scholarly journals Fingerprint Presentation Attack Detection Using Deep Transfer Learning and DenseNet201 Network

Author(s):  
Divine S. Ametefe ◽  
Suzi Seroja Sarnin ◽  
Darmawaty M. Ali
2021 ◽  
Vol 17 (1) ◽  
pp. 53-67
Author(s):  
Rajneesh Rani ◽  
Harpreet Singh

In this busy world, biometric authentication methods are serving as fast authentication means. But with growing dependencies on these systems, attackers have tried to exploit these systems through various attacks; thus, there is a strong need to protect authentication systems. Many software and hardware methods have been proposed in the past to make existing authentication systems more robust. Liveness detection/presentation attack detection is one such method that provides protection against malicious agents by detecting fake samples of biometric traits. This paper has worked on fingerprint liveness detection/presentation attack detection using transfer learning for which the authors have used a pre-trained NASNetMobile model. The experiments are performed on publicly available liveness datasets LivDet 2011 and LivDet 2013 and have obtained good results as compared to state of art techniques in terms of ACE(average classification error).


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1394
Author(s):  
Asad Ali ◽  
Sanaul Hoque ◽  
Farzin Deravi

Presentation attack artefacts can be used to subvert the operation of biometric systems by being presented to the sensors of such systems. In this work, we propose the use of visual stimuli with randomised trajectories to stimulate eye movements for the detection of such spoofing attacks. The presentation of a moving visual challenge is used to ensure that some pupillary motion is stimulated and then captured with a camera. Various types of challenge trajectories are explored on different planar geometries representing prospective devices where the challenge could be presented to users. To evaluate the system, photo, 2D mask and 3D mask attack artefacts were used and pupillary movement data were captured from 80 volunteers performing genuine and spoofing attempts. The results support the potential of the proposed features for the detection of biometric presentation attacks.


Sign in / Sign up

Export Citation Format

Share Document