Professional Documents
Culture Documents
Anti-spoofing Method for Fingerprint Recognition Using Ml in Cyber Security (1)
Anti-spoofing Method for Fingerprint Recognition Using Ml in Cyber Security (1)
Qing Bao, Ya-Gang Wang, Chang Gao, Liangxiao This paper presents a coarse-to-fine This method used in
Sha, and Feifie Lee, “A Coarse-to-Fine Approach algorithm to rectify distorted latent reducing reliance on
for Rectifying Distorted Latent Fingerprints fingerprints. manual operations.
1. From Crime Scenes”, IEEE Artificial International
System, 18th December 2023, Vol: 11 Less accuracy for low-
quality fingerprints.
Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel This paper demonstrates a comprehensive A more efficient, and
Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi, evaluation of fingerprint image gender high-performance model.
“Enhancing Fingerprint Forensics: A Gender classification using CNN.
Classification Based on Advanced Data-Centric Ink fingerprints used in
2.
AI Approaches and Multi-Database Analysis”, this paper for gender
Multidisciplinary Digital Publishing Institute, classification, real crime
applied sciences, (2023), vol: 14 scene fingerprint images
are not used.
CONTd…
S.No Paper, Publication and Year Methodology Merits and Demerits
Cao K., Jain A.K., "Automated latent FCN is used to highlight the use of full These templates extract
fingerprint recognition.", IEEE Transactions on image for image segmentation. complementary information
Pattern Analysis and Machine Intelligence, from latents.
3. (2018).
The speed of feature
extraction is low
Khan A.I., & Wani M.A., "Patch-based This paper propose a patch-based Used to remove false and
Segmentation of Latent Fingerprint Images technique for segmentation of latent isolated patches.
Using Convolutional Neural Network.", Applied fingerprint images, which uses CNN to
Artificial Intelligence, 1–15(2018) classify patches. Accuracy 78%
4.
CONTd…
S.No Paper, Publication and Year Methodology Merits and Demerits
F. Liu, H. Liu, W. Zhang, G. Liu, L. Shen, “One- This paper proposes One-Class PAD They performed using a
class fingerprint presentation attack detection (OCPAD) method for Optical dataset with 28400 Plain arch
using auto-encoder network”, IEEE Trans. Coherence Technology (OCT) images (PA) scans.
5. Image Process. 30 (2021) 2394–2407. based fingerprint PA detection.
Only Plain arch scans are
used.
D.M. Uliyan, S. Sadeghi, H.A. Jalab, “Anti- This paper uses Discriminative They deals with complex
spoofing method for fingerprint recognition Restricted Boltzmann Machines (DRBM) texture patterns.
using patch based deep learning machine”, and Deep Boltzmann Machine (DBM) to
Eng. Sci. Technol. Int. J. 23 (2020) 264–273. recognize fingerprints accurately against This method achieved state-
fabricated materials used for spoofing of-the-art results in three
using Deep Learning model. public fingerprint (such as
6.
wood glue, Gelatin and
PlayDoh) recognition
benchmarks. However, this
method still struggling to
recognize fake fingerprints
with unknown materials.
CONTd…
S.No Paper, Publication and Year Methodology Merits and Demerits
F. Liu, G. Liu, and X. Wang, "High-accurate and This paper proposed an efficient This method gives higher
robust fingerprint anti- spoofing system using fingerprint anti-spoofing system with effectiveness and stronger
Optical Coherence Tomography", Expe. Sys. high accuracy and robustness using robustness.
7. Appl., Vol.130, pp.31-44, 2019. OCT.
The size and diversity of
dataset is limited.
Joshua J. Engelsma, Kai Cao, Anil K.Jain, • They demonstrate one such spoof To extract complementary
“RaspiReader: Open Source Fingerprint detection technique by specially informations.
Reader”, IEEE Transactions on Pattern Analysis customizing RaspiReader with two
and Machine Intelligence, Vol. 41, No. 10, pp. cameras for fingerprint image
2511–2524, Oct. 2019. acquisition.
8.
• One camera provides high contrast,
Frustrated Total Internal Reflection
(FTIR) fingerprint images, and the
other outputs direct images of the
finger in contact with the platen.
GAPS IDENTIFIED
● From these Literature survey, it takes a lot of time to identify forensic forgeries.
● Manual fingerprint analysis lacks, requiring significant human intervention at every step of the authentication
process.
● Real crime scene fingerprint images are not used.
● Only specific type of fingerprint patten and only less fabricated fingerprint type is been identified.
PROPOSED METHOD
● Our proposed system introduces a novel approach to forensic authentication using fingerprint images through
Convolutional Neural Networks.
● By leveraging advanced machine learning techniques, our system aims to overcome the limitations of
traditional fingerprint analysis methods and offer several key advantages:
● Automated Analysis
● Enhanced Accuracy
● Reduces the risk of human error and strengthens the overall security of forensic
investigations.
FLOW CHART
DATASET USED
● Our dataset is publicly available on the Kaggle website, from the source of FVC (FVC2000 DB1, FVC2002
DB1, FCV2004), NISC (NISC27, NIST SD4), and LivDet (LivDet 2011,2017,2019), which consists of real
time crime scene fingerprints.
● From the above datasets, FVC contains 10,000 fingerprint images(both spoofing and genuine fingerprint
images) , NISC contains 15,450 fingerprint images and LivDet contains 5,200 fingerprint images(live and
spoofed fingerprint images). All the images are combined into a single file as 30,650 images for the purpose
of training and testing.
● These datasets serve as standardized benchmarks for evaluating fingerprint recognition systems and anti-
spoofing algorithms.
SPOOFING METHODS
● In our project, we utilize Python as the primary programming language, leveraging its simplicity and
readability.
● Specifically, we make use of the Anaconda distribution, which includes a comprehensive collection of
libraries and tools commonly used in data science and scientific computing.
● Libraries employed in our project includes:
i) numpy: For numerical computing.
ii) pandas: For data manipulation and analysis.
iii) cv2 (OpenCV): For computer vision tasks.
iv) matplotlib and seaborn: For data visualization.
RESULTS
Step 1: Open the Anaconda Prompt and navigate to the saved path of the folder.
Step 2: Copy the IP address and paste it into the address bar of Chrome.
Step 3: Once the front end is opened, upload the required fingerprint image.
Step 4: The results will be displayed as.
CONCLUSION