ThesisPDF Available

Liveness Detection and Robust Recognition in Iris and Fingerprint Biometric Systems

Authors:

Abstract and Figures

Biometrics represents a return to a traditional way of identifying someone relying on what that person is instead of what that person knows or owns. Even though the significant amount of research that has been done in this field, there is still much to do as new emerging scenarios of application appear everyday. Biometric recognition systems are no longer restricted to forensic investigation or control management of employees. They have been gaining a visibility and applicability in daily use devices which reinforces their usability in all aspects of our day to day life. With this spread of biometric applications, nowadays commonly found in our laptops, our smart phones, some bank management services and airport custom services, a necessity for improved security also is rising. The importance of protecting our identity and our data has become crucial as our devices are filled with sensible information of many kinds. Therefore the presentation attack or liveness detection methods as countermeasures against spoofing attacks are more important than ever. New methods should be developed which address the new acquisition scenarios and which deal with the increased noise in the biometric data collected. Its of utmost importance to develop robust liveness detection methods. In particular, we worked on iris and fingerprint. These two biometric traits are very often chosen against others due to its characteristics. Among the objectives of this thesis were the purpose of making contributions in iris and fingerprint liveness detection proposing novel approaches whether from the imaging scenarios perspective, in the case of iris, or from the classification approach, in the case of fingerprint. Contributions were made regarding both traits, that exceeded the state-of-the art and resulted in both conferences and journal publications. Not only the spoofing attacks concern the biometric researchers but also the ability of the methods to deal with the noisy data. Therefore, the development of robust methods that overcome the compromised quality of data is a necessity of biometric research of nowadays. Therefore, another objective was to contribute to the fingerprint recognition problem developing robust methods to minutiae extraction. The work developed resulted in a proposed method for fingerprint orientation map estimation and a fingerprint image enhancement that over performed existing ones. This work aimed and succeeded to propose robust and realistic methods in both the iris and fingerprint liveness detection problem as well as in some steps of fingerprint recognition. It has to be noted that the focus of attention of this work was the quality of data and not the computational efficiency, therefore this one should have to be addressed if an application of the proposed methods to a real-world scenario was aimed. Another objective was to create new databases and promote common platforms of evaluation of methods such as biometric competitions. Therefore, along the work developed, two biometric databases were constructed and two biometric competitions were organized. Both databases had a strong impact in the research community and they continue to be disseminated. Publications using these benchmark datasets are numerous and continue to appear regularly.
Content may be subject to copyright.
A preview of the PDF is not available
... Characterizing a biometric recognition system is not possible using only a single value [76]. However, there are some measures of accuracy that can be used under the same data and following the same protocol [77]. One metric commonly used to evaluate and compare biometric systems is the FAR -False Acceptance Rate. ...
Thesis
Full-text available
Artificial vision systems are widespread and non-invasive, paving the way to uniqueness detection and its recognition. A study on image-based Individual Object Recognition --- IOR --- systems for authentication and anti-counterfeiting purposes was performed. This study revealed some open issues in the literature of such systems leading to the following challenges: (i) how to accurately perform individual object recognition; (ii) how to enhance the trustworthiness of the recognition process; (iii) how to improve the search in the image database. Aiming to answer those open issues, a concept named RIOTA --- Recognition of Individual Objects using Tagless Approaches --- was proposed. In its essence, RIOTA's concept employs the philosophy of using the natural object's features to uniquely recognize it (using it "as is") and robustness against image attacks. Using cork as case study, the RIOTA's concept was implemented culminating in a wine anti-counterfeiting system. RIOTA's implementation included the development of an illumination device alongside with a recognition application. To evaluate RIOTA's implementation, a "cork database" containing 1,500 images from 500 cork stoppers was used. The perfect recognition score achieved in this database, demonstrates that imagery from cork stoppers are individually recognizable, which answers challenge (i). To enhance the trustworthiness of the recognition process, challenge (ii), an image-based Presentation Attack Detection --- PAD --- system, using imagery from cork stoppers was proposed. The evaluation of such system was performed using a "cork attack database" containing 2,400 images from 200 cork stoppers (including both printed and bona fide images), and five public face PAD databases. The results show the methods' effectiveness in distinguishing between image attacks and bona fide images on this database. On the public databases, the proposed methods are able to challenge the methods found in the state of the art specially designed for the face PAD problem. A Content Based Image Retrieval --- CBIR --- system using imagery from cork stoppers was also proposed in this thesis. The results on the "cork database" reveal a time improvement of RIOTA's implementation when querying an image to the database. This is a first step towards answering challenge (iii). In this way, RIOTA's concept was validated for the cork case study, allowing applications in authentication and anti-counterfeiting systems. This work delivered two major findings: cork is part of the Physical Unclonability and Disorder systems as a Unique Object --- UNO; and relevant advances to the state of the art on face PAD systems were introduced.
... [16] selects from and fuses 25 image quality features from iris images via Sequential Floating Feature Selection (SFFS) to classify print-based iris spoofing attacks. The winner of the LivDet-Iris 2013 [17] competition used a combination of 14 features derived from the Gray-Level Co-occurence Matrix selected with SFFS [18]. [19] fuse Zernike moments and LBPV features via an MLP. ...
Article
This paper presents a method for extracting distinctive invariant features from images that can be used to perform reliable matching between different views of an object or scene. The features are invariant to image scale and rotation, and are shown to provide robust matching across a substantial range of affine distortion, change in 3D viewpoint, addition of noise, and change in illumination. The features are highly distinctive, in the sense that a single feature can be correctly matched with high probability against a large database of features from many images. This paper also describes an approach to using these features for object recognition. The recognition proceeds by matching individual features to a database of features from known objects using a fast nearest-neighbor algorithm, followed by a Hough transform to identify clusters belonging to a single object, and finally performing verification through least-squares solution for consistent pose parameters. This approach to recognition can robustly identify objects among clutter and occlusion while achieving near real-time performance.
Article
A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 individuals acquired simultaneously in three scenarios: 1) over the Internet, 2) in an office environment with desktop PC, and 3) in indoor/outdoor environments with mobile portable hardware. The three scenarios include a common part of audio/video data. Also, signature and fingerprint data have been acquired both with desktop PC and mobile portable hardware. Additionally, hand and iris data were acquired in the second scenario using desktop PC. Acquisition has been conducted by 11 European institutions. Additional features of the BioSecure Multimodal Database (BMDB) are: two acquisition sessions, several sensors in certain modalities, balanced gender and age distributions, multimodal realistic scenarios with simple and quick tasks per modality, cross-European diversity, availability of demographic data, and compatibility with other multimodal databases. The novel acquisition conditions of the BMDB allow us to perform new challenging research and evaluation of either monomodal or multimodal biometric systems, as in the recent BioSecure Multimodal Evaluation campaign. A description of this campaign including baseline results of individual modalities from the new database is also given. The database is expected to be available for research purposes through the BioSecure Association during 2008.
Article
Thesupport-vector network is a new learning machine for two-group classification problems. The machine conceptually implements the following idea: input vectors are non-linearly mapped to a very high-dimension feature space. In this feature space a linear decision surface is constructed. Special properties of the decision surface ensures high generalization ability of the learning machine. The idea behind the support-vector network was previously implemented for the restricted case where the training data can be separated without errors. We here extend this result to non-separable training data.High generalization ability of support-vector networks utilizing polynomial input transformations is demonstrated. We also compare the performance of the support-vector network to various classical learning algorithms that all took part in a benchmark study of Optical Character Recognition.
Article
An algorithm for the segmentation of fingerprints and a criterion for evaluating the block feature are presented. The segmentation uses three block features: the block clusters degree, the block mean information, and the block variance. An optimal linear classifier has been trained for the classification per block and the criteria of minimal number of misclassified samples are used. Morphology has been applied as postprocessing to reduce the number of classification errors. The algorithm is tested on FVC2002 database, only 2.45% of the blocks are misclassified, while the postprocessing further reduces this ratio. Experiments have shown that the proposed segmentation method performs very well in rejecting false fingerprint features from the noisy background.
Article
Fingerprint enhancement is a critical step in fingerprint identification. Most of the existing enhancement uses a set of contextual fillers to enhance fingerprint. The main drawback of these methods is these contextual filters based on the local information of the fingerprint, such as ridge width, orientation, curvature et al. These information are unreliable in the areas corrupted by the noise. This paper introduces the scale space theory in the computer vision to enhance the fingerprint. In the enhancement process, decompose fingerprint into a series of images and organize the images by finer to coarser scheme. Thus a globe and integrate interpretation is available and it enable us to get rid of the influence of noise to the largest extent. Experiments show our algorithm is fast and has excellent performance.
Conference Paper
A spoof or fake is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Liveness detection distinguishes between live and fake biometric traits. Liveness detection is based on the principle that additional information can be garnered above and beyond the data procured by a standard authentication system, and this additional data can be used to determine if a biometric measure is authentic. The Fingerprint Liveness Detection Competition (LivDet) goal is to compare both software-based and hardware-based fingerprint liveness detection methodologies. The competition is open to all academic and industrial institutions. The number of competitors grows at every LivDet edition demonstrating a growing interest in the area. In this edition eleven institutions have registered with twelve submissions for the software-based part and one for the hardware-based part.