Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

ANTI-SPOOFING METHOD FOR FINGERPRINT

RECOGNITION USING ML IN CYBER SECURITY

Under the Guidance of, Team Members,


Dr. Vanithamani R Prathanya Sree.C
Professor (23PEM002)
Dept. of BMIE Srivarshini.M
(23PEM003)
OVERVIEW
● Objective
● Introduction
● Literature Survey
● Gaps Identified
● Proposed Method
● Work Flow
● Dataset
● Software Architecture
● Results
● Conclusion
● References
OBJECTIVE
● Traditional methods of fingerprint analysis often face challenges in detecting anti-spoofing, which can
significantly impact the validity of forensic conclusions, which often gives low accuracy rates in recognition.
● We proposed an anti-spoofing method for fingerprint recognition leveraging Machine Learning (ML)
techniques. This method aims to enhance the security of fingerprint recognition systems against spoofing
attacks.
● Subsequently, a machine learning model, such as a Convolutional Neural Network (CNN), is trained on the
extracted features to distinguish between genuine and spoofed fingerprints.
INTRODUCTION
● In our modern world there is an ever growing need to identify individuals, especially for personal
authentication, e.g. to unlock a smartphone, to authorize a banking transaction or to withdraw some money
from an ATM.
● Biometric recognition systems provide a convenient way to perform this necessary authentication step
without having to hassle with keys, smart cards or having to remember complicated passwords and thus, have
the potential to provide some extra security as well.
● Many spoof fingerprint detection techniques have been developed. Thus, misrepresentation of fingerprints
and detection of forged fingerprints is still an open issue.
● So, we use Convolution Neural Network algorithm to overcome this problem with the help of machine
learning.
LITERATURE SURVEY

S.No Paper, Publication and Year Methodology Merits and Demerits

Qing Bao, Ya-Gang Wang, Chang Gao, Liangxiao This paper presents a coarse-to-fine This method used in
Sha, and Feifie Lee, “A Coarse-to-Fine Approach algorithm to rectify distorted latent reducing reliance on
for Rectifying Distorted Latent Fingerprints fingerprints. manual operations.
1. From Crime Scenes”, IEEE Artificial International
System, 18th December 2023, Vol: 11 Less accuracy for low-
quality fingerprints.

Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel This paper demonstrates a comprehensive A more efficient, and
Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi, evaluation of fingerprint image gender high-performance model.
“Enhancing Fingerprint Forensics: A Gender classification using CNN.
Classification Based on Advanced Data-Centric Ink fingerprints used in
2.
AI Approaches and Multi-Database Analysis”, this paper for gender
Multidisciplinary Digital Publishing Institute, classification, real crime
applied sciences, (2023), vol: 14 scene fingerprint images
are not used.
CONTd…
S.No Paper, Publication and Year Methodology Merits and Demerits

Cao K., Jain A.K., "Automated latent FCN is used to highlight the use of full These templates extract
fingerprint recognition.", IEEE Transactions on image for image segmentation. complementary information
Pattern Analysis and Machine Intelligence, from latents.
3. (2018).
The speed of feature
extraction is low

Khan A.I., & Wani M.A., "Patch-based This paper propose a patch-based Used to remove false and
Segmentation of Latent Fingerprint Images technique for segmentation of latent isolated patches.
Using Convolutional Neural Network.", Applied fingerprint images, which uses CNN to
Artificial Intelligence, 1–15(2018) classify patches. Accuracy 78%
4.
CONTd…
S.No Paper, Publication and Year Methodology Merits and Demerits

F. Liu, H. Liu, W. Zhang, G. Liu, L. Shen, “One- This paper proposes One-Class PAD They performed using a
class fingerprint presentation attack detection (OCPAD) method for Optical dataset with 28400 Plain arch
using auto-encoder network”, IEEE Trans. Coherence Technology (OCT) images (PA) scans.
5. Image Process. 30 (2021) 2394–2407. based fingerprint PA detection.
Only Plain arch scans are
used.

D.M. Uliyan, S. Sadeghi, H.A. Jalab, “Anti- This paper uses Discriminative They deals with complex
spoofing method for fingerprint recognition Restricted Boltzmann Machines (DRBM) texture patterns.
using patch based deep learning machine”, and Deep Boltzmann Machine (DBM) to
Eng. Sci. Technol. Int. J. 23 (2020) 264–273. recognize fingerprints accurately against This method achieved state-
fabricated materials used for spoofing of-the-art results in three
using Deep Learning model. public fingerprint (such as
6.
wood glue, Gelatin and
PlayDoh) recognition
benchmarks. However, this
method still struggling to
recognize fake fingerprints
with unknown materials.
CONTd…
S.No Paper, Publication and Year Methodology Merits and Demerits

F. Liu, G. Liu, and X. Wang, "High-accurate and This paper proposed an efficient This method gives higher
robust fingerprint anti- spoofing system using fingerprint anti-spoofing system with effectiveness and stronger
Optical Coherence Tomography", Expe. Sys. high accuracy and robustness using robustness.
7. Appl., Vol.130, pp.31-44, 2019. OCT.
The size and diversity of
dataset is limited.

Joshua J. Engelsma, Kai Cao, Anil K.Jain, • They demonstrate one such spoof To extract complementary
“RaspiReader: Open Source Fingerprint detection technique by specially informations.
Reader”, IEEE Transactions on Pattern Analysis customizing RaspiReader with two
and Machine Intelligence, Vol. 41, No. 10, pp. cameras for fingerprint image
2511–2524, Oct. 2019. acquisition.
8.
• One camera provides high contrast,
Frustrated Total Internal Reflection
(FTIR) fingerprint images, and the
other outputs direct images of the
finger in contact with the platen.
GAPS IDENTIFIED
● From these Literature survey, it takes a lot of time to identify forensic forgeries.
● Manual fingerprint analysis lacks, requiring significant human intervention at every step of the authentication
process.
● Real crime scene fingerprint images are not used.
● Only specific type of fingerprint patten and only less fabricated fingerprint type is been identified.
PROPOSED METHOD
● Our proposed system introduces a novel approach to forensic authentication using fingerprint images through
Convolutional Neural Networks.
● By leveraging advanced machine learning techniques, our system aims to overcome the limitations of
traditional fingerprint analysis methods and offer several key advantages:
● Automated Analysis
● Enhanced Accuracy
● Reduces the risk of human error and strengthens the overall security of forensic
investigations.
FLOW CHART
DATASET USED
● Our dataset is publicly available on the Kaggle website, from the source of FVC (FVC2000 DB1, FVC2002
DB1, FCV2004), NISC (NISC27, NIST SD4), and LivDet (LivDet 2011,2017,2019), which consists of real
time crime scene fingerprints.
● From the above datasets, FVC contains 10,000 fingerprint images(both spoofing and genuine fingerprint
images) , NISC contains 15,450 fingerprint images and LivDet contains 5,200 fingerprint images(live and
spoofed fingerprint images). All the images are combined into a single file as 30,650 images for the purpose
of training and testing.
● These datasets serve as standardized benchmarks for evaluating fingerprint recognition systems and anti-
spoofing algorithms.
SPOOFING METHODS

Candle wax casts Silicone casts

Plasticine casts Gelatine casts


SOFTWARE REQUIREMENTS

● In our project, we utilize Python as the primary programming language, leveraging its simplicity and
readability.
● Specifically, we make use of the Anaconda distribution, which includes a comprehensive collection of
libraries and tools commonly used in data science and scientific computing.
● Libraries employed in our project includes:
i) numpy: For numerical computing.
ii) pandas: For data manipulation and analysis.
iii) cv2 (OpenCV): For computer vision tasks.
iv) matplotlib and seaborn: For data visualization.
RESULTS
Step 1: Open the Anaconda Prompt and navigate to the saved path of the folder.
Step 2: Copy the IP address and paste it into the address bar of Chrome.
Step 3: Once the front end is opened, upload the required fingerprint image.
Step 4: The results will be displayed as.
CONCLUSION

● In conclusion, the spoofed fingerprint is been detected based on machine learning


algorithm to recognize the fingerprint is real or spoofed from the crime region dataset
images.
● The proposed system demonstrates a promising approach for detecting actual and
altered fingerprints using behavioural biometrics.
● Our system achieves accurate classification performance by leveraging Modern
techniques for extracting features and machine learning algorithms, enhancing
security measures in diverse applications.
NOVELTY
● To overcome the manual error and also speeding up the process by identifying the
spoofing fingerprint.
REFERENCE
1. Qing Bao, Ya-Gang Wang, Chang Gao, Liangxiao Sha, and Feifie Lee, “A Coarse-to-Fine Approach for Rectifying Distorted
Latent Fingerprints From Crime Scenes”, IEEE Artificial International System, 18th December 2023, Vol: 11
2. Khan A.I., & Wani M.A., "Patch-based Segmentation of Latent Fingerprint Images Using Convolutional Neural
Network.", Applied Artificial Intelligence, 1–15(2018)
3. Cao K., Jain A.K., "Automated latent fingerprint recognition.", IEEE Transactions on Pattern Analysis and Machine
Intelligence, (2018).
4. Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi, “Enhancing
Fingerprint Forensics: A Gender Classification Based on Advanced Data-Centric AI Approaches and Multi-Database
Analysis”, Multidisciplinary Digital Publishing Institute, applied sciences, (2023), vol: 14
5. F. Liu, H. Liu, W. Zhang, G. Liu, L. Shen, “One-class fingerprint presentation attack detection using auto-encoder
network”, IEEE Trans. Image Process. 30 (2021) 2394–2407.
6. D.M. Uliyan, S. Sadeghi, H.A. Jalab, “Anti-spoofing method for fingerprint recognition using patch based deep learning
machine”, Eng. Sci. Technol. Int. J. 23 (2020) 264–273.
7. F. Liu, G. Liu, and X. Wang, "High-accurate and robust fingerprint anti- spoofing system using Optical Coherence
Tomography", Expe. Sys. Appl., Vol.130, pp.31-44, 2019.
8. Joshua J. Engelsma, Kai Cao, Anil K.Jain, “RaspiReader: Open Source Fingerprint Reader”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, Vol. 41, No. 10, pp. 2511–2524, Oct. 2019.
CONTd…
9. C. Yuan, Z. Xia, and L. Jiang, “Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization,”
P. Mishra, IEEE Access, vol. 7, pp. 26953–26966, 2019, doi: 10.1109/ACCESS.2019.2901235.
10. V. Varadharajan, S. Member, U. Tupakula, E. S. Pilli, and S. Member, “A Detailed Investigation and Analysis of Using
Machine Learning Techniques for Intrusion Detection,” IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 686–728, 2019,
doi: 10.1109/COMST.2018.2847722.
11. L. Almajmaie, O. N. Ucan, and O. Bayat, “Fingerprint recognition system based on modified multi-connect architecture
( MMCA ) Action editor : Peter Erdi,” ScienceDirect Cogn. Syst. Res., vol. 58, pp. 107–113, 2019, doi:
10.1016/j.cogsys.2019.05.004.
12. R. P. Krish, Julian Fierrez, Danial Ramos, Fernando Alonso Fernandez, Josef Bigun, "Improving automated latent fingerprint
identification using extended minutia types", Information Fusion, Vol.50, pp.9-19, 2019.
13. J. B. Kho, Wonjune Lee, Heeseung Choi, Jaihie Kim, "An incremental learning method for spoof fingerprint detection",
Expe. Sys. Appl., Vol.116, pp.52-64, 2019.
14. S.S. Ali, V.S. Baghel, I.I. Ganapathi, S. Prakash, “Robust biometric authentication system with a secure user template”,
Image Vis Comput. 104 (2020), 104004.
15. Z. Yu, C. Zhao, Z. Wang, Y. Qin, Z. Su, X. Li, F. Zhou, G. Zhao, “Searching central difference convolutional networks for
face anti-spoofing”, Conference on Computer Vision and Pattern Recognition (CVPR) -2020, 5295–5305.
16. D.M. Uliyan, S. Sadeghi, H.A. Jalab, “Anti-spoofing method for fingerprint recognition using patch based deep learning
machine”, Eng. Sci. Technol. Int. J. 23 (2020) 264–273.
THANK YOU

You might also like