liveness Detection based on Style Transfer. In Proceedings of the 2022 13th International Conference on Information and Communication Technology Convergence (ICTC); IEEE: Piscataway, NJ, USA, 2022; pp. 1332–1334. [Google Scholar]
- Liu, F.; Kong, Z.; Liu, H.; Zhang, W.; Shen, L. Fingerprint Presentation Attack Detection by Channel-Wise Feature Denoising. IEEE Trans. Inf. Forensics Secur. 2022, 17, 2963–2976. [Google Scholar] [CrossRef]
- Anshul, A.; Jha, A.; Jain, P.; Rai, A.; Sharma, R.P.; Dey, S. An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack Detection. SN Comput. Sci. 2023, 4, 444. [Google Scholar] [CrossRef]
- Rai, A.; Anshul, A.; Jha, A.; Jain, P.; Sharma, R.P.; Dey, S. An open patch generator based fingerprint presentation attack detection using generative adversarial network. Multimed. Tools Appl. 2024, 83, 27723–27746. [Google Scholar] [CrossRef]
- Hussein, M.E.; Spinoulas, L.; Xiong, F.; Abd-Almageed, W. Fingerprint presentation attack detection using a novel multi-spectral capture device and patch-based convolutional neural networks. In Proceedings of the 2018 IEEE international workshop on information forensics and security (WIFS); IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
- Mirzaalian, H.; Hussein, M.; Abd-Almageed, W. On the effectiveness of laser speckle contrast imaging and deep neural networks for detecting known and unknown fingerprint presentation attacks. In Proceedings of the 2019 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2019; pp. 1–8. [Google Scholar]
- Kolberg, J.; Vasile, A.C.; Gomez-Barrero, M.; Busch, C. Analysing the performance of LSTMs and CNNs on 1310 nm laser data for fingerprint presentation attack detection. In Proceedings of the 2020 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2020; pp. 1–7. [Google Scholar]
- Spinoulas, L.; Mirzaalian, H.; Hussein, M.E.; AbdAlmageed, W. Multi-modal fingerprint presentation attack detection: Evaluation on a new dataset. IEEE Trans. Biom. Behav. Identity Sci. 2021, 3, 347–364. [Google Scholar] [CrossRef]
- Sun, H.; Zhang, Y.; Chen, P.; Wang, H.; Liang, R. Internal structure attention network for fingerprint presentation attack detection from Optical Coherence Tomography. IEEE Trans. Biom. Behav. Identity Sci. 2023, 5, 524–537. [Google Scholar] [CrossRef]
- Zhang, W.; Liu, H.; Liu, F.; Ramachandra, R. A uniform representation model for OCT-based fingerprint presentation attack detection and reconstruction. Pattern Recognit. 2024, 145, 109981. [Google Scholar] [CrossRef]
- Saguy, M.; Almog, J.; Cohn, D.; Champod, C. Proactive forensic science in biometrics: Novel materials for fingerprint spoofing. J. Forensic Sci. 2022, 67, 534–542. [Google Scholar] [CrossRef] [PubMed]
- Engelsma, J.J.; Jain, A.K. Generalizing fingerprint spoof detector: Learning a one-class classifier. In Proceedings of the 2019 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2019; pp. 1–8. [Google Scholar]
- Rohrer, T.; Kolberg, J. GAN pretraining for deep convolutional autoencoders applied to Software-based Fingerprint Presentation Attack Detection. arXiv 2021, arXiv:2105.10213. [Google Scholar] [CrossRef]
- Géron, A. Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 3rd ed.; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2022. [Google Scholar]
- Kolberg, J.; Grimmer, M.; Gomez-Barrero, M.; Busch, C. Anomaly detection with convolutional autoencoders for fingerprint presentation attack detection. IEEE Trans. Biom. Behav. Identity Sci. 2021, 3, 190–202. [Google Scholar] [CrossRef]
- Liu, F.; Liu, H.; Zhang, W.; Liu, G.; Shen, L. One-class fingerprint presentation attack detection using auto-encoder network. IEEE Trans. Image Process. 2021, 30, 2394–2407. [Google Scholar] [CrossRef] [PubMed]
- Liu, Y.P.; Zuo, W.; Liang, R.; Sun, H.; Li, Z. Prototype-Guided Autoencoder for OCT-Based Fingerprint Presentation Attack Detection. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3461–3475. [Google Scholar] [CrossRef]
- Ramachandra, R.; Li, H. Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision; IEEE: Piscataway, NJ, USA, 2023; pp. 693–700. [Google Scholar]
- Zhang, Y.; Zhou, B.; Wu, H.; Wen, C. 2D fake fingerprint detection based on improved CNN and local descriptors for smart phone. In Proceedings of the Chinese Conference on Biometric Recognition; Springer: Berlin/Heidelberg, Germany, 2016; pp. 655–662. [Google Scholar]
- Fujio, M.; Kaga, Y.; Murakami, T.; Ohki, T.; Takahashi, K. Face/Fingerphoto Spoof Detection under Noisy Conditions by using Deep Convolutional Neural Network. Biosignals 2018, 2, 54–62. [Google Scholar]
- Marasco, E.; Vurity, A. Fingerphoto Presentation Attack Detection: Generalization in Smartphones. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data); IEEE: Piscataway, NJ, USA, 2021; pp. 4518–4523. [Google Scholar]
- Marasco, E.; Vurity, A.; Otham, A. Deep Color Spaces for Fingerphoto Presentation Attack Detection in Mobile Devices. In Proceedings of the International Conference on Computer Vision and Image Processing; Springer: Berlin/Heidelberg, Germany, 2022; pp. 351–362. [Google Scholar]
- Zoph, B.; Vasudevan, V.; Shlens, J.; Le, Q.V. Learning transferable architectures for scalable image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–23 June 2018; pp. 8697–8710. [Google Scholar]
- Li, H.; Ramachandra, R. Deep Features for Contactless Fingerprint Presentation Attack Detection: Can They Be Generalized? arXiv 2023, arXiv:2307.01845. [Google Scholar] [CrossRef]
- Li, H.; Ramachandra, R. Does Capture Background Influence the Accuracy of the Deep Learning Based Fingerphoto Presentation Attack Detection Techniques? In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) Workshops, Waikoloa, HI, USA, 3–8 January 2024; pp. 1034–1042. [Google Scholar]
- Adami, B.; Tehranipoor, S.; Nasrabadi, N.; Karimian, N. A universal anti-spoofing approach for contactless fingerprint biometric systems. arXiv 2023, arXiv:2310.15044. [Google Scholar] [CrossRef]
- Karras, T.; Aittala, M.; Hellsten, J.; Laine, S.; Lehtinen, J.; Aila, T. Training generative adversarial networks with limited data. Adv. Neural Inf. Process. Syst. 2020, 33, 12104–12114. [Google Scholar]
- Priesnitz, J.; Casula, R.; Kolberg, J.; Fang, M.; Madhu, A.; Rathgeb, C.; Marcialis, G.L.; Damer, N.; Busch, C. Mobile Contactless Fingerprint Presentation Attack Detection: Generalizability and Explainability. IEEE Trans. Biom. Behav. Identity Sci. 2024, 6, 561–574. [Google Scholar] [CrossRef]
- Liu, Y.P.; Yu, H.; Fang, H.; Li, Z.; Chen, P.; Liang, R. A Wavelet-Based Memory Autoencoder for Noncontact Fingerprint Presentation Attack Detection. IEEE Trans. Inf. Forensics Secur. 2024, 19, 8717–8730. [Google Scholar] [CrossRef]
- Adami, B.; Hosseinzadehketilateh, M.; Karimian, N. Contactless fingerprint biometric anti-spoofing: An unsupervised deep learning approach. In Proceedings of the 2024 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2024; pp. 1–10. [Google Scholar]
- Li, H.; Ramachandra, R.; Ragab, M.; Mondal, S.; Tan, Y.K.; Aung, K.M.M. Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models. In Proceedings of the 2024 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2024; pp. 1–10. [Google Scholar]
- Li, H.; Ramachandra, R.; Vetrekar, N.; Gad, R. On the Feasibility of Detecting Fingerphoto Presentation Attacks using Multimodal Large Language Models. In Proceedings of the 2025 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2025; pp. 1–10. [Google Scholar]
- Priesnitz, J.; Kolberg, J.; Fang, M.; Madhu, A.; Rathgeb, C.; Damer, N.; Busch, C. Colfipad: A presentation attack detection benchmark for contactless fingerprint recognition. In Proceedings of the 2023 IEEE International Joint Conference on Biometrics (IJCB); IEEE: Piscataway, NJ, USA, 2023; pp. 1–10. [Google Scholar]
- Vurity, A.; Marasco, E.; Ramachandra, R.; Park, J. ColFigPhotoAttnNet: Reliable Finger Photo Presentation Attack Detection Leveraging Window-Attention on Color Spaces. arXiv 2025. [Google Scholar] [CrossRef]
- Adami, B.; Karimian, N. GRU-AUNet: A Domain Adaptation Framework for Contactless Fingerprint Presentation Attack Detection. arXiv 2025, arXiv:2504.01213. [Google Scholar] [CrossRef]
- M. Jomaa, R.; Mathkour, H.; Bazi, Y.; Islam, M.S. End-to-end deep learning fusion of fingerprint and electrocardiogram signals for presentation attack detection. Sensors 2020, 20, 2085. [Google Scholar] [CrossRef] [PubMed]
- Tolosana, R.; Gomez-Barrero, M.; Kolberg, J.; Morales, A.; Busch, C.; Ortega-Garcia, J. Towards fingerprint presentation attack detection based on convolutional neural networks and short wave infrared imaging. In Proceedings of the 2018 International Conference of the Biometrics Special Interest Group (BIOSIG); IEEE: Piscataway, NJ, USA, 2018; pp. 1–5. [Google Scholar]
- Gomez-Barrero, M.; Kolberg, J.; Busch, C. Multi-modal fingerprint presentation attack detection: Analysing the surface and the inside. In Proceedings of the 2019 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2019; pp. 1–8. [Google Scholar]
- Plesh, R.; Bahmani, K.; Jang, G.; Yambay, D.; Brownlee, K.; Swyka, T.; Johnson, P.; Ross, A.; Schuckers, S. Fingerprint presentation attack detection utilizing time-series, color fingerprint captures. In Proceedings of the 2019 International Conference on Biometrics (ICB); IEEE: Piscataway, NJ, USA, 2019; pp. 1–8. [Google Scholar]
- Kolberg, J.; Gomez-Barrero, M.; Busch, C. On the generalisation capabilities of fingerprint presentation attack detection methods in the short wave infrared domain. IET Biom. 2021, 10, 359–373. [Google Scholar] [CrossRef]
- Donahue, J.; Anne Hendricks, L.; Guadarrama, S.; Rohrbach, M.; Venugopalan, S.; Saenko, K.; Darrell, T. Long-term recurrent convolutional networks for visual recognition and description. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015; pp. 2625–2634. [Google Scholar]
- Dastagiri, S.; Sireesh, K.; Sharma, R.P. xDFPAD: Explainable Tabular Deep Learning for Fingerprint Presentation Attack Detection. In Proceedings of the International Conference on Computer Vision and Image Processing; Springer: Berlin/Heidelberg, Germany, 2023; pp. 252–262. [Google Scholar]
- Selvaraju, R.R.; Cogswell, M.; Das, A.; Vedantam, R.; Parikh, D.; Batra, D. Grad-cam: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, 22–29 October 2017; pp. 618–626. [Google Scholar]
- Fei, H.; Huang, C.; Wu, S.; Wang, Z.; Jia, Z.; Feng, J. Fingerprint Presentation Attack Detection by Region Decomposition. IEEE Trans. Inf. Forensics Secur. 2024, 19, 3974–3985. [Google Scholar] [CrossRef]
- ISO/IEC 30107-3; Information Technology—Biometric presentation Attack Detection—Part 3: Testing and Reporting. International Organization for Standardization: Geneva, Switzerland, 2017.
- Standard ISO/IEC 30107-1:2016; Information Technology—Biometric Presentation Attack Detection—Part 1: Framework. International Organization for Standardization: Geneva, Switzerland, 2016.
- Zeiler, M.D.; Fergus, R. Visualizing and understanding convolutional networks. In Proceedings of the European Conference on Computer Vision; Springer: Berlin/Heidelberg, Germany, 2014; pp. 818–833. [Google Scholar]
- Ancona, M.; Ceolini, E.; Öztireli, C.; Gross, M. Towards better understanding of gradient-based attribution methods for deep neural networks. arXiv 2017, arXiv:1711.06104. [Google Scholar]
- Casula, R.; Orrù, G.; Angioni, D.; Feng, X.; Marcialis, G.L.; Roli, F. Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? In Proceedings of the 2020 25th International Conference on Pattern Recognition (ICPR); IEEE: Piscataway, NJ, USA, 2021; pp. 3412–3418. [Google Scholar]
- Marrone, S.; Casula, R.; Orrù, G.; Marcialis, G.L.; Sansone, C. Fingerprint adversarial presentation attack in the physical domain. In Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges: Virtual Event, 10–15 January 2021; Proceedings, Part VI; Springer: Berlin/Heidelberg, Germany, 2021; pp. 530–543. [Google Scholar]










| Datasource | ScienceDirect | Scopus | arXiv | IEEE Xplore | Total |
|---|---|---|---|---|---|
| # articles | 11 | 9 | 9 | 38 | 67 |
| Paper Title/Reference | Year | Deep Learning Included | Modality and Hardware |
|---|---|---|---|
| Survey on fingerprint liveness detection [3] | 2013 | No | Contact-based |
| Presentation attack detection methods for fingerprint recognition systems: a survey [4] | 2014 | No | Contact-based |
| A Survey on Antispoofing Schemes for Fingerprint Recognition Systems [5] | 2014 | No | Contact-based |
| Survey on Fingerprint Spoofing, Detection Techniques and Databases [6] | 2015 | No | Contact-based |
| Security and Accuracy of Fingerprint-Based Biometrics: A Review [7] | 2019 | Few | Contact-based |
| A Survey on Unknown Presentation Attack Detection for Fingerprint [8] | 2021 | Few | Contact-based, SWIR, LSCI |
| Robust anti-spoofing techniques for fingerprint liveness detection: A Survey [9] | 2021 | Few | Contact-based |
| FinPAD: State-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives [10] | 2021 | Yes, <30 | Contact-based, SWIR |
| Fingerprint Liveness Detection Schemes: A Review on Presentation Attack [11] | 2022 | Yes, <30 | Contact-based, SWIR, LSCI, smartphone |
| Deep Learning for Fingerprint Presentation Attack Detection: A Survey (Ours) | 2026 | Comprehensive (>60) | Contact-based, SWIR, LSCI, FTIR, OCT, smartphone |
| Digital PAI | Artificial Fabrication PAI |
|---|---|
| Generate high-quality attack instrument | Generate near high-quality attack instrument |
| High attack potential | Moderate attack potential |
| Able to attack multiple identities in a single attack | Mostly designed to attack a single identity |
| Requires more technical knowledge | No need for more technical knowledge |
| High computation cost | Low computation cost |
| Low-cost generation | High-cost generation |
| Very challenging to detect | Easy to detect, particularly with the multi-spectral sensors |
| Dataset | No. of Subjects | Bona Fide Samples | Attack Samples | PAI Type |
|---|---|---|---|---|
| Tsinghua [28] | 15 | 300 | 470 | S |
| BSL [29] | 45 | 900 | 400 | S, GE, L, WG |
| LivDet 2009 [33] | 254 | 5500 | 5500 | GE, S and PD |
| LivDet 2011 [34] | 200 | 3000 | 3000 | GE, E, WG, PD, S and L |
| LivDet 2013 [35] | 225 | 8000 | 8000 | GE, WG, L, E and M |
| LivDet 2015 [36] | 100 | 4500 | 5948 | BD, E, P, GE, L, WG and LE |
| LivDet 2017 [37] | 150 | 8099 | 9685 | GE, WG, L, E, BD and LE |
| LivDet 2019 [38] | NA | 6029 | 6936 | GE, WG, L, E, BD and LE |
| LivDet 2021 [39] | 66 | 10,700 | 11,740 | GLS20, BD, G, and RFast30 |
| LivDet 2023 [40] | 25 | 5000 | 3000 | NA |
| ATVS-FFp [41] | 17 | 816 | 816 | S, PD |
| PBSKD [30] | NA | 1000 | 900 | E, GE, L, Crayola, WG, 2D print |
| ZJUT-EIFD [42] | 60 | 3,551,800 | 73,500 | NA |
| IIITD [31] | 128 | 4096 | 8192 | P and R |
| NTNU [43] | 200 | 500 | 588 | P and R |
| MSU-FPAD [30] | NA | 9000 | 10,500 | E and P |
| COLFISPOOF [32] | NA | NA | 7200 | P and R |
| CLARKSON [44] | 26 | 5886 | 4247 | E, P, PD and WG |
| Paradigm | Capture Type | Typical Backbone/Cue | Strengths | Key Risks | Deployment Notes |
|---|---|---|---|---|---|
| End-to-end supervised CNN | Contact/ contactless | Texture- and ridge-detail CNNs (e.g., ResNet variants) | High in-domain accuracy; simple training | Overfitting to sensor/material; leakage risk | Works well for fixed sensors; needs continuous monitoring |
| Transfer learning | Contact/ smartphone | Pre-trained CNNs + fine-tuning | Data efficiency; faster convergence | Negative transfer under domain shift | Prefer light backbones for on-device inference |
| Domain generalization/adaptation | Contactless/ cross-sensor | Feature alignment, style/augmentation, meta-learning | Improved cross-domain robustness | Sensitive to protocol; may reduce in-domain accuracy | Best when target sensor unknown or evolving |
| One-class/ anomaly detection | All (esp. unseen PAI) | Autoencoders, SVDD-style, density models | Better for unseen attacks; security-oriented | Higher bona fide rejection if poorly calibrated | Requires careful thresholding and open-set evaluation |
| Hybrid (multi-cue/multi-branch) | All | Fusion of texture, frequency, quality, or temporal cues | Robustness via complementary cues | Complexity; harder to interpret | Useful when latency budget allows and attacks are diverse |
| Author | Year | Backbone | Loss Function | Main Contribution |
|---|---|---|---|---|
| Nogueira et al. [96] | 2016 | AlexNet, VGG | Binary CE loss | Fine-tuning pre-trained CNNs |
| Toosi et al. [97] | 2017 | AlexNet | Binary CE loss | Patch-based voting |
| Toosi et al. [98] | 2017 | AlexNet, VGG19 | Binary CE loss | Transfer learning on CNN |
| Ametefe et al. [99] | 2021 | DenseNet | Binary CE loss | Transfer learning on DenseNet |
| Rajaram et al. [100] | 2024 | MobileNet V2 | Binary CE loss | Transfer learning on MobileNet V2 |
| Author | Year | Backbone | Loss Function | Type of Image |
|---|---|---|---|---|
| Hussein et al. [110] | 2016 | CNN | Binary CE loss | SWIR and LSCI images |
| Mirzaalian et al. [111] | 2019 | CNN | Binary CE loss | LSCI images |
| Kolberg et al. [112] | 2020 | LSTM network and CNN | Binary CE loss | LSCI images |
| Spinoulas et al. [113] | 2021 | CNN | Binary CE loss | Near-infrared (NIR), SWIR, LSCI images |
| Sun et al. [114] | 2023 | DenseNet | Dice loss and Binary CE loss | OCT images |
| Zhang et al. [115] | 2024 | CNN | Binary CE loss | OCT images |
| Author | Year | Backbone | Loss Function | Main Contribution |
|---|---|---|---|---|
| Engelsma and Jain [117] | 2019 | GAN | Adversarial loss | Trained three GANs on different images |
| Rohrer and Kolberg [118] | 2021 | Wasserstein GAN and AutoEncoder | Reconstruction loss | Pre-trained WGAN |
| Kolberg et al. [120] | 2021 | AutoEncoder | Reconstruction loss | Trained three AutoEncoders |
| Liu et al. [121] | 2021 | AutoEncoder | Reconstruction loss | AutoEncoder based on OCT images |
| Liu et al. [122] | 2023 | AutoEncoder | Reconstruction loss | Denoising autoencoder |
| Author | Year | Backbone | XAI Tools |
|---|---|---|---|
| Liu et al. [107] | 2023 | Self-designed module | Grad-CAM |
| Dastagiri et al. [147] | 2023 | Attention-based module | Feature-level interpretation |
| Yuan et al. [90] | 2024 | Siamese attention Res-CNN | Grad-CAM |
| Fei et al. [149] | 2024 | Self-designed module | Grad-CAM |
| Method (Year) | Dataset | Metric | Value | Cost |
|---|---|---|---|---|
| Wang et al. [67], 2015 (DCNN + patch voting) | LivDet 2011/2013 | — | — | High |
| Menotti et al. [69], 2015 (SpoofNet) | LivDet 2011/2013/2015 | — | — | High |
| Kim et al. [70], 2016 (DBN) | LivDet 2011/2013 | — | — | Medium |
| Park et al. [68], 2016 (random-patch CNN) | LivDet 2011 | ACE | 3.42% | Medium |
| Lazimul & Binoy [78], 2017 (enhance+CNN) | Private | — | — | Medium |
| Jang et al. [79], 2017 (contrast+CNN) | Private | — | — | Medium |
| Chugh et al. [71], 2017 (Inception-v3, minutiae patches) | LivDet 2011/2013/2015 | — | — | High |
| Chugh et al. [30], 2018: Spoof Buster (MobileNet-v1) | LivDet 2015 | Acc | 99.03% | Low |
| Pala [80], 2017 (triplet embedding) | Private | — | — | Medium |
| Jung & Heo [81], 2018 (liveness-map CNN) | Private | Acc | Medium | |
| Nguyen et al. [74], 2018: fPADnet (SqueezeNet+Gram) | LivDet 2011/2013/2015 | ACE | 2.61% | Low |
| Park et al. [77], 2018/2019 (Gram/Tiny-FCN) | LivDet 2011/2013/2015 | ACE | 1.43% | Low |
| Yuan et al. [82], 2019 (ISE layer CNN) | LivDet 2011/2013 | ACE | 6.45%/3.70% | Medium |
| Zhang et al. [83], 2019: Slim-ResCNN | LivDet 2017 | Acc | 95.25% | Medium |
| Zhang et al. [84], 2020: FLDNet | LivDet 2015 | ACE | 1.76% | Medium |
| Jian et al. [85], 2020 (GA-DenseNet) | Private | — | — | High |
| Liu et al. [86], 2021: Channel-wise Feature Denoising | LivDet 2017 | ACE | 2.53% | Medium |
| Rai et al. [87], 2023: MoSFPAD (MobileNet+SVC) | LivDet 2011-2019 | Acc | 97.13% | Low |
| Grosz et al. [88], 2023: ViT Unified | LivDet 2013/2015 | Acc | 98.87% | High |
| Nogueira et al. [96], 2016 (AlexNet/VGG fine-tuning) | LivDet 2015 | Acc | 95.5% | High |
| Toosi et al. [97], 2017 (AlexNet; patch-based voting) | LivDet 2011/2013 | ACE | 4.6% | High |
| Toosi et al. [98], 2017 (AlexNet, VGG19; transfer learning) | LivDet 2011/2013 | ACE | 3.3% | High |
| Ametefe et al. [99], 2021 (DenseNet201 transfer learning) | LivDet 2009–2015 | Acc | 99.8% | High |
| Rajaram et al. [100], 2024 (CLNet/MobileNetV2 TL) | LivDet 2015 | Acc | 98.32% | Low |
| Pereira et al. [101], 2020 (species-invariant adv. learning) | LivDet 2015 | APCER | 0.76% | Medium |
| Chugh & Jain [102], 2020: UMG (style transfer) | LivDet 2017 | ACE | 95.88% | High |
| Sandouka et al. [103], 2021: Unified GAN + EfficientNetV2 | Private | — | — | High |
| Sandouka et al. [104], 2021: Transformer + CycleGAN | LivDet 2015 | Acc | 83.12% | High |
| Lee et al. [106], 2022: CNN + CycleGAN (style transfer) | Private | — | — | High |
| Liu et al. [107], 2022: CFD (MobileNetV2 + PA-Adaptation) | LivDet 2017 | ACE | 2.53% | Low |
| Anshul et al. [108], 2023: Auxiliary Classifier GAN | Private | — | — | High |
| Rai et al. [109], 2024: Open Patch Generator (GAN) | LivDet 2015/2017/2019 | Acc | 94.69% | High |
| Method (Year) | Dataset/Protocol | Metric | Value | Cost |
|---|---|---|---|---|
| Zhang et al. [124], 2016 (Improved CNN) | Private | — | — | Medium |
| Fujio et al. [125], 2018 (AlexNet) | IIITD fingerphoto | APCER | 0.04% | High |
| Marasco & Vurity [126], 2021 (AlexNet/ResNet18) | Private | — | — | High |
| Marasco et al. [127], 2022 (Deep color spaces; score fusion) | IIITD fingerphoto | D-EER | 2.12% | Medium |
| Purnapatra et al. [44], 2023 (DenseNet/NasNet; CLARKSON) | CLARKSON, NTNU, Private | D-EER | 27.36%, 34.21%, 38.89% | High |
| Li & Raghavendra [129], 2023 (8 CNNs; deep features) | CLARKSON | D-EER | 8.26% | High |
| Adami et al. [131], 2023 (ResNet18) | CLARKSON, CoLFiSPOOF | APCER | 0.63% | Medium |
| Priesnitz et al. [138], 2023 (CoLFiPAD benchmark) | CoLFiSPOOF | D-EER | 4.14% | Medium |
| Li & Raghavendra [130], 2024 (background influence) | CLARKSON | D-EER | 8.26% | High |
| Priesnitz et al. [133], 2024 (SpoofBuster) | CLARKSON, NTNU, Private | D-EER | 21.71%, 24.50%, 31.54% | Low |
| Liu et al. [134], 2024 (Wavelet AE; unsupervised) | CLARKSON, NTNU, Private | D-EER | 22.45%, 25.67%, 33.78% | Medium |
| Adami et al. [135], 2024 (AE; unsupervised) | CLARKSON, NTNU, Private | D-EER | 20.75%, 23.36%, 32.16% | Medium |
| Li et al. [136], 2024 (Diffusion; unsupervised) | CLARKSON, NTNU, Private | D-EER | 18.80%, 22.41%, 29.28% | High |
| Vurity et al. [139], 2025 (MobileNet; multi color spaces) | Private | — | — | Low |
| Adami & Karimian [140], 2025 (Swin-UNet; domain adaptation) | CLARKSON, CoLFiSPOOF, IIITD | APCER | 1.3%, 0.08%, 0.21% | High |
| Li et al. [137], 2025 (LLM) | Private | — | — | High |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Li, H.; Ramachandra, R. A Survey on Deep Learning Techniques for Fingerprint Presentation Attack Detection. Sensors 2026, 26, 1283. https://doi.org/10.3390/s26041283
Li H, Ramachandra R. A Survey on Deep Learning Techniques for Fingerprint Presentation Attack Detection. Sensors. 2026; 26(4):1283. https://doi.org/10.3390/s26041283
Chicago/Turabian StyleLi, Hailin, and Raghavendra Ramachandra. 2026. "A Survey on Deep Learning Techniques for Fingerprint Presentation Attack Detection" Sensors 26, no. 4: 1283. https://doi.org/10.3390/s26041283
APA StyleLi, H., & Ramachandra, R. (2026). A Survey on Deep Learning Techniques for Fingerprint Presentation Attack Detection. Sensors, 26(4), 1283. https://doi.org/10.3390/s26041283

