0% found this document useful (0 votes)
90 views3 pages

Deep Representations For Iris, Face, and Fingerprint Spoofing Detection

This paper presents two deep learning approaches for spoofing detection in iris, face, and fingerprint biometrics. The first approach optimizes convolutional network architectures to learn suitable representations for each biometric domain. The second approach focuses on learning the weights of a given network architecture via backpropagation. The paper investigates these two approaches and examines their interplay when combined, finding they can provide outstanding spoofing detection performance with very limited prior knowledge about biometric spoofing attacks.

Uploaded by

Anonymous 1aqlkZ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views3 pages

Deep Representations For Iris, Face, and Fingerprint Spoofing Detection

This paper presents two deep learning approaches for spoofing detection in iris, face, and fingerprint biometrics. The first approach optimizes convolutional network architectures to learn suitable representations for each biometric domain. The second approach focuses on learning the weights of a given network architecture via backpropagation. The paper investigates these two approaches and examines their interplay when combined, finding they can provide outstanding spoofing detection performance with very limited prior knowledge about biometric spoofing attacks.

Uploaded by

Anonymous 1aqlkZ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

ABSTRACT

This paper presents Biometrics systems have significantly improved person identification
and authentication, playing an important role in personal, national, and global security. However,
these systems might be deceived (or spoofed) and, despite the recent advances in spoofing
detection, current solutions often rely on domain knowledge, specific biometric reading systems,
and attack types. We assume a very limited knowledge about biometric spoofing at the sensor to
derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on
two deep learning approaches.

Objective

Our approach is based on consists of learning suitable convolutional network


architectures for eachdomain, whereas the second approach focuses on learning the weights of
the network via back propagation.

Introduction

Biometrics human characteristics and traits can successfully allow people identification
and authentication and have been widely used for access control, surveillance, and also in
national and global security systems [1]. In the last few years, due to the recent technological
improvements for data acquisition, storage and processing, and also the scientific advances in
computer vision, pattern recognition and machine learning, several biometric modalities have
been largely applied to person recognition, ranging from traditional fingerprint to face, to iris,
and, more recently, to vein and blood flow. Simultaneously, various spoofing attacks techniques
have been created to defeat such biometric systems.

SOFTWARE AND HARDWARE REQUIREMENTS

 Operating system : Windows XP/7.


 Coding Language : MATLAB
 Tool : MATLAB R 2012

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

 System : Pentium IV 2.4 GHz.


 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.

METHODOLOGY(Enhance)

Proposed method

To keep a good level of security, reliable spoofing detection tools are necessary,
preferably implemented as software modules. The research in this field is very active, with local
descriptors, based on the analysis of micro textural features, gaining more and more popularity,
because of their excellent performance and flexibility. This paper aims at assessing the potential
of these descriptors for the liveness detection task in authentication systems based on various
biometric traits: fingerprint, iris, and face. Besides compact descriptors based on the independent
quantization of features, already considered for some liveness detection tasks, we will study
promising descriptors based on the joint quantization of rich local features. The experimental
analysis, conducted on publicly available data sets and in fully reproducible modality, confirms
the potential of these tools for biometric applications, and points out possible lines of
development toward further improvements..
Conclusion

we investigated two deep representation research approaches for detecting spoofing in


different biometric modalities. On one hand, we approached the problem by learning
representations directly from the data through architecture optimization with a final decision-
making step atop the representations. On the other, we sought to learn filter weights for a given
architecture using the well-known backpropagation algorithm. As the two approaches might
seem naturally connected, we also examined their interplay when taken together.

You might also like