A Look At Non-Cooperative Presentation Attacks in Fingerprint Systems

Emanuela Marasco, S. Cando, Larry L Tang, Luca Ghiani, G. Marcialis
{"title":"A Look At Non-Cooperative Presentation Attacks in Fingerprint Systems","authors":"Emanuela Marasco, S. Cando, Larry L Tang, Luca Ghiani, G. Marcialis","doi":"10.1109/IPTA.2018.8608133","DOIUrl":null,"url":null,"abstract":"Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PAs) realized with non-cooperative methods; even though, in realistic scenarios, it is unlikely that individuals would agree to duplicate their fingerprints. For example, replicas can be created from finger marks left on a surface without the person’s knowledge. Existing anti-spoofing mechanisms are trained to detect presentation attacks realized with cooperation of the user and are assumed to be able to identify non-cooperative spoofs as well. In this regard, latent prints are perceived to be of low quality and less likely to succeed in gaining unauthorized access. Thus, they are expected to be blocked without the need of a particular presentation attack detection system. Currently, the lowest Presentation Attack Detection (PAD) error rates on spoofs from latent prints are achieved using frameworks involving Convolutional Neural Networks (CNNs) trained on cooperative PAs; however, the computational requirement of these networks does not make them easily portable for mobile applications. Therefore, the focus of this paper is to investigate the degree of success of spoofs made from latent fingerprints to improve the understanding of their vitality features. Furthermore, we experimentally show the performance drop of existing liveness detectors when dealing with non-cooperative attacks and analyze the quality estimates pertaining to such spoofs, which are commonly believed to be of lower quality compared to the molds fabricated with user’s consensus.","PeriodicalId":272294,"journal":{"name":"2018 Eighth International Conference on Image Processing Theory, Tools and Applications (IPTA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Eighth International Conference on Image Processing Theory, Tools and Applications (IPTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IPTA.2018.8608133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Scientific literature lacks of countermeasures specifically for fingerprint presentation attacks (PAs) realized with non-cooperative methods; even though, in realistic scenarios, it is unlikely that individuals would agree to duplicate their fingerprints. For example, replicas can be created from finger marks left on a surface without the person’s knowledge. Existing anti-spoofing mechanisms are trained to detect presentation attacks realized with cooperation of the user and are assumed to be able to identify non-cooperative spoofs as well. In this regard, latent prints are perceived to be of low quality and less likely to succeed in gaining unauthorized access. Thus, they are expected to be blocked without the need of a particular presentation attack detection system. Currently, the lowest Presentation Attack Detection (PAD) error rates on spoofs from latent prints are achieved using frameworks involving Convolutional Neural Networks (CNNs) trained on cooperative PAs; however, the computational requirement of these networks does not make them easily portable for mobile applications. Therefore, the focus of this paper is to investigate the degree of success of spoofs made from latent fingerprints to improve the understanding of their vitality features. Furthermore, we experimentally show the performance drop of existing liveness detectors when dealing with non-cooperative attacks and analyze the quality estimates pertaining to such spoofs, which are commonly believed to be of lower quality compared to the molds fabricated with user’s consensus.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
指纹系统中的非合作表示攻击研究
科学文献缺乏针对非合作方式实现的指纹呈现攻击的对策;尽管在现实情况下,个人不太可能同意复制自己的指纹。例如,可以在人不知情的情况下,通过在物体表面留下的手印创造出复制品。对现有的反欺骗机制进行训练,以检测与用户合作实现的表示攻击,并假设能够识别非合作的欺骗。在这方面,潜在的指纹被认为是低质量的,不太可能成功地获得未经授权的访问。因此,不需要特定的表示攻击检测系统就可以阻止它们。目前,使用基于协作PAs训练的卷积神经网络(cnn)框架来实现来自潜在打印的欺骗的最低呈现攻击检测(PAD)错误率;然而,这些网络的计算需求使它们不容易移植到移动应用程序中。因此,本文的重点是研究利用潜在指纹进行欺骗的成功程度,以提高对其生命力特征的认识。此外,我们通过实验证明了现有活动性检测器在处理非合作攻击时的性能下降,并分析了与此类欺骗有关的质量估计,这些欺骗通常被认为与用户共识制作的模具相比质量较低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Driver Drowsiness Detection in Facial Images InNet: Learning to Detect Shadows with Injection Network Image Classification Method in DR Image Based on Transfer Learning Video Tracking of Insect Flight Path: Towards Behavioral Assessment Image Registration Algorithm Based on Super pixel Segmentation and SURF Feature Points
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1