Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics

Recent studies have shown that it is possible to attack a finger vein (FV) based biometric system using printed materials. In this study, we propose a novel method to detect spoofing of static finger vein images using Windowed Dynamic mode decomposition (W-DMD). This is an atemporal variant of the recently proposed Dynamic Mode Decomposition for image sequences. The proposed method achieves better results when compared to established methods such as local binary patterns (LBP), discrete wavelet transforms (DWT), histogram of gradients (HoG), and filter methods such as range-filters, standard deviation filters (STD) and entropy filters, when using SVM with a minimum intersection kernel. The overall pipeline which consists ofW-DMD and SVM, proves to be efficient, and convenient to use, given the absence of additional parameter tuning requirements. The effectiveness of our methodology is demonstrated using FV-Spoofing-Attack database which is publicly available. Our test results show that W-DMD can successfully detect printed finger vein images because they contain micro-level artefacts that not only differ in quality but also in light reflection properties compared to valid/live finger vein images.

[1]  Ramachandra Raghavendra,et al.  Robust palmprint verification using sparse representation of binarized statistical features: a comprehensive study , 2014, IH&MMSec '14.

[2]  Matti Pietikäinen,et al.  IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2009, TPAMI-2008-09-0620 1 WLD: A Robust Local Image Descriptor , 2022 .

[3]  Stephanie Schuckers,et al.  Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..

[4]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .

[5]  Michael Felsberg,et al.  The Monogenic Scale-Space: A Unifying Approach to Phase-Based Image Processing in Scale-Space , 2004, Journal of Mathematical Imaging and Vision.

[6]  Subhransu Maji,et al.  Classification using intersection kernel support vector machines is efficient , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[7]  A. Atiya,et al.  Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.

[8]  I. Daubechies Ten Lectures on Wavelets , 1992 .

[9]  Gian Luca Marcialis,et al.  First International Fingerprint Liveness Detection Competition - LivDet 2009 , 2009, ICIAP.

[10]  Esa Rahtu,et al.  Rotation invariant local phase quantization for blur insensitive texture analysis , 2008, 2008 19th International Conference on Pattern Recognition.

[11]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[12]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[13]  Luisa Verdoliva,et al.  The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks , 2015, 2015 International Conference on Biometrics (ICB).

[14]  P. Schmid,et al.  Applications of the dynamic mode decomposition , 2011 .

[15]  Santosh Tirunagari,et al.  Analysis of Proper Orthogonal Decomposition and Dynamic Mode Decomposition on LES of Subsonic Jets , 2012 .

[16]  Zhongde Wang Fast algorithms for the discrete W transform and for the discrete Fourier transform , 1984 .

[17]  David Windridge,et al.  Detection of Face Spoofing Using Visual Dynamics , 2015, IEEE Transactions on Information Forensics and Security.

[18]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[19]  J. Kittler,et al.  A methodology for separating sheep from goats for controlled enrollment and multimodal fusion , 2008, 2008 Biometrics Symposium.

[20]  Oscar Déniz-Suárez,et al.  Face recognition using Histograms of Oriented Gradients , 2011, Pattern Recognit. Lett..

[21]  Martin D. Levine,et al.  Face Recognition Using the Discrete Cosine Transform , 2001, International Journal of Computer Vision.

[22]  P. Schmid,et al.  Dynamic mode decomposition of numerical and experimental data , 2008, Journal of Fluid Mechanics.

[23]  Sébastien Marcel,et al.  On the vulnerability of finger vein recognition to spoofing , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[24]  Samy Bengio,et al.  How do correlation and variance of base-experts affect fusion in biometric authentication tasks? , 2005, IEEE Transactions on Signal Processing.

[25]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[26]  Aapo Hyvärinen,et al.  Natural Image Statistics - A Probabilistic Approach to Early Computational Vision , 2009, Computational Imaging and Vision.

[27]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[28]  Peter J. Schmid,et al.  Dynamic Mode Decomposition and Proper Orthogonal Decomposition of flow in a lid-driven cylindrical cavity , 2009 .

[29]  Esa Rahtu,et al.  BSIF: Binarized statistical image features , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).