=Paper=
{{Paper
|id=Vol-3084/paper6
|storemode=property
|title=Fingerprint Liveness Detection via Learning Multi-Modal Deep Features
|pdfUrl=https://ceur-ws.org/Vol-3084/paper6.pdf
|volume=Vol-3084
|authors=Chengsheng Yuan,Mingyu Chen
}}
==Fingerprint Liveness Detection via Learning Multi-Modal Deep Features==
Fingerprint Liveness Detection via Learning Multi-Modal
Deep Features
Chengsheng Yuan1,2 , Mingyu Chen1,2
1
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044
2
Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing
210044
Abstract
With the widespread application of fingerprint identification systems, fraudulent attacks based on forged fingerprints have
gradually increased, so it is very important to distinguish the authenticity of fingerprints. Fingerprint liveness detection tech-
nology was proposed to slove this problem. In order to effectively integrate advantages of existing algorithms, this paper
proposes an adaptive feature optimization module filtering distinctive multi-modal features. Firstly, we extract the ROI of fin-
gerprint images and unify them to the same size as subsequent input. Secondly, three convolutional neural networks(CNN)-
AlexNet, VGG16 and ResNet, are trained through processed images, whose the last fully connected layer as fingerprint
feature. Then genetic algorithm is used to assign different weights to extracted features through these networks, which
retain distinctive parts and eliminate invalid parts. Finally, considering that the features are extracted from CNN, optimized
features are input to the fully connected layer, and then fake fingerprints are identified by softmax function. Experiments
show that when feature dimensions of three networks output are 512, feature optimization module proposed can improve
the detection accuracy by an average of 1.0% in the 2011 Livdet database, which finds out the more different parts of features
extracted by the multi-modal network, enhancing fingerprint liveness detection performance.
Keywords
Fingerprint Liveness Detection, CNN, Genetic Algorithm, Multi-Modal
1. Introduction Clean and
undamaged
Residual
fingerprint
fingers samples
In a highly information-based modern society, peo-
Mould for
ple often need to use passwords for identity authentica- fingerprint
Capture
fingerprint
collection image
tion to obtain access to various accounts. Therefore, the Real fingerprint
password has become direct target of numerous hack- Repair and
Fake finger
enhance
ers [1]. News about economic losses of users caused -print film
fingerprint
by theft of various passwords is endless, which means
this traditional identity authentication scheme has se- Spoof the
fingerprint
Spoof the
fingerprint
Fake fingerprint
rious security risks. In order to solve this problem, system system
many new methods have been proposed and adopted, Collaborative forged fingerprint Non-cooperative forged fingerprint
such as USB KEY, SMS password, dynamic password, Figure 1: The process of making fake fingerprints. The left
etc. Among them, the authentication method based on picture is collaborative, requiring the cooperation of the user;
biometrics has been favored by people. Compared with the right picture is non-cooperative, where fingerprints are
other identity authentication methods, this method is forged by stealing fingerprint traces left by the user. Gener-
ally, collaborative methods can obtain higher-quality forged
simple, fast and reliable, so it has been used widely in
fingerprints.
all aspects of people’s social life. For instance, lots of
business units check attendance of employees through
fingerprint, customs in many countries will utilize fin-
gerprints to authenticate immigrants, and smartphones hand, people also can copy fake fingerprints for them-
use fingerprints to authenticate their identity or achieve selves to deceive the attendance system, as shown in
quick payment [2, 3, 4, 5]. Fig.1. These fake fingerprints can be made of silica gel,
However, fingerprint authentication also has certain gelatin, EcoFlex, Modasil and other materials. In addi-
security risks [6]. For the one hand, human fingerprints tion, with the development of deep learning technology,
are easily stolen and counterfeiters can imitate user fin- generative adversarial network can also generate suffi-
gerprints to achieve illegal authentication; For the other ciently realistic fingerprint images. Forged fingerprint
attacks are one of the biggest threats to fingerprint iden-
2021 International Workshop on Safety & Security of Deep Learning
tification systems, which greatly reduce the reliability
£ ycs_nuist@163.com (C. Yuan); cmyhhhh@163.com (M. Chen)
© 2021 Copyright for this paper by its authors. Use permitted under Creative of the system and put users’ private information at risk.
Commons License Attribution 4.0 International (CC BY 4.0).
CEUR
Workshop
Proceedings
http://ceur-ws.org
ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) Hence, as an important auxiliary algorithm of finger-
print identification system to identify authentic finger- 2.2. FLD based on texture features
prints, fingerprint liveness detection has become an aca-
Although fingerprint texture cannot be distinguished by
demic research hotspot now.
human eyes, it is a common feature in fingerprint im-
ages and represented by the gray distribution of center
2. Related Work pixels and neighboring pixels. Common texture feature
descriptors include Local Binary Pattern(LBP) [14], Bi-
Nowadays, fingerprint liveness detection(FLD) al- nary Statistical Image Feature(BSIF) [15], Local Phase
gorithms are mainly divided into two categories: Quantization(LPQ) [16], Histogram of Gradient Direc-
hardware-based FLD and software-based FLD [7]. The tion(HOG) [17], etc. Jhat [18] et al proposed FLD based
former uses additional professional equipment to iden- on gray-level independence to verify and distinguish the
tify the authenticity of fingerprint images by measuring liveness of fingerprints. Yuan [19] et al calculated pa-
skin temperature, conductivity, blood pressure, blood rameters of the co-occurrence matrix as features of the
oxygen and other vital signs. Although this method fingerprint image to authenticate fingerprints.
can achieve great detection accuracy, expensive equip-
ment is easy for illegal users to find loopholes because 2.3. FLD based on deep learning
of single identification method. With image process-
ing technology, the latter analyze the difference be- According to different classification tasks, deep neu-
tween real and fake fingerprint images for identification. ral networks can complete complex mapping and fea-
Compared with the former, the latter is more flexible, ture extraction through self-learning, which is simpler.
save costs, simplify operations and minimize additional Nogueira [20] et al introduced Convolutional Neural
equipment [8, 9, 10]. Therefore, this method is also the Network (CNN) technology to fingerprint liveness de-
current research focus of fingerprint liveness detection. tection. They designed a random model based on CNN
Existing software-based algorithms can be divided into as the feature extractor, took the preprocessed images
three categories: traditional FLD, FLD based on texture as the input and obtained the best detection results at
features and FLD based on deep learning. the time. While achieving better accuracy, CNN mod-
els also have some shortcomings. For example, a fixed-
scale input image must be used in the input layer. Al-
2.1. Traditional FLD
though cropping or scaling can solve the scale problem
The traditional fingerprint liveness detection algorithm well, they can easily lead to the loss of some key texture
designs an descriptor to extract distinctive features be- information and reduction of image resolution, thereby
tween real and fake fingerprint images through the weakening the generalization performance. To solve
heuristic algorithm. FLD based on sweat hole is the ear- this problem, Yuan [21] et al proposed a scale-equalized
liest proposed fingerprint liveness detection algorithm. deep convolutional neural network (DCNNISE) model
While recognizing high-resolution fingerprint images, utilizing the retained subtle texture information to fur-
the quality of artificial fingerprint images is often worse ther improve the detection performance of forged finger-
than that of the real. On account of rougher surface, de- prints. Moreover, the confusion matrix was applied to
tail of fake fingerprints is much weaker than the real. In FLD as performance indicator in the performance evalu-
consequence, Moon [11] et al proposed an idea of FLD ation for the first time. Zhang [22] et al further found
based on image quality, which denoises and reconstructs that CNN model used for multi-classification of natu-
fingerprint images by wavelet. The noise residuals be- ral images cannot obtain good accuracy in fingerprint
tween reconstructed and original images are calculated liveness detection, because it ignored the difference be-
to authenticate fingerprints. When the finger presses tween natural and fingerprint images and the shallower
and rotates on the sensor, real fingerprints can produce network structure cannot mine deep features of finger-
better elastic deformation than the fake. In consequence, prints. Therefore, they proposed a lightweight but pow-
Antonelli [12] et al proposed FLD based on fingerprint erful network structure Slim-ResCNN.At present, Agar-
skin elastic deformation for the first time. In the process wal S [23] et al found that existing FLD algorithms per-
of imitating fingerprints, sweat holes on the ridge of the formed well when test dataset and train dataset sample
finger’s epidermis are difficult to replicate. Accordingly, distribution are the same, but result of cross-sensor fin-
FLD based on sweat holes is proposed. Manivanan [13] gerprint liveness detection is bad. In order to enhance
et al used a high-pass filter to extract effective sweat hole the generalization, robustness and operability of FLD al-
features and a correlation filter to locate sweat holes. gorithm, they believed that the learning model need be
adaptive to the data and proposed a general EaZy model.
This adaptability in the context of cross-sensor datasets
embodies significant advantages.
AlexNet
In this paper, the main contributions are summarized
as follows:
(1) Multimodal fingerprint feature extraction Ac- VGG16
cording to different classification tasks, CNNs can Forged
complete complex mapping through self-learning Genuine
and extract high-level features of image. However, Res18
Genetic Feature
Selection Module
due to various depth and architecture of CNNs,
the characteristics of real and fake fingerprints ex-
tracted by different network models are quite dif-
Figure 2: A flow diagram of FLD via learning multi-modal
ferent, making the classifier have stronger perfor- deep features
mance. In order to integrate the excellent character-
istics of multiple CNNs, this paper attempts to use
multimodal neural network models to extract vari-
ous fingerprint features to make the difference be- image. By narrowing the gap between model output and
tween real and fake fingerprints more obvious. label, model parameters are updated until they converge
to a certain limit, thereby completing the complex map-
(2) Genetic optimization module Full concatenation ping from two-dimensional images to one-dimensional
of multi-dimensional features has big defects. In ad- features. The high-level features extracted by the deep
dition, the feature extraction method based on CNN neural network are excellent discriminativeness, show-
is similar to the black box operation, which means ing amazing performance in image recognition and clas-
extracted fingerprint features are not known, mak- sification. In the field of fingerprint liveness detection,
ing it impossible to determine the optimization di- CNN models can also achieve good identification re-
rection of features. In consequence, genetic algo- sults and become a research hotspot in this area, such
rithm is innovatively utilized to optimize extracted as AlexNet, VGG16, ResNet, etc. These networks have
fingerprint feature, which automatically select the many differences in the depth level of the model or the
obvious distinguishing part, so as to solve the prob- width level of the convolutional layer, and the learned
lem of unknown features. By imitating the genetic fingerprint features will also be multifarious. In order to
processes of life, such as crossover, mutation, and make full use of the merits of various networks, this pa-
selection, the optimal real and fake fingerprint fea- per concatenates features of multiple convolutional net-
tures are found in the fused feature space. Based works as general features of model reducing difficulty of
on the trained CNN feature extractors, initialized forged fingerprint detection.
feature populations are put into the fully connected
layer to calculate the fitness. Through mutation and Population
Initiaztion
crossover operators, excellent performance genetic Calculate
Selection
Crossover Mutation
information from parents is inherited and new genes Fitness
are generated, promoting feature evolution.
Get
Best
Feature
(3) Broad adaptability This paper carried out model
training and testing on 8 Livedet Datasets (2011,
2013) [24, 25]. In order to improve the stability Figure 3: Genetic optimization module in our method
and generalization of the trained model, some op-
erations were used to expand the training set, in-
cluding rotation, brightening and flipping. The ex- In the field of FLD, some scholars believe that to al-
perimental results show that the accuracy of finger- leviate the shortage of target samples, transfer learning
print liveness detection on multiple data sets is sig- needs to be applied to the model. [26] They use 1.2 mil-
nificantly improved in the highest accuracy of the lion ImageNet images (source task) to pre-train the con-
modal network, which proves the effectiveness and volutional network, and stochastic gradient descent is
wide adaptability of our model. used to optimize error losses. After training, all trained
parameters of the convolutional layer in the source task
are transferred to FLD. However, we think that this ap-
proach still loses part of the characteristics of the fin-
3. Methodology gerprint image, so the pre-training step should be aban-
doned. We select three classic CNNs——AlexNet, VGG16
3.1. Multimodal Deep Feature Learning and ResNet, as feature extractors, hoping to get features
Without expert knowledge, deep neural networks with different concerns. After training the CNN, freeze
have ability to automatically learn pixel distribution of network parameters and take out the penultimate fully
connected layer as extracted features. Since the different
dimensions of this layer will affect the output, fewer fea- Algorithm 1 Multimodal feature weight learning
tures are difficult to support the classification of true and Input: The dataset of fingerprint 𝐷; The size of
false fingerprints. In addition, more features can also initial population 𝑁 ; The fitness penalty value
make model training difficult and key features cannot be 𝑀; The maximum number of iterations 𝑇 ;
extracted. Therefore, we selected multiple dimensions Output: In 𝑇 generation, the feature chromosome
for experimentation, such as 256, 512 and 1024. with the greatest fitness;
1: Population Initizlization: Initialize 𝑁 chro-
3.2. Genetic Algorithm mosomes with a length of 𝑆, the value of which
is randomly generated 0 or 1;
Because excessive features will cause dimensional dis- 2: for 𝑖 = 1, ⋯ , 𝑇 do
asters, it is obviously not advisable to perform fully con- 3: Mutation: According to the evolutionary
nected operations for multiple features [27]. If only 4: probability, a gene of length L in chromos
some of the features are selected to construct the model, 5: -ome is reinitializedor reversed randomly.
the difficulty of the learning task can be reduced and the 6: Crossover: Two parents are selected from
interpretability of the model can also be increased. How- 7: the population for single-point crossover
ever, how to filter and process these characteristics is 8: to produce new offspring.
a big problem. Traditional feature selection algorithms 9: Fitness: Extract the fingerprint feature of
are proposed by researchers based on the analysis of 10: testset at the corresponding position in the
feature defects. For neural networks, unascertainty of 11: chromosome, whose accuracy is used as
feature extraction process masks the source of the fea- 12: the fitness.
ture. Genetic algorithms can adaptively find better solu- 13: Selection: The original fitness minus pena
tions from the feature space, without other selection al- 14: -lty value 𝑀 is used as the new fitness. The
gorithms. Better features are highlighted after a series of 15: roulette algorithm generates survival prob
biologically inspired operations, such as crossover, mu- 16: -ability of individual, which means poorly
tation, and selection. 17: adapted are more likely to be eliminated.
The genetic algorithm mainly includes five steps, as 18: end for
shown in fig.3. Firstly, with value of 0or 1, 𝑁 chromo-
somes are randomly generated as the initial population, The way where the proportion of the fitness of indi-
which is the same as feature length. 0 means discarding vidual chromosomes in the population is as the evolu-
the corresponding location feature value, and 1 means tion probability is called the roulette wheel algorithm.
selecting. Secondly, the single-layer fully connected Due to the high accuracy of the sub-network in the
layer as a classifier, the characteristics of the fingerprint model, the chromosomes with higher fitness cannot ob-
image at the corresponding position of the chromosome tain an advantage under the roulette wheel algorithm.
are separated for train and evaluation. Record the clas- So we take the lowest precision in the sub-network as
sification accuracy of the test set as fitness. Thirdly, ev- a penalty value, and highlight the gap between chromo-
ery chromosome in the existing population is selected as somes by introducing a fitness penalty value. Through
the parent chromosome with evolutionary probability to roulette wheel selection, chromosomes with high fitness
produce offspring. The evolution probability calculation are more likely to be retained as parental chromosomes,
formula is as follows: whose structural information is passed on to the off-
spring. Fourthly, on the basis of inheriting parental chro-
𝐹𝑖 − 𝑀 mosomes, offspring chromosomes will have mutations
𝑃𝑖 = 𝑁
, (1)
∑𝑖=0 (𝐹𝑖 − 𝑀) in a certain length of gene encoding. Some randomly
generated or inverted gene codes replace the original
where 𝐹𝑖 is the fitness of the 𝑖𝑡ℎ chromosome, 𝑁 is the part with a certain probability, which means that certain
number of chromosomes, 𝑃𝑖 is the probability that the features are reselected. The mutation of gene coding
𝑖𝑡ℎ chromosome is selected, and M is the fitness penalty provides the possibility of population evolution. Finally,
value. the roulette wheel selection method is utilized to select
parents with greater fitness for crossover from popula-
tion. Cut off the two parental chromosomes (divided
into upper and lower parts) at the same position, and ex-
change the upper parts to form two brand-new chromo-
somes. Each chromosome inherits powerful genes from
both parents. After the gene mutation and crossover of
the 𝑡 𝑡ℎ generation, many offspring will be produced and
combined with the parental chromosomes to form a new (small angle rotation, flip, zoom, and brightness), dataset
population. The 𝑘 chromosomes with the highest fitness is enhanced to train each sub-network (15 training
are selected as the (𝑡 + 1𝑡ℎ ) generation population and epochs with learning rate 0.0002). Then, freeze the net-
continue to evolve until the set generation threshold is work parameters as the feature extractor of our model.
reached. Choose the best-performing individual as the Next, the genetic algorithm is implemented in the fin-
optimal solution. gerprint features extracted by the above-mentioned sub-
network to find the parts with significant differences.
We set the initial population size N to 10, the maximum
4. Experiments evolutionary generation T to 20, and the mutation prob-
ability of each chromosome to 0.05. According to the
4.1. Dataset roulette algorithm to determine the probability of each
In this paper, LivDet 2011 and 2013 datasets are used chromosome being selected as a parent, all parents have
to conduct experiments. The entire data set includes a 50% probability of crossover operations with other par-
16470 images as the training set and 16439 images as the ents. In the selection operation, the roulette algorithm is
test set. Six different sensors (Biometrika, CrossMatch, still used to eliminate individuals with lower fitness and
Identix, etc.) are used for image acquisition. The fake maintain the population size N. The experimental results
fingerprint data set includes 9 different materials (Body- show that the accuracy of FLD is about 1% higher than
Double, EcoFlex, gelatin, latex, Silgum, WoodGlue, etc.) the highest in the sub-network after screening by ge-
to make fake fingerprint images. But the scale of the netic algorithm. The three sub-networks selected in this
image is different, so it is very necessary to unify the paper have the same structure as in the original paper,
size of the image. This paper solves the traditional oper- except that the dimensions of the final fully connected
ations that require cropping and zooming through ROI layer are changed. Table 2 shows that the accuracy of the
operations.The specific information of LivDet Datasets method proposed on the LivDet2011 dataset far exceeds
is shown in the following table: that of other algorithms. Although not every dataset
achieves the best accuracy on the LivDet2013 data set,
our method is not far from it and the average accuracy
Table 1
also has competitiveness.
Details of the LivDet datasets.
Image
Dataset Sensor train/test size 5. Conclusion
Biometrika(Bio) 2000/2000 312×372 Due to the difference in the depth and architecture
LivDet2011
DigitalPersona(Dig) 2004/2000 355×391 of CNN, the fingerprint features extracted by each net-
Italdata(Ita) 2000/2000 640×480 work are not the same. In order to combine their ad-
Sagem(Sag) 2016/2036 352×384 vantages, this paper concatenated the fingerprint fea-
tures extracted by multiple CNNs. In addition, the un-
Biometrika(Bio) 2000/2000 312×372
known feature of neural network extraction makes it im-
Italdata(Ita) 2000/2000 640×480
LivDet2013 possible to find the optimization direction of the connec-
Crossmatch(Cro) 2250/2250 800×750 tion feature. Regarding the issue above, we introduce a
Swipe(Swi) 2200/2153 208×1500 FLD algorithm based on multi-modal features, and uses
genetic algorithm to optimize these features. Through
genetic algorithm, concatenated features are optimized
adaptively and the difference features between real and
4.2. Performance evaluation ctiteria fake fingerprints are deeply mined. The experimental
In the field of fingerprint liveness detection, the aver- results show that after the optimization of the genetic
age classification error (ACE) is a widely accepted evalu- algorithm, the accuracy of FLD is improved by about 1%
ation standard. The ACE is defined as the average value on the basis of the highest accuracy of the sub-network.
of false reject rate (FRR) and false accept rate (FAR), cal- Compared with other FLD algorithms, our method also
culated as Eq.(2). has better accuracy and stability.
𝐹 𝑅𝑅 + 𝐹 𝐴𝑅
𝐴𝐶𝐸 =
2
, (2) Acknowledgement
Based on the original VGG16, AlexNet and In this paper, the two authors have equally im-
ResNet18 models, the final fully connected layer are portant contributions. This work is supported by
set to 512 dimensions.Through four different operations the National Key R& D Program of China under
Table 2
The Average Classification Error of different models when datasets are LivDet2011 and LivDet 2013 repectively.
Dataset Model The Average Classification Error ACE in (%)
Bio Dig Ita Sag Average
Ours 1.1 1.8 7.4 3.2 3.3
VGG16 [31] 2.1 2.6 8.4 4.4 4.3
AlexNet [31] 3 5.9 18.7 5.9 8.3
ResNet18 [33] 3.5 4.2 13.3 6 6.7
LivDet2011 CNN [28] 9.2 1.35 12.35 6.1 7.2
DRN [29] 9.6 1.9 13.5 6.4 7.8
MBLTP [32] 9.7 7.0 16.0 10.9 10.9
RWG [34] 5.7 6.2 9.4 3.14 6.11
LQF [35] 7.4 5.6 11.4 6.7 7.8
Bio Cro Ita Swi Ave
Ours 2.8 12.6 0.7 4.8 5.2
VGG16 [31] 3.1 37.4 1.1 6 11.9
AlexNet [31] 5.6 15 1.3 5.9 6.9
ResNet18 [33] 5.1 10.8 4.5 6.9 6.8
LivDet2013
CNN [28] 4.35 7 1.4 5.1 4.4
DBN [30] 1.15 7.91 1.35 6.5 4.2
RWG [34] 0.6 — 0.85 3.2 1.55
LQF [35] 5.8 5.2 4.3 14.2 7.4
DCMBP [36] 0 10.62 0.85 15.65 6.78
grant 2018YFB1003205; by the Jiangsu Basic Research [6] Schuckers S A C., Spoofing and anti-spoofing mea-
Programs-Natural Science Foundation under grant sures. Information Security Technical Report, vol.
BK20200807; by the Research Startup Foundation of 7, no. 4, pp.56-62, 2002.
NUIST 2020r015; by the Canada Research Chair Program [7] Nikam S B, Agarwal S, Texture and wavelet-based
and the NSERC Discovery Grant; by the Priority Aca- spoof fingerprint detection for fingerprint biomet-
demic Program Development of Jiangsu Higher Educa- ric systems Emerging Trends in Engineering and
tion Institutions (PAPD) fund; by the Collaborative Inno- Technology, 2008. ICETET’08. First International
vation Center of Atmospheric Environment and Equip- Conference on. IEEE, pp. 675-680, 2008: 675-680.
ment Technology (CICAEET) fund, China. [8] Abhyankar A S, Schuckers S C, A wavelet-based
approach to detecting liveness in fingerprint scan-
ners Defense and Security. International Society
References for Optics and Photonics, pp. 278-286, 2004.
[9] Schuckers S, Abhyankar A, Detecting liveness in
[1] Yambay D, Ghiani L, Denti P, Marcislis G L,
fingerprint scanners using wavelets: Results of
Roli F, and Schuckers S, Liv Det 2011-Fingerprint
the test dataset Biometric Authentication. Springer
liveness detection competition 2011. Iapr Interna-
Berlin Heidelberg, pp. 100-110, 2004: 100-110.
tional Conference on Biometrics. IEEE, April 2012,
[10] Zhang Y, Tian J, Chen X, et al, Fake finger detection
pp.208-215.
based on thin-plate spline distortion model Ad-
[2] Jia X, Yang X, Cao K, et al, Multi-scale local binary
vances in Biometrics. Springer Berlin Heidelberg,
pattern with filters for spoof fingerprint detection.
pp. 742-749, 2007.
Information Sciences: an International Journal, vol.
[11] Moon Y S, Chen J S, Chan K C, et al. Wavelet based
268, pp. 91-102, 2014.
fingerprint liveness detection. Electronics Letters,
[3] Maltoni D, Maio D, Jain A K, et al, Handbook of
2005, 41(20): 1112-1113.
fingerprint recognition. springer, 2009.
[12] Antonelli A, Cappelli R, Maio D, et al, A New Ap-
[4] Sousedik C, Busch C. Presentation attack detection
proach to Fake Finger Detection Based on Skin
methods for fingerprint recognition systems: a sur-
Distortion. Advances in Biometrics, International
vey. Biometrics Iet, vol. 3, no. 4, pp. 219-233, 2014.
Conference, ICB, 2006.
[5] Maltoni D, Maio D, Jain A K, et al.: Handbook of
[13] Manivanan N, Memon S, Balachandran W, Auto-
fingerprint recognition. Springer Science & Busi-
matic detection of active sweat pores of fingerprint
ness Media, 2009.
using highpass and correlation filtering. Electron- [27] Nogueira R F, Lotufo R.D.A and Machado R C,
ics letters, vol. 46, no. 18, pp. 1268-1269, 2010. ”Evaluating softwarebased fingerprint liveness de-
[14] Nikam, Agarwal.: Local binary pattern and tection using Convolutional Networks and Lo-
wavelet-based spoof fingerprint detection Interna- cal Binary Patterns,” Biometric Measurements and
tional Journal of Biometrics, 2008, 1, pp. 141-159. Systems for Security and Medical Applications.
[15] Kannala, Rahtu.: Bsif: Binarized statistical image IEEE, Rome, Italy, November, 2015, pp:22-29
features Proceedings of the 21st international con- [28] Yuan C , Xia Z , Sun X , et al. Deep Residual Net-
ference on pattern recognition (ICPR2012). IEEE, work with Adaptive Learning Framework for Fin-
2012, pp. 1363-1366. gerprint Liveness Detection[J]. IEEE Transactions
[16] Ghiani, Marcialis, Roli.: Fingerprint liveness de- on Cognitive and Developmental Systems, 2019,
tection by local phase quantization, Proceedings PP(99).
of the 21st International Conference on Pattern [29] Yuan, C., Xia, Z., Jiang, L., Cao, Y., Wu, Q. J., &
Recognition (ICPR2012). IEEE, 2012, pp. 537-540. Sun, X. (2019). Fingerprint liveness detection using
[17] Mohan, James.: Fingerprint Spoofing Detection us- an improved CNN with image scale equalization.
ing HOG and Local Binary Pattern International IEEE Access, 7, 26953-26966.
Journal of Advanced Research in Computer and [30] Kim, S., Park, B., Song, B. S., & Yang, S. (2016). Deep
Communication Engineering, 2017, 6, pp. 586-593. belief network based statistical feature learning for
[18] Nikam, Agarwal, Texture and wavelet-based spoof fingerprint liveness detection. Pattern Recognition
fingerprint detection for fingerprint biometric sys- Letters, 77, 58-65
tems. Emerging Trends in Engineering and Tech- [31] Nogueira, Rodrigo Frassetto, Roberto de Alencar
nology, 2008. ICETET’08. First International Con- Lotufo, and Rubens Campos Machado. Fingerprint
ference on. IEEE, pp. 675-680, 2008: 675-680. liveness detection using convolutional neural net-
[19] Yuan , Xia, Sun, et al, Fingerprint liveness detec- works. IEEE transactions on information forensics
tion using multiscale difference co-occurrence ma- and security 11.6 (2016): 1206-1213
trix. Optical Engineering, vol. 55, no. 6, 2016. [32] X. Jia, X. Yang, Y. Zang, N. Zhang, R. Dai, J. Tian
[20] Nogueira R F, Lotufo R.D.A., Machado R C, ”Finger- and J. Zhao, Multiscale block local ternary patterns
print Liveness Detection Using Convolutional Neu- for fingerprint vitality detection. Conference: Bio-
ral Networks,” IEEE Transactions on Information metrics (ICB), 2013 International Conference on,
Forensics & Security, Vol.11, No.6, pp.1206-1213, June, 2013(ICB), pp:1-6
June, 2016. [33] Szegedy C , Ioffe S , Vanhoucke V , et al. Inception-
[21] Yuan C , Xia Z , Sun X , et al. Deep Residual Net- v4, Inception-ResNet and the Impact of Residual
work with Adaptive Learning Framework for Fin- Connections on Learning[J]. 2016.
gerprint Liveness Detection[J]. IEEE Transactions [34] Xia, Zhihua, Lv, et al. Rotation-invariant Weber
on Cognitive and Developmental Systems, 2019, pattern and Gabor feature for fingerprint live-
PP(99). ness detection[J]. Multimedia Tools & Applica-
[22] Zhang Y, Shi D, Zhan X,et al. Slim-ResCNN: A deep tions, 2018.
Residual Convolutional Neural Network for Fin- [35] Sharma R P , Dey S . Fingerprint liveness detection
gerprint Liveness Detection[J]. IEEE Access, 2019, using local quality features[J]. The Visual Com-
PP(99):1-1. puter, 2018, 35(3).
[23] Agarwal S, Chowdary C R, Sourabh V. EaZy Learn- [36] Yuan C , Sun X , Wu Q . Difference co-occurrence
ing: An Adaptive Variant of Ensemble Learning for matrix using BP neural network for fingerprint
Fingerprint Liveness Detection. 2021. liveness detection[J]. Soft Computing, 2018.
[24] Yambay D, Ghiani L, Denti P, Marcialis G L, Roli
F and Schuckers S,”LivDet 2011-Fingerprint live-
ness detection competition 2011.” Iapr Interna-
tional Conference on Biometrics. IEEE, New Delhi,
India, April, 2012, pp.208-215.
[25] Ghiani L, Yambay D, Mura V, Tocco S, Marcialis
G L, Roli F and Schuckcrs S, ”Livdet 2013 finger-
print liveness detection competition 2013,” Biomet-
rics (ICB), 2013 International Conference on. IEEE,
June, 2013, pp.1-6.
[26] Samma H , Suandi S A . Transfer Learning of Pre-
Trained CNN Models for Fingerprint Liveness De-
tection[M]. 2020.