You are on page 1of 10

Engineering Science and Technology, an International Journal 23 (2020) 264–273

Contents lists available at ScienceDirect

Engineering Science and Technology,


an International Journal
journal homepage: www.elsevier.com/locate/jestch

Full Length Article

Anti-spoofing method for fingerprint recognition using patch based deep


learning machine
Diaa M. Uliyan a,⇑, Somayeh Sadeghi b, Hamid A. Jalab b
a
Middle East University, Faculty of Information Technology, Amman 11831, Jordan
b
University of Malaya, Faculty of Computer Science and Information Technology, Kuala Lumpur 50603, Malaysia

a r t i c l e i n f o a b s t r a c t

Article history: Today’s with increasing identity theft, biometric systems based on fingerprints have a growing impor-
Received 7 January 2019 tance in protection and access restrictions. Malicious users violate them by presenting fabricated
Revised 30 April 2019 attempts. For example, artificial fingerprints constructed by gelatin, Play-Doh and Silicone molds may
Accepted 16 June 2019
be misused for access and identity fraud by forgers to clone fingerprints. This process is called spoofing.
Available online 4 July 2019
To detect such forgeries, some existing methods using handcrafted descriptors have been implemented
for assuring user presence. Most of them give low accuracy rates in recognition. The proposed method
Keywords:
used Discriminative Restricted Boltzmann Machines to recognize fingerprints accurately against fabri-
Biometric systems
Deep learning
cated materials used for spoofing.
Discriminative Restricted Boltzmann Ó 2019 Karabuk University. Publishing services by Elsevier B.V. This is an open access article under the CC
Machines BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Fingerprint authentication

1. Introduction detection techniques have been developed [8–10]. Thus, misrepre-


sentation of fingerprints and detection of forged fingerprints is still
Today, one of major challenges confronting biometric systems is an open issue [11].
the rapid threat of malicious actions. The most of malicious actors There are many countermeasure methods have been proposed
use a common type of presentation attack, known as ‘‘spoofing” to [12] that employed multiple factors in securing the information.
defeat biometric systems [1]. The main goal of presentation attack Spoof forgeries [13,14] can be defined as the techniques used to
is impersonating target victims that have the desired authoriza- deceive biometric based systems by giving a forged identity of
tion. It happens when intermediate spoofing forgers intentionally the user to have authentication. The authentication system mainly
guess that identity of unsuspecting individuals via steal victim’s considers individuals of users based on behavioral and biological
fingerprints, tampering them with a certain legal material to features such as face recognition, iris features, voice signals, finger-
defraud fingerprint recognition based systems [2]. print and palm veins [15]. In case of fingerprint spoofing forgeries,
Failure to prevent fingerprint spoofing forgeries on devices [3] the intermediate spoof forger uses finger molds to deceive the bio-
may compromise confidential information in many applications metric authentication system. For instance, palm images have been
such as video surveillance [4], biometric identification [5] and face printed and easily defeat the biometric system [16].
indexing in social media [6]. This issue motivates researchers to Thus, fingerprint spoofing detection methods are classified into
employ countermeasure techniques and combined them into the two classes depending on whether additional sensors are used or
biometric based systems to beat such forgery. Fig. 1 shows some not:
examples of fingerprints which gained from real and fake fingers.
Visually by the eyes, it cannot distinguish between real and fake 1) Hardware-based (exploring extra finger readers) [17]: the
ones. state of art fingerprint readers can scan the input finger-
The first row in Fig. 1 shows the real fingerprints. The second prints with high resolutions which are suitable for matching.
row shows fake ones were acquired from artificial fingers which The fingerprint reader executes misrepresentation detection
made by different fabricate materials. Many spoof fingerprint on two types of finger images: non processed and raw fin-
gerprint images [15]. While these raw images contain a clear
information that provides discriminate information for spoof
⇑ Corresponding author.
detection, these raw images have to be processed such as
E-mail address: duliyan@meu.edu.jo (D.M. Uliyan).
color conversion, normalization or filtering to extract
Peer review under responsibility of Karabuk University.

https://doi.org/10.1016/j.jestch.2019.06.005
2215-0986/Ó 2019 Karabuk University. Publishing services by Elsevier B.V.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273 265

to enhance these traces. This process can be done by captur-


ing fingerprint traces and save it into image. The fingerprint
image is enhanced and then, molds are created materials like
silicone, gelatine, or PlayDoh over the printed image [28].
For instance, researchers at Michigan State University help
police in July 2016 to unlocked a fingerprint secure smart
phone with homicide case1 based on a 2D printed fingerprint
spoof method proposed by [29].

Various materials can reveal such features: gradients, ridge and


intensity in forged fingerprints. Therefore, the task of the existing
anti spoof fingerprint recognition systems extensively depends
Fig. 1. Fingerprint samples using Cross Match 2013 reader [7]. on the type of fabricated materials used to create fake fingerprints
via training step [30]. For instance [31], mentioned that single low
level feature-based methods struggles to carry out various spoof-
features for matching. The main objective of hardware based ing fingerprint materials. Features in fingerprint images are the
methods is to reveal the features of liveness, such as blood core of discriminating forged fingerprints for different kinds of fake
flow [18], skin distortion [19], odor [13]. As pointed in fingerprints. Multiple features become a practical way to charac-
[20], more details about Liveness Detection methods were terize the properties of forged fingerprints and the real ones when
tested in the LivDet datasets. the sole of the authentication system does not know what the
2) Software-based methods rely on the image information types of materials used for forgery. For instance [10], have com-
scanned by intent sensor without requiring more hardware bined multiple features: 1-gradient features from the input image
cost, to classify images into: live and spoof fingers [10]. where local interest points detected by SURF method. 2-pyramid
multiscale features of the Histograms of Oriented Gradient. 3- Tex-
Among these methods, the software based methods has a virtue ture Gabor features. After combining the three features, the
it can be adapted in a common fingerprint scanners to recognize dynamic score level fusion approach is employed to decide if the
and examine the fingerprint if it is forged by using the fake mate- fingerprint is fake or real. Their method is tested on LivDet 2011
rials in fingerprint image. In the paper, the software based method dataset with an Average Equal Error Rate of 3.95% and also it
is considered in research to detect fingerprints under spoof mate- decreased the Average Classification Error rate to 2.27%.
rials. Software methods can be categorized into two main classes Rattani and Ross [32] proposed a fingerprint spoof detector
[21]: feature based [22] and deep learning based. The feature based using combined multiple features: Grey Level Co-occurrence
recognition method is mainly extracts discriminate fingerprint Matrix (GLCM) with Histogram of Oriented Gradients (HOG) for
liveness with a single feature point in early stage, and it has not exposing liveness fingerprints.
been shown good performance for various fake materials. It can Xia et al. [33] developed a fingerprint recognition method based
be noticed, that deep learning methods are used to learn fake fin- on intensity variance features and local binary gradient orienta-
gerprints for the various types of spoof materials [23]. tion. These features are combined in a feature vector using co-
occurrence probability method which is finally, classified by sup-
2. Related works port vector machine (SVM) classifiers.
In fingerprint spoofing recognition systems, two common ways
With the rapid use of authentication systems using fingerprint have been identified for detecting the spoof fingerprint: 1) the
recognition for many applications in recent years, the task of active liveness features of fingerprint detectors, for instance, by
observing fake fingerprint becomes a vital due to fingerprint can examining pulse, perspiration patterns and blood pressure [34];
be easily forged by using different types of instruments, for 2) Passive pattern analyzer for fabricating materials [35] for
instance, wood glue, gelatin, silicone or printed fingerprints [1]. instance, the lack of details of spoofed fingerprints according to
The texture of a real finger may have lasting residual effects on sur- the real ones, fingerprint pattern differences. The last type of
face and then, is transferred into the material to counterfeit any spoofing problem is the scope of our proposed method discovers
biometric authentication system. Due to the identical texture a threat of using material and sensor.
between real and fake fingerprint, this issue will easily can deceive Several studies spoofing methods in fingerprint recognition
the authentication fingerprints based systems. Various fingerprint have been introduced in [5]. Among the most general methods
spoofing materials have been explored in [24]. The real scenario is for static extracted features: texture based anti-spoofing tech-
that the forger tries to bypass a fingerprint recognition sensor by niques involves statistical feature analysis [36], Ridge based fea-
replicating a certain fingerprint image. The cloned fingerprint has tures [37], curvelet transform [38], Power Spectrum Fourier
an artifact which is employed to do presentation attack. based features [39], Local Phase Quantization patterns [36] and
The main challenge in research is how to discriminate genuine Local Binary Patterns [40].
living fingerprints from fake ones [25] which is inspired by The ISO However, recent methods focused on combining multiple fea-
standard IEC 30107-3 (E). It gives a foundation for presentation tures and probably even multiple liveness detectors. For instance
attack detection by establishing a common framework that specify [41], suggest a fusion of liveness detector with a single modality
presentation attack events and detect them [26]. Two well known for anti-spoofing capabilities. Galbally et al. [42] employed multi-
methods are used fabricate and replicate a fingerprint: ple features of spoof fingerprints such as, orientation certainty
level and local clarity score to discover its liveness.
1) Cooperative methods: the finger of user must be placed into Recently, some existing methods inspired by its deep learning
certain elastic material [27]. These materials help to create a feature extraction, such as a Convolution Neural Network (CNN)
mold of a fingerprint using for example, silicone, gelatine, or
PlayDoh.
2) Non-cooperative method: it is made when the user acci- 1
https://statenews.com/article/2016/08/how-msu-researchers-unlocked-a
dently, left a trace of fingerprint on a surface and it required fingerprint-secure-smartphone-to-help-police-with-homicide-case
266 D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273

which can be trained to distinguish a live finger from a spoof shown in Fig. 2 arrange two types of layers: a visible layer v with
[6,43]. Deep learning has been adopted to generate a robust finger- stochastic m neurons are direct relations with a hidden layer h
print spoofing system. with n neurons. However, there are no connections between neu-
For instance [31], shows that convolution neural network can rons in the same layer, and this restriction gives the RBM its name.
identify the forged fingerprints with known fabricate materials. A weight matrix is constructed asWmXn . It has the weights between
Chugh et al. [44] proposed a method for fingerprint recognition the connected, visible and hidden neurons, where wij represents
by extracting local regions from the image itself. These patches symmetric weights between the ith visible neuron vi connected
were centered and aligned using minutiae features to provide sali- with the jth hidden neuron hj .
ent descriptors. These cues are trained via CNN models to improve Each unit in a visible layer V is connected with all the units in
detection results. the hidden layer h. Assume layers, V and h, with binary stochastic
In this paper, we proposed a deep learning method for to recog- variables, i.e., V 2 ½0; 1m and h 2 ½0; 1n . Where m and n are the
nize real fingerprints and detect spoofs. The main contributions of numbers of units of the visible and hidden layers. The energy func-
our method are summarized as follows: tion for connecting configuration between V and h layer from Ber-
noulli distribution with success probability in RBM method [48] is
1) It attempts to distinguish real fingerprint images from fake defined as
ones.
X
m X
n X
m X
n
2) It analyzes the image consistency based on scaled and EðV; hÞ ¼  ai vi  b j hj  vi hj wij ð1Þ
rotated ROIs. Based on these ROIs features, we propose a i¼1 j¼1 i¼1 j¼1
deep discriminative model for training detection.
where ai and bj are the biases of ith visible layer and jth hidden
The rest of the paper is presented as follows. In Section 3, we layer, respectively. The model parameters ai is composed of vector
introduce two main techniques: DRBM and DBM used in the pro- a ¼ ½a1 ; a2 ;    :; aV  and bj is composed of vector b ¼ ½b1 ; b2 ;    :; bh .
posed method identify representation of real and forged finger- The marginal probability of a joint distribution function over visible
prints. Experimental results are presented in Section 4. Finally, layer is defined as
Section 5 gives a conclusion and future works. 1X
PðvÞ ¼ expEðv;hÞ ð2Þ
Z h
3. Proposed method
where Z is the partition function defined as follows:
XX
We propose a novel method to determine fake fingerprints Z¼ expEðv;hÞ ð3Þ
regarding spoof forgeries were used in authentication based sys- v h
tems, we adapt multiple features called deep features which
Z is the sum of possible pairs of (v, h). Let V be a m dimensional vec-
extracted from images such as, Deep Boltzmann Machine (DBM)
tor and let h be a n dimensional binary vector. while visible units
[45]. The main benefit of DMB is that its layered architecture helps
are binary, we have total 2mþn pairs of ðv; hÞ.
to investigate a complex relationships between features and
Since the RBM is a probabilistic binary structure may includes
enables deep learning of high detailed features of data. Extracting
different layers, each higher layer takes the correlation between
features from the input image based on Deep Neural Networks aids
actions of upper hidden features from lower hidden layer. The
to understand data in depth. DBMs are probabilistic deep learning
lower layer generates visible units connected with the higher layer
that copes with complex patterns impressively by extracting
based on joint distribution with mutual independent conditional
highly detailed features from the image. It is suitable for tasks in
distribution probabilities PðhjVÞ and PðVjhÞ are defined as follows
which the patterns might not be easily detected or forged. Results
on the Cross Match [7] dataset show that our technique achieves X
n

good results with comparison to handcrafted based methods, the Pðvi ¼ 1jhÞ ¼ /ð wij hj þ ai Þ ð4Þ
j¼1
results show high detection rate regarding spoofing attack. The
motivation of using deep learning features includes: and
X
m
1) Restricted Boltzmann Machines (RBMs) adapted in many Pðhj ¼ 1jvÞ ¼ /ð wij vi þ bj Þ ð5Þ
applications such as image classification and medical image i¼1
investigation and pattern analysis to solve various learning
problems. where / () stands for the sigmoid function, /ðxÞ ¼ 1=ð1 þ expðxÞÞ.
2) Restricted Boltzmann Machines typically developed to For an nhidden-layer RBM, its model parameters consist of
extract features and build a self-contained framework for value
generating competitive non-linear classifiers. T ¼ fa1 ; b1 ; w1 ; a1 ; b1 ; w1 ;       :; am1 ; bn1 ; wmn1 ; am ; bn ; wmn g
3) We introduce RBM algorithm that introduces a discriminant
ð6Þ
factor to RBM training.
Given the training input data T of the visible neuron, it is not
Thus, the notion of two main deep learning features: Restricted easy to approximate the parameters of vector T by using maximum
Boltzmann Machines (RBM) and Deep Boltzmann Machines (DBM) likelihood criterion directly because of various hidden layers found
are introduced below regarding spoofing forgeries. in the RBM model. To solve this issue, we have implanted a greedy
based learning algorithm to train the stacked RBM model [49] in
the input image. A greedy learning algorithm tries to find out the
3.1. Restricted Boltzmann Machines (RBM)  
parameters of the first layer RBM a1 ; b1 ; w1 to model the visible
The (RBM) as introduced in [46] is a kind probabilistic graphical training data. Then, it saved the parameters of the first layer into
 
model based stochastic neural networks which are used to vector v ¼ a1 ; w1 and produce a Gibbs sampling from the first
describe the dependency among a set of random data variables layer in RBM as Pðhj ¼ 1jvÞ to train the next layer of RBM
 
using a two layer architecture. The architecture of an RBM as a2 ; b2 ; w2 , Let h = (a,b,W) be the set of parameters of RBM. The
D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273 267

To improve the recognition performance against noise and missing


data. 3) It has the ability to extract deep features obtained from a
large supply of unlabeled sensory inputs 4) It deals with vague
inputs robustly due to the the approximate inference step works
in a bottom up initialization and also can incorporate with top-
down view.
A deep bottom up Boltzmann machine as shown in Fig. 3, left
panel, in which each layer captures complicated, higher-order cor-
relations between the activities of hidden features in the layer
below.
After a bottom up initialization of the DBM to train layer by
layer manner. The learning procedure implemented using called
Mean Field (MF) [50] method to enhance its performance. First, a
Fig. 2. The graphical model for two layers: v and h in a) first layer of RBM and b) a stack of RBMs have been employed in and estimates the parame-
three hidden layer of RBM as introduced in [47].  
ters a1 ; b1 ; w1 of the first layer in RBM to model the visible train-
ing data. Then, it saved the parameters of the first layer and
produce Gibbs sampling from the first layesto train the second
goal of training step is to maximize the probabilities of occurrence layer of RBM. Mean Field inference method minimizes the total
of all the available training samples from input vector T which is energy of the RBM based on the parameters estimated via partial
defined as follows inferences which converges much faster than with random initial-
Y ization. Then, it computes an approximation of Q MF ðhjv; lÞ that
l ¼ argmax PðvÞ ð7Þ represents a fully factorized distribution to approximate the true
v2l
distribution of the hidden layers PðhjVÞ. This approximation is
When the fingerprint is scanned by reader, then it is converted computed as follows
to grayscale image that has real value pixels. A discriminative RBM  
YL YF  
 l k 
[48] is employed, which generate Gibbs samples from multinomial Q MF
ðhjv; lÞ ¼  q hl  ð10Þ
distribution with probability to make vector T has elements of 
l¼1 k¼1

Gaussian units. Therefore, Equation (1) can be redefined as follows
where L represents the number of hidden layers, F stands for the
 
1X m
ðv i  ai Þ2 X n Xm X n
vi number of nodes in the hidden layer. q hl ¼ l1 , where l ¼ 1. As
k
EðV; hÞ ¼   b j hj  hj wij ð8Þ
2 i¼1 ri
2
j¼1 i¼1 j¼1
ri
a result of DBM, the parameters of the mean field inference are con-
The conditional probability of visible layer based on Eq. (3) is rede- structed as follows
fined as follows l ¼ fl1 ; l2 ; :::; lL g ð11Þ
!
X
n
ai The choice of mean-field was measured due to two main rea-
Pðv i ¼ 1jhÞ ¼ N v ij wij hj þ ð9Þ
j¼1
r2i sons: First, it is a common type of approximate inference algorithm
that calculates the convergence criteria which considerably assists
where r is the variance of the normalGaussian distribution of N.
2
the structure of deep learning machine. Second, when biometric
systems have the tasks of image analysis, we assume that subse-
3.2. Deep boltzmann machines (DBM’s) quent layers over hidden layers of a given image that has a single
extracted feature. Then, mean-field should be suitable.
Deep boltzmann machines are adopted for several reasons: 1) Hence, the proposed method aimed to employ presentation
DBM’s is a talented method which can learn a complex internal attack detection (PAD) and the determination of a presentation
features from shapes and objects in image such as fingerprint. 2) attack starts by recording of a latent fingerprint from LiveDet

Fig. 3. a) three-layer Deep Boltzmann Machine. b): Pre training consists of learning a stack of modified RBM’s, which are then composed to create c) a deep Boltzmann
machine.
268 D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273

4. Feature vector generation: for each fingerprint image, we have


employed three stacks of RBMs for three Selected regions of
input image, which are: original scanned fingerprint image
40  40 pixel size, five patches detected under various scaling
factors Sx ¼ 0:3; 0:6; 0:9; 1:2; 1:5 and five rotated cropped
images under rotation angles h ¼ 30; 60; 90; 120; 18. While the
input layer of these RBMs includes the size of the 40  40  3
visible neurons, the hidden layer has 1000 neurons. These fea-
tures are saved in the feature vector of size 40  40  3 for
every patch image.
5. Linear Discriminant Analysis (LDA): we have considered the 11
(1 ROI + 5 scaled + 5 rotated) patch versions of the original fin-
Fig. 4. Input image and selected ROIs with their 10 constructed patches for each
gerprint image of size 725  800 implies a feature space of
ROI.
40  40  11 = 17600 dimensions. It is computationally chal-
lenging to handle big matrices. The direct LDA algorithm in
[51] for high-dimensional data is employed. It optimizes Fish-
Dataset and apply post processing to remove the noise from the er’s criterion, which maximizes between class scatter and min-
image due to scanning errors and Close of ridge lines by scaling imizes within class scatter. It is suitable for two class
operation to do the following steps: classification tasks like biometric authentication systems to
make a decision if the fingerprint is valid or spoofed.
1. Inputs and preprocessing: The original input fingerprint images 6. K -Nearest Neighbor (KNN): given a fingerprint image, its 10
are entered as training set of grayscale images into the RBM patches have been constructed and classified using K-Nearest
model to extract features from regions of interest (ROI). Fig. 4 Neighbor algorithm [52]. KNN is a nearest-neighbor classifica-
presents, two modalities of the images were used: Grayscale tion model in which classifies new cases based on a similarity
of the input images and patches of theirs normalized ROIs measure (e.g., distance functions). Because KNN classifier stores
includes 10 patches of scaled and rotated ROIs. This step might training data, the model helps to compute substitution predic-
help to increase the size of the training dataset and it’s manda- tions. In particular, KNN classifier aimed to apply binary classi-
tory to prevent missing of data when approximating the DBM’s fication in the context of spoofed fingerprint detection. Only
parameters. The first step is mandatory to observe the reflection live fingerprint images are used for training the proposed
of fingerprint by examining three features: Shape, consistency method as shown in Fig. 6.
of the fingerprint from different rotation angles. It can be
noticed, that Attack presentation detection rate based on these
features differs from artefacts to bona fide fingers. It is imple-
mented as shown in Fig. 4.
2. Deep features extraction based on Discriminative RBM: the next
step is to pre-training patches of grayscale images through
DRBM. The process is applied in a greedy bottom-up way in
order to approximate the real-valued patches to posterior prob-
abilities of activation.
3. DBM training: Mean-Field algorithm was applied in this step
to update the weights and the biases of the RBMs stacked in
the DBM in a more accurate way. Finally, Multilayer Percep-
tron network was constructed using the same architecture
as the DBM to perform backpropagation for training. The
weights of each RBM stack were computed through local
parameters: a, b and W of each individually trained RBM as Fig. 6. A spoof fingerprint detection is trained by KNN classifier to distinguish
shown in Fig. 5. samples of bona fide fingerprints from samples of known spoof ones.

Fig. 5. The framework of the proposed method.


D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273 269

4. Experiment results the influence of modifying learning rate and weight decay param-
eters in the proposed method.
4.1. Datasets
4.4. Self comparison
In this section, we used the state of art LivDet 2datasets: LivDet
2013 [53], and LivDet 2015 for fingerprints spoofing benchmark DRBM + DBM method is trained on three data sets for finger-
[20,25] which are considered in the proposed method. The LivDet print detection. We use two groups of patches generated from
2013 Contains two type of images: genuine images and spoofs with the input image, Scaled and rotated ROIs. To evaluate progress of
total of 16.000 images and equally distributed as 50% of the images our method, three fingerprint scanners for spoof images were
were used as a training set and the remaining 50% as the test set for regarded in our experiments. We have used the following metrics
classification. as shown in Table 3: Accuracy rate (ACC), Half total error rate
Hence, the real images captured by four fingerprint scanners: (HTER), Fake Fingerprint Accuracy (FFA) and True Fingerprint
Biometrika, Crossmatch, ItalData and Swipe, Spoofs are created Accuracy (TFA), respectively and defined as follows
using a gelatin materials like latex, play-doh and wood glue. LivDet
NT
2013 utilized for use of the non-cooperative method without user ACC ¼  100% ð12Þ
interference for creating spoof images. We used only Biometrika
NT þ NF
and ItalData due to high resolution of their images. The second where NT represents the number of the correct fingerprint recog-
dataset is livDet 2015 which contains a set of images were cap- nized in the testing dataset and NF is the number of fake finger-
tured by four optical scanners; these scanners are Digital Persona, prints in testing dataset.
Green Bit, Biometrika and Crossmatch. It noticed that the testing
FAR þ FRR
set has spoof images which forged using unknown materials not HTER ¼ ð13Þ
saved in the training set. Only gelatin material in the Crossmatch 2
were considered in our experiments as shown in Table 1. where FAR is a False acceptance rate and FRR is a false rejection
Artificial fingerprints in Biometrika and Italdata have been cre- rate. In order to assess the performance of the proposed method
ated without user assistance, while fake ones in CrossMatch were based on various materials for spoofing forgeries, fake fingerprint
created by user cooperation. Several materials for creating the syn- accuracy (FFA) and true fingerprint accuracy (TFA) are defined as
thetic fingerprints were applied, such as: gelatin, wood glue, sili- follows:
cone and latex. More concisely, experimental evaluation of the
N1
proposed method is applied on a collection of a large and challeng- FFA ¼  100% ð14Þ
ing LivDet 2013 and 2015 dataset. In LivDet 2013, over 1000 live NF
attempts were collected as well as, 1000 spoof fingers from various
N2
materials such as Play-Doh, Gelatin and Ecoflex. In LiveDet 2015, it TFA ¼  100% ð15Þ
NT
is about 2011 training attempts have conducted on 1010 live fin-
gers with a resolution of 1000 dpi from 51 subjects depending on where N1 represents the number of fake fingerprint images which
the sensor, 2 fingerprints each of all 10 fingers and 1001 spoofed are recognized falsely in NF. N2 represents the number of true fin-
fingerprints across 5 spoof materials to produce nearly 200 fin- gerprint images that, are identified as true ones in NT.
gerprint images per spoof material. 500 spoofed fingers made from As pointed in Table 3, the computation cost of the proposed
each of 5 fingerprints of 20 subjects for each of the five spoof mate- method for a single tested image is 45 s when we test images on
rials. Only two attempts applied on each spoof. Italdata dataset. Each step is given individually. Fingerprint prepro-
cessing step for one image required 0.2 s and fingerprint deep fea-
tures extraction required 10 s. The DBM training consumed 30 s
4.2. Experimental setup and KNN classifier required 4.8 s. Similarly, the total computation
time required to test one image on CrossMatch is 85 s, which is
To achieve a perception of these three fingerprint benchmarks, slower than Italdata and Biometrica due the large blank areas.
various parameters in our method have been adjusted to give a We have tested three types of spoof materials: Wood Glue, gelatin,
good results as shown in Table 2. The implementation of the pro- Play-Doh and 2D-printed ones on the proposed method.
posed method was applied on Intel (R) Xeon (R) CPU E5-2690 v2 To examine the time complexity of the proposed method, two
(3.00 GHz processor) with 20 GB RAM and NVIDIA GPU uses Mat- experiments are conducted. The experiments considered the num-
lab 2016a. ber of training fingerprints as well as number of input features
used in the tested fingerprint image. The computation times of
the proposed DRBM + DBM model are gained for different numbers
4.3. Parameters evaluation of training images. The LivDet dataset is employed in the first
experiment. The number of training images is ranged from 50 to
To do training and testing samples of fake fingerprints in the 1000. The average processing time of the proposed method is cal-
dataset, we have tried various values of specific parameters: patch culated against the number of training fingerprint images as shown
numbers, learning rate and weight decay respectively on our in Fig. 10. It shows that the time complexity of the proposed
experiments. Appropriate values for these parameters are chosen. method in regard to the number of training samples is O (n) based
As shown in Fig. 7, Using the 10 ROIs from the original input finger- on big O (.) notation.
print in the training DBM model, significantly makes the proposed In the second experiment for examining the time complexity of
method robust against missed or damaged ROIs of the input the proposed method, different number of image features is con-
images. Furthermore, it gives a high accuracy detection rate when sidered to calculate the computation time of the proposed as
the size of the trained data is suitable in the dataset. The 10 shown in Fig. 11. The proposed method used a feature vector with
patches of input image show that, the size of trained data is size 128 features due to dimensionality reduction. The running
increased to achieve about 0.95 accuracy rate. Figs. 8 and 9 show time based on 128 features is 45 s. The size of input image is
750  800. We selected ROI with size 40  40 to produce 1600 fea-
2
LivDet datasets are available to researchers at http://livdet.org/registration.php. tures. For the ROI, 5 rotated patches and 5 scaled patches are
270 D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273

Table 1
Information of LivDet datasets 2013 and 2015 used in the proposed method.

Dataset LivDet 2013 LivDet 2015


Fingerprint scanner Biometrika ItalData CrossMatch
Scanner model FX2000 ET10 L Scan Guardian
Image size 315  372 640  480 640  480
Resolution in dpi 569 500 500
Training/testing for live image 1000/1000 1000/1000 1510/1500
Training/testing for spoof images 1000/1000 1000/1000 1473/1473
Cooperative Subject No No Yes
Materials used for spoofing Ecoflex, Gelatine, Latex, Modasil, Wood Glue Body Double, Ecoflex, Play-Doh, OOMOO, Gelatin

Table 2 extracted to produce 1600  10 = 16000 features. The running time


Experimental setup. for 16,000 fatures is increased to 50 s which is slightly high which
Parameter Value
is still the future direction to reduce the time computation.
As shown in Table 4, non-cooperative test was used to enhance
Size of input image 750  800
Patch size 40  40
a latent fingerprint left on a surface and printing the negative
Patch numbers 10 patches impression on a 2D sheet. This 2D printed image can then be made
GB- RBM 864 visible, 1000 hidden neurons into a mold. Our method detects about TFA = 89% and FFA = 88%.
Maximum epochs 500 The main difference between TFA and FFA is that TFA represents
Meanfieldalgorithm 30 rounds
the number of fake fingerprint images which are recognized fal-
Learningrate 0.01
Momentum 0.5–0.92 sely. FFA represents the number of true fingerprint images that,
Weight decay 10–4 are identified as true ones.
Pooling size 13 Further, the performance of the our method gives a value of
Size of feature vector 128 posterior probability of the bona fide fingerprints normalized in

Fig. 7. Accuracy rate of the proposed method on Cross Match dataset.

Fig. 8. Accuracy rate versus Learning rate.


D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273 271

Fig. 9. Accuracy rate versus Weight decay.

Table 3
Performance evaluation of the proposed method on LivDet, 2013 (Biometrica and
Italdata) and LivDet, 2015 (CrossMatch).

Method
DRBM + DBM model ACC HTER Processing time per Dataset
image in seconds (s)
96.00% 3.50% 66 s Biometrica
95.00% 6.44% 85 s CrossMatch
94.50% 2.80% 45 s Italdata

the range 0–1 (0 is the degree of artifact fingerprints and 1 is bona


fide ones). The threshold parameter to make decision is set to 0.3.
To estimate the classification error rate in the proposed method,
two type of classification error rate are used. Attack Presentation
Classification Error Rate (APCER) and Bonafide Presentation Classi- Fig. 11. Computation time of the proposed method based on different number of
fication Error Rate (BPCER). APCER defines the rate of spoof finger- features per image.
prints called live). BPCER defines the rate of live fingerprints called
spoofs. 4.5. State of art comparisons
The APCER and BPCER rates of our algorithms are presented in
Table 5. The results from the three datasets: Biometrica, Cross- Some experimental results are mentioned in Table 6 to show
Match and ItalData, DRBM + DBM model performed the best in the robustness of our method compared with others: [35,54–56].
CrossMatch with APCER = 9.03% and BPCER = 6.4% due to high res- The Average Classification Error (ACE) is used as a performance
olution of images produced by L Scan Guardian reader. evaluation metric for robustness. It is defined as follows:

Fig. 10. Computation time of the proposed method when using different number of training fingerprints.
272 D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273

Table 4
The performance of the proposed method using LivDet 2013 with regarding four types of fabricate fingerprint materials with memory space 61.5 MB.

Method Detection of artefact presentation with Spoof Materials


DRBM + DBM model Real Wood glue Gelatin Play-Doh 2D printed
TFA FFAfor spoof materials
0.95 0.88 0.90 0.90 0.88

Table 5
Classification error rates in percentage (%) over three datasets with known spoofs.

Biometrica CrossMatch ItalData


APCER BPCER APCER BPCER APCER BPCER
5.80% 9.7% 3.8% 6.4% 11.6% 9.1%

Table 6
Comparison table shows performance evaluation of existing methods compared with [3] C. Roberts, Biometric attack vectors and defences, Comput. Sec. 26 (1) (2007)
our method on LivDet 2013. 14–25.
[4] K.W. Bowyer, Face recognition technology: security versus privacy, IEEE
Reference Techniques used ACE Technol. Soc. Mag. 23 (1) (2004) 9–19.
[5] D. Menotti et al., Deep representations for iris, face, and fingerprint spoofing
Nogueira et al. [56] Convolutional neural networks 3.9%
detection, IEEE Trans. Inform. Forensics Sec. 10 (4) (2015) 864–879.
Jiang and Xin [35] Co-occurrence matrix 11.00%
[6] M. Sajjad et al., CNN-based anti-spoofing two-tier multi-factor authentication
Gottschlich et al. [55] Histograms of gradients. 6.7%
system, Pattern Recogn. Lett. (2018).
Zhang et al. [54] Wavelet features and local binary pattern 2.1% [7] L. Ghiani et al., Livdet 2013 fingerprint liveness detection competition 2013,
The proposed method DRBM + DBM 3.6% Biometrics (ICB), 2013 International Conference on, IEEE, 2013.
[8] Q. Huang et al., An evaluation of fake fingerprint databases utilizing SVM
FerrLive þ FerrFake classification, Pattern Recogn. Lett. 60 (2015) 1–7.
ACE ¼ ð16Þ [9] T. Chugh, K. Cao, A.K. Jain, Fingerprint spoof detection using minutiae-based
2 local patches, Biometrics (IJCB), 2017 IEEE International Joint Conference on,
IEEE, 2017.
where Ferrlive is the percentage of misclassified real fingerprints
[10] R.K. Dubey, J. Goh, V.L. Thing, Fingerprint liveness detection from single image
and Ferrfake is the percentage of misclassified fake fingerprints. using low-level features and shape analysis, IEEE Trans. Inf. Forensics Secur. 11
(7) (2016) 1461–1475.
[11] C. Wang et al., A DCNN based fingerprint liveness detection algorithm with
5. Conclusion voting strategy, Chinese Conference on Biometric Recognition, Springer, 2015.
[12] Y. Gao et al., Intermediate spoofing strategies and countermeasures, Tsinghua
We proposed a novel deep learning model for examining finger- Sci. Technol. 18 (6) (2013) 599–605.
[13] D. Baldisserra et al., Fake fingerprint detection by odor analysis, International
prints based on DRBM and Deep Boltzmann Machine, which deals Conference on Biometrics, Springer, 2006.
with complex texture patterns in a robust way due to its proba- [14] Z. Akhtar et al., Evaluation of serial and parallel multibiometric systems under
bilistic multilayer architecture. In the proposed method, after spoofing attacks, IEEE Fifth International Conference: Biometrics: Theory,
Applications and Systems (BTAS), IEEE, 2012.
training a DBM, such structure has employed to extract deep fea- [15] J.J. Engelsma, K. Cao, A.K. Jain, Raspireader: open source fingerprint reader,
tures of the grayscale fingerprints. KNN classifier is applied with IEEE Trans. Pattern Anal. Mach. Intell. (2018).
the feature vectors of the ROIs extracted by the DBM to examine [16] J.-G. Wang et al., Person recognition by fusing palmprint and palm vein images
based on ‘‘Laplacianpalm” representation, Pattern Recogn. 41 (5) (2008) 1514–
spoof forgeries. The experiment results demonstrate that the Deep
1527.
learning model is robust against different kinds of spoof forgeries [17] M. Espinoza, C. Champod, P. Margot, Vulnerabilities of fingerprint reader to
such as wood glue, Gelatin and Play-Doh. Deep features are fake fingerprints attacks, Forensic Sci. Int. 204 (1–3) (2011) 41–49.
extracted from the real image of grayscale and Depth visual struc- [18] M. Drahanský, W. Funk, R. Nötzel, Liveness detection based on fine movements
of the fingertip surface, 2006, IEEE Information Assurance Workshop, 2006.
ture such as scaled and rotated patch ROIs. The performance eval- [19] C.J. Lennard et al., Fingerprints and Other Ridge Skin Impressions, CRC Press,
uation of the DRBM + DBM method achieved state-of-the-art 2016.
results in three public fingerprint recognition benchmarks. How- [20] L. Ghiani et al., Review of the fingerprint liveness detection (LivDet)
competition series: 2009 to 2015, Image Vis. Comput. 58 (2017) 110–128.
ever, our method still struggling to recognize fake fingerprints with [21] D. Yambay, Review of fingerprint presentation attack detection competitions,
unknown materials. For future work, we need to extend the Springer International Publishing, Cham, 2019, pp. 109–131.
method behavior to deal with spatio-temporal features of finger- [22] Y. Park, U. Jang, E.C. Lee, Statistical anti-spoofing method for fingerprint
recognition, Soft. Comput. 22 (13) (2018) 4175–4184.
print images to explore the liveness properties. Furthermore, we [23] J.B. Kho et al., An incremental learning method for spoof fingerprint detection,
need to explore the capability of the proposed method in reducing Expert Syst. Appl. 116 (2019) 52–64.
the time complexity of deep learning machine. [24] C. Sousedik, C. Busch, Presentation attack detection methods for fingerprint
recognition systems: a survey, IET Biom. 3 (4) (2014) 219–233.
[25] V. Mura et al., LivDet 2017 fingerprint liveness detection competition 2017,
Acknowledgments International Conference on Biometrics (ICB), IEEE, 2018.
[26] IEC, I.S., ‘‘ISO/IEC 30107-3:2016, InformationTechnology-Biometric
Presentation Attack Detection-Part 1: Framework”, in ISO/IEC 30107-1:2016
The authors are grateful to the Middle East University, Amman, 2016.
Jordan for the financial support granted to cover the publication [27] H.-U. Jang et al., Fingerprint spoof detection using contrast enhancement and
process of this research article. convolutional neural networks, International Conference on Information
Science and Applications, Springer, 2017.
[28] I. Goicoechea-Telleria et al., Presentation attack detection evaluation on
References mobile devices: simplest approach for capturing and lifting a latent
fingerprint, International Carnahan Conference on Security Technology
[1] E. Marasco, A. Ross, A survey on antispoofing schemes for fingerprint (ICCST), IEEE, 2018.
recognition systems, ACM Comput. Surv. (CSUR) 47 (2) (2015) 28. [29] K. Cao, A.K. Jain, Hacking mobile phones using 2D printed fingerprints.
[2] G. Fumera, Multimodal anti-spoofing in biometric recognition systems, in: S. Technical Report. MSU-CSE-16-2, 2016.
Marcel, M.S. Nixon, S.Z. Li (Eds.), Handbook of Biometric Anti-Spoofing: [30] A. Rattani, W.J. Scheirer, A. Ross, Open set fingerprint spoof detection across
Trusted Biometrics under Spoofing Attacks, Springer, London, 2014, pp. 165– novel fabrication materials, IEEE Trans. Inf. Forensics Secur. 10 (11) (2015)
184. 2447–2460.
D.M. Uliyan et al. / Engineering Science and Technology, an International Journal 23 (2020) 264–273 273

[31] Z. Xu, S. Li, W. Deng, Learning temporal features using LSTM-CNN architecture [43] A. Krizhevsky, I. Sutskever, G.E. Hinton, Imagenet classification with deep
for face anti-spoofing, Proceedings of the 3rd IAPR Asian Conference on Pattern convolutional neural networks, in Advances in Neural Information Processing
Recognition (ACPR), IEEE, 2015. Systems. 2012.
[32] Rattani, Ross, Automatic adaptation of fingerprint liveness detector to new [44] T. Chugh, K. Cao, A.K. Jain, Fingerprint spoof buster: use of minutiae-centered
spoof materials, IEEE International Joint Conference on Biometrics, IEEE, 2014. patches, IEEE Trans. Inf. Forensics Secur. 13 (9) (2018) 2190–2202.
[33] Xia, Z., et al., A novel weber local binary descriptor for fingerprint liveness [45] D.H. Ackley, G.E. Hinton, T.J. Sejnowski, A learning algorithm for Boltzmann
detection, In IEEE Transactions on Systems, Man, and Cybernetics: Systems, machines, Cognit. Sci. 9 (1) (1985) 147–169.
2018. [46] G.E. Hinton, R.R. Salakhutdinov, Reducing the dimensionality of data with
[34] P.D. Lapsley, et al., Anti-fraud biometric scanner that accurately detects blood neural networks, Science 313 (5786) (2006) 504–507.
flow. 1998, Google Patents. [47] P. Smolensky, Information processing in dynamical systems: Foundations of
[35] Y. Jiang, X. Liu, Spoof fingerprint detection based on co-occurrence harmony theory, 1986, Univ at boulder dept of computer science colorado.
matrix, Int. J. Signal Process. Image Process. Pattern Recogn. 8 (8) (2015) [48] V. Nair, G.E. Hinton. Implicit mixtures of restricted Boltzmann machines, in
373–384. Advances in Neural Information Processing Systems, 2009.
[36] L. Ghiani, G.L. Marcialis, F. Roli, Fingerprint liveness detection by local phase [49] G.E. Hinton, S. Osindero, Y.-W. Teh, A fast learning algorithm for deep belief
quantization, Proceedings of the 21st International Conference on Pattern nets, Neural Comput. 18 (7) (2006) 1527–1554.
Recognition (ICPR2012), IEEE, 2012. [50] M. Welling, G.E. Hinton, A new learning algorithm for mean field Boltzmann
[37] A. Abhyankar, S. Schuckers, Fingerprint liveness detection using local ridge machines, International Conference on Artificial Neural Networks, Springer,
frequencies and multiresolution texture analysis techniques, International 2002.
Conference on Image Processing, IEEE, 2006. [51] H. Yu, J. Yang, A direct LDA algorithm for high-dimensional data-with
[38] S.B. Nikam, S. Agarwal, Fingerprint liveness detection using curvelet energy application to face recognition, Pattern Recogn. 34 (10) (2001) 2067–2070.
and co-occurrence signatures, Proceedings of the fifth international conference [52] M. Muja, D.G. Lowe, Scalable nearest neighbor algorithms for high dimensional
on computer graphics, imaging and visualisation, IEEE, 2008. data, IEEE Trans. Pattern Anal. Mach. Intell. 11 (2014) 2227–2240.
[39] P. Coli, G.L. Marcialis, F. Roli. Power spectrum-based fingerprint vitality [53] L. Ghiani et al., Livdet 2013 fingerprint liveness detection competition 2013,
detection, in 2007 IEEE Workshop on Automatic Identification Advanced International Conference on Biometrics (ICB), IEEE, 2013.
Technologies, 2007. IEEE. [54] Y. Zhang et al., Fake fingerprint detection based on wavelet analysis and local
[40] T. de Freitas Pereira et al., LBP TOP based countermeasure against face binary pattern, Chinese Conference on Biometric Recognition, Springer, 2014.
spoofing attacks, Asian Conference on Computer Vision, Springer, 2012. [55] C. Gottschlich et al., Fingerprint liveness detection based on histograms of
[41] Z. Akhtar et al., Evaluation of multimodal biometric score fusion rules under invariant gradients, Biometrics (IJCB), 2014 IEEE International Joint
spoof attacks, Proceedings of the 5th IAPR International Conference on Conference, Citeseer, 2014.
Biometrics (ICB), IEEE, 2012. [56] R.F. Nogueira, R. de Alencar Lotufo, R.C. Machado, Evaluating software-based
[42] J. Galbally et al., A high performance fingerprint liveness detection method fingerprint liveness detection using convolutional networks and local binary
based on quality related features, Future Gener. Comput. Syst. 28 (1) (2012) patterns, Biometric Measurements and Systems for Security and Medical
311–321. Applications (BIOMS) Proceedings, 2014 IEEE Workshop, IEEE, 2014.

You might also like