Skip to main content
Top

2017 | OriginalPaper | Chapter

12. Deep Triplet Embedding Representations for Liveness Detection

Authors : Federico Pala, Bir Bhanu

Published in: Deep Learning for Biometrics

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Liveness detection is a fundamental element for all biometric systems that have to be safe against spoofing attacks at sensor level. In particular, for an attacker it is relatively easy to build a fake replica of a legitimate finger and apply it directly to the sensor, thereby fooling the system by declaring its corresponding identity. In order to ensure that the declared identity is genuine and it corresponds to the individual present at the time of capture, the task is usually formulated as a binary classification problem, where a classifier is trained to detect whether the fingerprint at hand is real or an artificial replica. In this chapter, unlike the binary classification model, a metric learning approach based on triplet convolutional networks is proposed. A representation of the fingerprint images is generated, where the distance between feature points reflects how much the real fingerprints are dissimilar from the ones generated artificially. A variant of the triplet objective function is employed, that considers patches taken from two real fingerprint and a replica (or two replicas and a real fingerprint), and gives a high penalty if the distance between the matching couple is greater than the mismatched one. Given a test fingerprint image, its liveness is established by matching its patches against a set of reference genuine and fake patches taken from the training set. The use of small networks along with a patch-based representation allows the system to perform the acquisitions in real time and provide state-of-the-art performances. Experiments are presented on several benchmark datasets for liveness detection including different sensors and fake fingerprint materials. The approach is validated on the cross-sensor and cross-material scenarios, to understand how well it generalizes to new acquisition devices, and how robust it is to new presentation attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference A.K. Jain, A. Ross, S. Pankanti, Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)CrossRef A.K. Jain, A. Ross, S. Pankanti, Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)CrossRef
2.
go back to reference M. Martinez-Diaz, J. Fierrez, J. Galbally, J. Ortega-Garcia, An evaluation of indirect attacks and countermeasures in fingerprint verification systems. Pattern Recogn. Lett. 32(12), 1643–1651 (2011)CrossRef M. Martinez-Diaz, J. Fierrez, J. Galbally, J. Ortega-Garcia, An evaluation of indirect attacks and countermeasures in fingerprint verification systems. Pattern Recogn. Lett. 32(12), 1643–1651 (2011)CrossRef
3.
go back to reference T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of artificial “gummy” fingers on fingerprint systems. Proc. Conf. Opt. Secur. Counterfeit Deterrence Tech. 4677, 275–289 (2002) T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of artificial “gummy” fingers on fingerprint systems. Proc. Conf. Opt. Secur. Counterfeit Deterrence Tech. 4677, 275–289 (2002)
4.
go back to reference L. Ghiani, D.A. Yambay, V. Mura, G.L. Marcialis, F. Roli, S.A. Schuckers, Review of the fingerprint liveness detection (livdet) competition series: 2009 to 2015. Image and Vision Computing (2016) (in press) L. Ghiani, D.A. Yambay, V. Mura, G.L. Marcialis, F. Roli, S.A. Schuckers, Review of the fingerprint liveness detection (livdet) competition series: 2009 to 2015. Image and Vision Computing (2016) (in press)
5.
go back to reference C. Sousedik, C. Busch, Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biom. 3(4), 219–233 (2014)CrossRef C. Sousedik, C. Busch, Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biom. 3(4), 219–233 (2014)CrossRef
6.
go back to reference J. Galbally, S. Marcel, J. Fierrez, Biometric antispoofing methods: a survey in face recognition. IEEE Access 2, 1530–1552 (2014)CrossRef J. Galbally, S. Marcel, J. Fierrez, Biometric antispoofing methods: a survey in face recognition. IEEE Access 2, 1530–1552 (2014)CrossRef
7.
go back to reference G.L. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, S. Schuckers, First international fingerprint liveness detection competition – livdet 2009, in Proceedings of the International Conference on Image Analysis and Processing (ICIAP, 2009) (Springer, Berlin, 2009), pp. 12–23CrossRef G.L. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, S. Schuckers, First international fingerprint liveness detection competition – livdet 2009, in Proceedings of the International Conference on Image Analysis and Processing (ICIAP, 2009) (Springer, Berlin, 2009), pp. 12–23CrossRef
8.
go back to reference D. Menotti, G. Chiachia, A. Pinto, W.R. Schwartz, H. Pedrini, A.X. Falcao, A. Rocha, Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864–879 (2015)CrossRef D. Menotti, G. Chiachia, A. Pinto, W.R. Schwartz, H. Pedrini, A.X. Falcao, A. Rocha, Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864–879 (2015)CrossRef
9.
go back to reference R.F. Nogueira, R. de Alencar Lotufo, R.C. Machado, Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206–1213 (2016)CrossRef R.F. Nogueira, R. de Alencar Lotufo, R.C. Machado, Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206–1213 (2016)CrossRef
10.
go back to reference S. Kim, B. Park, B.S. Song, S. Yang, Deep belief network based statistical feature learning for fingerprint liveness detection. Pattern Recogn. Lett. 77, 58–65 (2016)CrossRef S. Kim, B. Park, B.S. Song, S. Yang, Deep belief network based statistical feature learning for fingerprint liveness detection. Pattern Recogn. Lett. 77, 58–65 (2016)CrossRef
11.
go back to reference A. Krizhevsky, I. Sutskever, G.E. Hinton, Imagenet classification with deep convolutional neural networks, in Conference on Advances in Neural Information Processing Systems (NIPS, 2012) (2012), pp. 1097–1105 A. Krizhevsky, I. Sutskever, G.E. Hinton, Imagenet classification with deep convolutional neural networks, in Conference on Advances in Neural Information Processing Systems (NIPS, 2012) (2012), pp. 1097–1105
12.
go back to reference Y. LeCun, Y. Bengio, G. Hinton, Deep learning. Nature 521(7553), 436–444 (2015)CrossRef Y. LeCun, Y. Bengio, G. Hinton, Deep learning. Nature 521(7553), 436–444 (2015)CrossRef
14.
go back to reference E. Hoffer, N. Ailon, Deep metric learning using triplet network, in Proceedings of the International Workshop on Similarity-Based Pattern Recognition (SIMBAD, 2015) (Springer, Berlin, 2015), pp. 84–92CrossRef E. Hoffer, N. Ailon, Deep metric learning using triplet network, in Proceedings of the International Workshop on Similarity-Based Pattern Recognition (SIMBAD, 2015) (Springer, Berlin, 2015), pp. 84–92CrossRef
15.
go back to reference J. Bromley, J.W. Bentz, L. Bottou, I. Guyon, Y. LeCun, C. Moore, E. Säckinger, R. Shah, Signature verification using a “siamese” time delay neural network. Int. J. Pattern Recognit. Artif. Intell. 7(04), 669–688 (1993)CrossRef J. Bromley, J.W. Bentz, L. Bottou, I. Guyon, Y. LeCun, C. Moore, E. Säckinger, R. Shah, Signature verification using a “siamese” time delay neural network. Int. J. Pattern Recognit. Artif. Intell. 7(04), 669–688 (1993)CrossRef
16.
go back to reference P. Wohlhart, V. Lepetit, Learning descriptors for object recognition and 3D pose estimation, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2015) (2015), pp. 3109–3118 P. Wohlhart, V. Lepetit, Learning descriptors for object recognition and 3D pose estimation, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2015) (2015), pp. 3109–3118
17.
go back to reference D. Cheng, Y. Gong, S. Zhou, J. Wang, N. Zheng, Person re-identification by multi-channel parts-based cnn with improved triplet loss function, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2016) (2016) D. Cheng, Y. Gong, S. Zhou, J. Wang, N. Zheng, Person re-identification by multi-channel parts-based cnn with improved triplet loss function, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR, 2016) (2016)
18.
go back to reference D. Yambay, L. Ghiani, P. Denti, G.L. Marcialis, F. Roli, S. Schuckers, Livdet 2011 - fingerprint liveness detection competition 2011, in Proceedings of the IAPR International Conference on Biometrics (ICB, 2011) (2012), pp. 208–215 D. Yambay, L. Ghiani, P. Denti, G.L. Marcialis, F. Roli, S. Schuckers, Livdet 2011 - fingerprint liveness detection competition 2011, in Proceedings of the IAPR International Conference on Biometrics (ICB, 2011) (2012), pp. 208–215
19.
go back to reference L. Ghiani, D. Yambay, V. Mura, S. Tocco, G.L. Marcialis, F. Roli, S. Schuckcrs, Livdet 2013 fingerprint liveness detection competition 2013, in Proceedings of the International Conference on Biometrics (ICB, 2013) (2013), pp. 1–6 L. Ghiani, D. Yambay, V. Mura, S. Tocco, G.L. Marcialis, F. Roli, S. Schuckcrs, Livdet 2013 fingerprint liveness detection competition 2013, in Proceedings of the International Conference on Biometrics (ICB, 2013) (2013), pp. 1–6
20.
21.
go back to reference K. Seifried, Biometrics-what you need to know. Secur. Portal 10 (2001) K. Seifried, Biometrics-what you need to know. Secur. Portal 10 (2001)
22.
go back to reference D. Baldisserra, A. Franco, D. Maio, D. Maltoni, Fake fingerprint detection by odor analysis, in Proceedings of the International Conference on Biometrics (ICB, 2006) (Springer, Berlin, 2006), pp. 265–272CrossRef D. Baldisserra, A. Franco, D. Maio, D. Maltoni, Fake fingerprint detection by odor analysis, in Proceedings of the International Conference on Biometrics (ICB, 2006) (Springer, Berlin, 2006), pp. 265–272CrossRef
23.
go back to reference P.V. Reddy, A. Kumar, S.M.K. Rahman, T.S. Mundra, A new antispoofing approach for biometric devices. IEEE Trans. Biomed. Circuits Syst. 2(4), 328–337 (2008)CrossRef P.V. Reddy, A. Kumar, S.M.K. Rahman, T.S. Mundra, A new antispoofing approach for biometric devices. IEEE Trans. Biomed. Circuits Syst. 2(4), 328–337 (2008)CrossRef
24.
go back to reference A. Antonelli, R. Cappelli, D. Maio, D. Maltoni, Fake finger detection by skin distortion analysis. IEEE Trans. Inf. Forensics Secur. 1(3), 360–373 (2006)CrossRef A. Antonelli, R. Cappelli, D. Maio, D. Maltoni, Fake finger detection by skin distortion analysis. IEEE Trans. Inf. Forensics Secur. 1(3), 360–373 (2006)CrossRef
25.
go back to reference R. Derakhshani, S.A.C. Schuckers, L.A. Hornak, L. O’Gorman, Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recogn. 36(2), 383–396 (2003)CrossRef R. Derakhshani, S.A.C. Schuckers, L.A. Hornak, L. O’Gorman, Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recogn. 36(2), 383–396 (2003)CrossRef
26.
go back to reference B. Tan, S. Schuckers, Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshop (CVPRW, 2006) (IEEE, 2006), p. 26 B. Tan, S. Schuckers, Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshop (CVPRW, 2006) (IEEE, 2006), p. 26
27.
go back to reference S.B. Nikam, S. Agarwal, Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems, in Proceedings of the International Conference on Emerging Trends in Engineering and Technology (ICETET, 2008) (IEEE, 2008), pp. 675–680 S.B. Nikam, S. Agarwal, Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems, in Proceedings of the International Conference on Emerging Trends in Engineering and Technology (ICETET, 2008) (IEEE, 2008), pp. 675–680
28.
go back to reference L. Ghiani, A. Hadid, G.L. Marcialis, F. Roli, Fingerprint liveness detection using binarized statistical image features, in Proceedings of the International Conference on Biometrics Theory, Applications and Systems (BTAS, 2013) (IEEE, 2013), pp. 1–6 L. Ghiani, A. Hadid, G.L. Marcialis, F. Roli, Fingerprint liveness detection using binarized statistical image features, in Proceedings of the International Conference on Biometrics Theory, Applications and Systems (BTAS, 2013) (IEEE, 2013), pp. 1–6
29.
go back to reference D. Gragnaniello, G. Poggi, C. Sansone, L. Verdoliva, Local contrast phase descriptor for fingerprint liveness detection. Pattern Recogn. 48(4), 1050–1058 (2015)CrossRef D. Gragnaniello, G. Poggi, C. Sansone, L. Verdoliva, Local contrast phase descriptor for fingerprint liveness detection. Pattern Recogn. 48(4), 1050–1058 (2015)CrossRef
30.
go back to reference D. Gragnaniello, G. Poggi, C. Sansone, L. Verdoliva, An investigation of local descriptors for biometric spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 849–863 (2015)CrossRef D. Gragnaniello, G. Poggi, C. Sansone, L. Verdoliva, An investigation of local descriptors for biometric spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 849–863 (2015)CrossRef
31.
go back to reference I. Kokkinos, M. Bronstein, A. Yuille, Dense Scale Invariant Descriptors for Images and Surfaces. Research report RR-7914, INRIA (2012) I. Kokkinos, M. Bronstein, A. Yuille, Dense Scale Invariant Descriptors for Images and Surfaces. Research report RR-7914, INRIA (2012)
33.
go back to reference R. Olga, D. Jia, S. Hao, K. Jonathan, S. Sanjeev, M. Sean, H. Zhiheng, K. Andrej, K. Aditya, B. Michael, C.B. Alexander, F. Li, Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211–252 (2015)MathSciNetCrossRef R. Olga, D. Jia, S. Hao, K. Jonathan, S. Sanjeev, M. Sean, H. Zhiheng, K. Andrej, K. Aditya, B. Michael, C.B. Alexander, F. Li, Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115(3), 211–252 (2015)MathSciNetCrossRef
34.
go back to reference E. Marasco, P. Wild, B. Cukic, Robust and interoperable fingerprint spoof detection via convolutional neural networks (hst 2016), in Proceedings of the IEEE Symposium on Technologies for Homeland Security (2016), pp. 1–6 E. Marasco, P. Wild, B. Cukic, Robust and interoperable fingerprint spoof detection via convolutional neural networks (hst 2016), in Proceedings of the IEEE Symposium on Technologies for Homeland Security (2016), pp. 1–6
35.
go back to reference C. Wang, K. Li, Z. Wu, Q. Zhao, A DCNN Based Fingerprint Liveness Detection Algorithm with Voting Strategy (Springer International Publishing, Cham, 2015). pp. 241–249CrossRef C. Wang, K. Li, Z. Wu, Q. Zhao, A DCNN Based Fingerprint Liveness Detection Algorithm with Voting Strategy (Springer International Publishing, Cham, 2015). pp. 241–249CrossRef
36.
go back to reference G.E. Hinton, Training products of experts by minimizing contrastive divergence. Neural Comput. 14(8), 1771–1800 (2002)CrossRef G.E. Hinton, Training products of experts by minimizing contrastive divergence. Neural Comput. 14(8), 1771–1800 (2002)CrossRef
38.
go back to reference S. Ioffe, C. Szegedy, Batch normalization: accelerating deep network training by reducing internal covariate shift, in Proceedings of the International Conference on Machine Learning (ICML, 2015) (2015), p. 37 S. Ioffe, C. Szegedy, Batch normalization: accelerating deep network training by reducing internal covariate shift, in Proceedings of the International Conference on Machine Learning (ICML, 2015) (2015), p. 37
39.
go back to reference N. Srivastava, G.E. Hinton, A. Krizhevsky, I. Sutskever, R. Salakhutdinov, Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929–1958 (2014)MathSciNetMATH N. Srivastava, G.E. Hinton, A. Krizhevsky, I. Sutskever, R. Salakhutdinov, Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929–1958 (2014)MathSciNetMATH
40.
go back to reference J. Wang, J. Zucker, Solving multiple-instance problem: a lazy learning approach (2000), pp. 1119–1126 J. Wang, J. Zucker, Solving multiple-instance problem: a lazy learning approach (2000), pp. 1119–1126
41.
go back to reference R. Collobert, K. Kavukcuoglu, C. Farabet, Torch7: a matlab-like environment for machine learning, in BigLearn, NIPS Workshop (2011) R. Collobert, K. Kavukcuoglu, C. Farabet, Torch7: a matlab-like environment for machine learning, in BigLearn, NIPS Workshop (2011)
42.
go back to reference Y. Bengio, Practical recommendations for gradient-based training of deep architectures, in Neural Networks: Tricks of the Trade (Springer, Berlin, 2012), pp. 437–478 Y. Bengio, Practical recommendations for gradient-based training of deep architectures, in Neural Networks: Tricks of the Trade (Springer, Berlin, 2012), pp. 437–478
44.
go back to reference L. van der Maaten, G. Hinton, Visualizing data using t-sne. J. Mach. Learn. Res. 9, 2579–2605 (2008)MATH L. van der Maaten, G. Hinton, Visualizing data using t-sne. J. Mach. Learn. Res. 9, 2579–2605 (2008)MATH
Metadata
Title
Deep Triplet Embedding Representations for Liveness Detection
Authors
Federico Pala
Bir Bhanu
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-61657-5_12

Premium Partner