Title :
Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials
Author :
Rattani, Ajita ; Scheirer, Walter J. ; Ross, Arun
Author_Institution :
Department of Computer Science and Engineering, University of Missouri???Kansas City, Kansas City, MO, USA
Abstract :
A fingerprint spoof detector is a pattern classifier that is used to distinguish a live finger from a fake (spoof) one in the context of an automated fingerprint recognition system. Most spoof detectors are learning-based and rely on a set of training images. Consequently, the performance of any such spoof detector significantly degrades when encountering spoofs fabricated using novel materials not found in the training set. In real-world applications, the problem of fingerprint spoof detection must be treated as an open set recognition problem where incomplete knowledge of the fabrication materials used to generate spoofs is present at training time, and novel materials may be encountered during system deployment. To mitigate the security risk posed by novel spoofs, this paper introduces: 1) the use of the Weibull-calibrated SVM (W-SVM), which is relatively robust for open set recognition, as a novel-material detector and a spoof detector and 2) a scheme for the automatic adaptation of the W-SVM-based spoof detector to new spoof materials that leverages interoperability across classifiers. Experiments conducted on new partitions of the LivDet 2011 database designed for open set evaluation suggest: 1) a 97% increase in the error rate of the existing spoof detectors when tested using new spoof materials and 2) up to 44% improvement in spoof detection performance across spoof materials when the proposed adaptive approach is used.
Keywords :
Databases; Detectors; Fabrication; Feature extraction; Support vector machines; Training; Training data; Fingerprint Spoofing; Fingerprint spoofing; Open Set Recognition; Presentation Attacks; Spoof Detection; Statistical Learning; open set recognition; presentation attacks; spoof detection; statistical learning;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2015.2464772