A presentation attack consists in submitting to the fingerprint capture device an artificial replica of the finger of the targeted client. If the sensor is not equipped with an appropriate algorithm aimed to detect the fingerprint spoof, the system processes the obtained image as a one belonging to a real fingerprint. In order to face this problem, several presentation attacks detection (PAD) algorithms have been proposed so far. Current methods heavily rely on features extracted from a large data set of fake and real fingerprint images, and an appropriate classifier trained with such data to distinguish between live (real) and fake (spoof) fingerprint images. Building such data set requires a significant effort for fabricating samples of fake fingerprints, with the most effective materials used to circumvent the sensor. Interesting and promising results have been obtained, but they also suggest that the PAD is tailored on the particular sensor. Small and significant differences also occur when a novel version of the same sensor is released, and this may affect the PAD. Therefore, making a PAD interoperable is among the main current issues when considering fingerprints as the first level of protection and security of logical or physical resources. This paper is a first attempt to assess at which extent the sensor interoperability can be an issue for fingerprint PADs and to eventually propose a solution to this limitation. In particular, textural features will be under focus and a feature space transformation method based on the least square is proposed.
On the interoperability of capture devices in fingerprint presentation attacks detection / Ghiani, L.; Mura, V.; Tuveri, P.; Marcialis, G. L.. - 1816:(2017), pp. 66-75. (Intervento presentato al convegno 1st Italian Conference on Cybersecurity, ITASEC 2017 tenutosi a ita nel 2017).
On the interoperability of capture devices in fingerprint presentation attacks detection
Ghiani L.;
2017-01-01
Abstract
A presentation attack consists in submitting to the fingerprint capture device an artificial replica of the finger of the targeted client. If the sensor is not equipped with an appropriate algorithm aimed to detect the fingerprint spoof, the system processes the obtained image as a one belonging to a real fingerprint. In order to face this problem, several presentation attacks detection (PAD) algorithms have been proposed so far. Current methods heavily rely on features extracted from a large data set of fake and real fingerprint images, and an appropriate classifier trained with such data to distinguish between live (real) and fake (spoof) fingerprint images. Building such data set requires a significant effort for fabricating samples of fake fingerprints, with the most effective materials used to circumvent the sensor. Interesting and promising results have been obtained, but they also suggest that the PAD is tailored on the particular sensor. Small and significant differences also occur when a novel version of the same sensor is released, and this may affect the PAD. Therefore, making a PAD interoperable is among the main current issues when considering fingerprints as the first level of protection and security of logical or physical resources. This paper is a first attempt to assess at which extent the sensor interoperability can be an issue for fingerprint PADs and to eventually propose a solution to this limitation. In particular, textural features will be under focus and a feature space transformation method based on the least square is proposed.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.