A Unified Model for Fingerprint Authentication and Presentation Attack Detection

Typical fingerprint recognition systems are comprised of a spoof detection module and a subsequent recognition module, running one after the other. In this paper, we reformulate the workings of a typical fingerprint recognition system. In particular, we posit that both spoof detection and fingerprint recognition are correlated tasks. Therefore, rather than performing the two tasks separately, we propose a joint model for spoof detection and matching1 to simultaneously perform both tasks without compromising the accuracy of either task. We demonstrate the capability of our joint model to obtain an authentication accuracy (1:1 matching) of TAR = 100% @ FAR = 0.1% on the FVC 2006 DB2A dataset while achieving a spoof detection ACE of 1.44% on the LiveDet 2015 dataset, both maintaining the performance of stand-alone methods. In practice, this reduces the time and memory requirements of the fingerprint recognition system by 50% and 40%, respectively; a significant advantage for recognition systems running on resource-constrained devices and communication channels.

[1]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[2]  Sergey Ioffe,et al.  Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[3]  Anil K. Jain,et al.  FVC2004: Third Fingerprint Verification Competition , 2004, ICBA.

[4]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .

[5]  Davide Maltoni,et al.  Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Gian Luca Marcialis,et al.  LivDet 2017 Fingerprint Liveness Detection Competition 2017 , 2018, 2018 International Conference on Biometrics (ICB).

[7]  Davide Maltoni,et al.  Fingerprint verification competition 2006 , 2007 .

[8]  Anil K. Jain,et al.  Fingerprint Presentation Attack Detection: Generalization and Efficiency , 2018, 2019 International Conference on Biometrics (ICB).

[9]  Gian Luca Marcialis,et al.  Analysis of Fingerprint Pores for Vitality Detection , 2010, 2010 20th International Conference on Pattern Recognition.

[10]  Yasushi Makihara,et al.  Object recognition supported by user interaction for service robots , 2002, Object recognition supported by user interaction for service robots.

[11]  Anil K. Jain,et al.  Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Mark Sandler,et al.  MobileNetV2: Inverted Residuals and Linear Bottlenecks , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[13]  Anil K. Jain,et al.  End-to-End Latent Fingerprint Search , 2018, IEEE Transactions on Information Forensics and Security.

[14]  Gian Luca Marcialis,et al.  LivDet 2015 fingerprint liveness detection competition 2015 , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[15]  Victor S. Lempitsky,et al.  Unsupervised Domain Adaptation by Backpropagation , 2014, ICML.

[16]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  Xin Li,et al.  LiveFace: A Multi-task CNN for Fast Face-Authentication , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).

[18]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[19]  Yi Chen,et al.  Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features , 2007 .

[20]  Bo Chen,et al.  MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications , 2017, ArXiv.

[21]  Rohit Gajawada,et al.  Universal Material Translator: Towards Spoof Fingerprint Generalization , 2019, 2019 International Conference on Biometrics (ICB).

[22]  Anil K. Jain,et al.  Fingerprint Spoof Buster: Use of Minutiae-Centered Patches , 2018, IEEE Transactions on Information Forensics and Security.