<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fingerprint Presentation Attacks: Tackling the Ongoing Arms Race in Biometric Authentication</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roberto Casula</string-name>
          <email>roberto.casula@unica.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonio Galli</string-name>
          <email>antonio.galli@unina.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michela Gravina</string-name>
          <email>michela.gravina@unina.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefano Marrone</string-name>
          <email>stefano.marrone@unina.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Mattiello</string-name>
          <email>do.mattiello@studenti.unina.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Micheletto</string-name>
          <email>marco.micheletto@unica.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giulia Orrù</string-name>
          <email>giulia.orru@unica.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gian Luca Marcialis</string-name>
          <email>marcialis@unica.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Carlo Sansone</string-name>
          <email>carlo.sansone@unina.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Cagliari</institution>
          ,
          <addr-line>Cagliari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Naples, Federico II</institution>
          ,
          <addr-line>Naples</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The widespread use of Automated Fingerprint Identification Systems (AFIS) in consumer electronics opens for the development of advanced presentation attacks, i.e. procedures designed to bypass an AFIS using a forged fingerprint. As a consequence, AFIS are often equipped with a fingerprint presentation attack detection (FPAD) module, to recognize live fingerprints from fake replicas, in order to both minimize the risk of unauthorized access and avoid pointless computations. The ongoing arms race between attackers and detector designers demands a comprehensive understanding of both the defender's and attacker's perspectives to develop robust and eficient FPAD systems. This paper proposes a dual-perspective approach to FPAD, which encompasses the presentation of a new technique for carrying out presentation attacks starting from perturbed samples with adversarial techniques and the presentation of a new detection technique based on an adversarial data augmentation strategy. In this case, attack and defence are based on the same assumptions demonstrating that this dual research approach can be exploited to enhance the overall security of fingerprint recognition systems against spoofing attacks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Fingerprint</kwd>
        <kwd>Presentation Attack Detection</kwd>
        <kwd>Convolutional Neural Networks</kwd>
        <kwd>Adversarial Perturbation</kwd>
        <kwd>Data Augmentation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        a set of algorithms designed to mislead a target CNN
by means of a specifically crafted noise. Using the same
principle, in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], we introduced ALD (Adversarial
Liveness Detector), whose core idea is to exploit adversarial
ifngerprint [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] as a way to perform data augmentation
in order to increase the model generalization ability.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Fingerprint Liveness Detection Competition</title>
      <p>60
50
40
()R30
%
E
C
P
A20
10
To support the research and development of increasingly
sophisticated presentation attack detectors on a common
experimental protocol, in 2009 the first Liveness Detec- Figure 2: Comparison between mean APCER on the
consention (LivDet) Competition1 [8] was started through the sual test set (C) and ScreenSpoof test set (SS) for LivDet2021.
collaboration of the University of Cagliari and Clarkson
University. LivDet is a biennial competition in which
participants from both academia and industry are
challenged to identify spoofs from live samples [9]. Each For this purpose, starting from LivDet 2019, the
evaluaedition has its own distinctive set of challenges that com- tion of integrated systems has also been introduced. This
petitors must overcome, such as the presence of diferent is a critical step since anti-spoofing algorithms are not
materials for the training and test sets (never-seen-before expected to work independently, and the integration may
materials) and the integration of FPADs into AFIS. These significantly influence the recognition system’s
perforchallenges have highlighted the arms race nature of fin- mance2 [11]. In this respect, the LivDet competition is
gerprint presentation attack detection. For example, a crucial in identifying diferent algorithms’ strengths and
new spoof fabrication technique, called ScreenSpoof [10], weaknesses and guiding the development of more robust
was introduced in LivDet2021, which highlighted the and eficient integrated systems. Designers can then use
ongoing vulnerability of modern FPADs to never-before- the knowledge resulting from each edition to improve
seen-before attacks, i.e. attacks unknown in the training their solutions.
phase of the classification model (Figure 2). The LivDet
competition is therefore based on the concept that to 3. Fingerprint Adversarial
design a robust and eficient FPAD system, both the
defender’s and attacker’s perspectives must be considered: Presentation Attack in the
the organizers put themselves in the shoes of the attack- Physical Domain
ers, allowing the competitors to assess the efectiveness
of the presented algorithms by simulating real-world at- Digital adversarial attacks have proven efective against
tacker scenarios. Another key point in the design of a modern AFISs, even when protected with an FPAD
modreliable FPAD is considering its integration with an AFIS. ule. In particular, this type aims to deceive the
AFIS/FPAD module using adversarial perturbations, i.e. small</p>
      <sec id="sec-2-1">
        <title>1https://livdet.diee.unica.it/</title>
      </sec>
      <sec id="sec-2-2">
        <title>2https://livdet.pythonanywhere.com/</title>
        <p>
          we took part in the LivDet 2021 [12] competition,
submitting a methodology to recognize counterfeit biometry
changes added to the fingerprint image designed to mis- from live ones and obtaining first place out of 23
parlead the system without being visually noticeable to a ticipants in the “Liveness Detection in Action track”. In
human observer. However, these digital attacks typically particular, the idea of the proposed solution is to leverage
assume access to the internal modules of the system, mak- adversarial fingerprints as a way to force the designed
ing them unrealistic. For this reason, we explored the CNN-based liveness detector to focus only on the most
threat level of physical adversarial attacks in a realistic important portions of the fingerprint, with the aim of
scenario where attackers cannot directly feed a digitally reducing the chance of it being misled by minor details.
perturbed image to the FPAD and they have to create a Indeed, adversarial perturbations are very suited for this
physical replica to breach the system through the sensor goal, as they tend to highlight such minor details that
[
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Figure 3 shows the process of creating the adver- tend to mislead the pad. To maximize this efect, it is
consarial presentation attack. Starting from the image of venient to use a gradient-based adversarial perturbation
a fake fingerprint it is possible to inject noise to obtain algorithm, in order to exploit the gradient with respect
an adversarial image considered live by a classifier. The to the input of the used CNN-based FPAD. Among all the
PA is obtained by printing the digital adversarial image ifngerprints adversarial algorithms, we made use of the
negative on a translucent sheet using a standard laser modified version of DeepFool [ 13] based on an eficient
printer and casting a silicone material on top of it (Figure iterative approach exploiting the network gradient of a
4). We evaluated the percentage of successful fingerprint locally linearized version of the loss. More in detail, we
adversarial presentation attacks on both white-box and further modified the perturbation strategy by not
interblack-box systems, with white-box systems referring to rupting the attack as soon as the target liveness detector
AFISs and FPADs in which the attacker has complete recognized a fake fingerprint as live with a probability
knowledge of the system architecture and parameters ≥ 70% and by amplifying the perturbation at each
iterand black-box systems referring to those in which the at- ation by a magnification factor of 103. As a result, we
tacker has no prior knowledge of the underlying system. obtained an attack success rate ≥ 99%, with every single
These experiments have highlighted the feasibility and fingerprint able to fool the FPAD with a confidence of at
danger of the attack. least 70%.
        </p>
        <p>
          However, using adversarial fingerprints as an ad-hoc
data augmentation strategy is not trivial, as a target
CNN4. Adversarial Liveness Detector based FPAD is needed to craft the adversarial fingerprints
and it is important to not cause the final model to be
overALD represents the deep learning-based fingerprint live- iftted to the adversarial samples. In ALD, we designed
ness detection proposed in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], whose aim is to exploit the an iterative training procedure consisting of three main
experience matured as attackers to design an ad-hoc ad- steps: we first train a CNN-based FPAD on the clean
versarial data augmentation strategy intended to increase (i.e. non adversarially perturbed) fingerprint data, we
the efectiveness of CNN-based presentation attack detec- then generate the adversarial fingerprints as described
tion. To test the efectiveness of the proposed approach, above by using the target CNN FPAD as LD, and repeat
5. Conclusions
the training by also adding the adversarial fingerprint to
the training data with their original label (i.e. the
preperturbation class), as we want to make the FPAD more Fingerprint Presentation Attack Detection (FPAD) is
conrobust. The result is an adversarial data augmentation sidered an arms race problem due to the continuous and
schema, summarized in Figure 5, where adversarial at- dynamic struggle between attackers who develop novel
tacks are exploited to improve the network generalization techniques to deceive fingerprint recognition systems
ability. and defenders who design and improve FPAD methods
        </p>
        <p>
          The performance obtained in the LivDet 2021 [12] in- to counter these threats. For this reason, the dual
apternational competition proved the efectiveness of the proach that considers the two points of view during the
methodology proposed in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and highlighted the signifi- design of FPADs and their integration into AFIS is
crucant contribution of adversarial perturbation techniques cial to discover unknown vulnerabilities and fix them.
to the generalization capacity of the CNNs considered as Our experience in the international competition LivDet
FPAD. In future works we will further investigate the use as organizers, for the University of Cagliari, and as
parof adversarial fingerprints in the context of both liveness ticipants, for the University of Naples Federico II, has
detection and subject matching, trying to understand allowed us to highlight this aspect. Moreover, in this
whether this experience can be used also to support or paper, we have presented a case of dual approach in the
against impersonification attacks. FPAD related to the exploitation of spoofs obtained with
adversarial processes: we have shown that it is possible to
start from the analysis of the danger deriving from a new
attack technique, in this case the adversarial presentation
attack, a defence technique can be designed.
[8] G. L. Marcialis, F. Roli, Liveness detection
competition 2009, Biometric Technology Today 17 (2009)
7–9.
[9] M. Micheletto, G. Orrù, R. Casula, D. Yambay,
        </p>
        <p>G. L. Marcialis, S. Schuckers, Review of the
Fingerprint Liveness Detection (LivDet) Competition
Series: From 2009 to 2021, Springer Nature
Singapore, Singapore, 2023, pp. 57–76. URL: https://doi.
org/10.1007/978-981-19-5288-3_3. doi:10.1007/
978-981-19-5288-3_3.
[10] R. Casula, M. Micheletto, G. Orrú, G. L. Marcialis,</p>
        <p>F. Roli, Towards realistic fingerprint presentation
attacks: The screenspoof method, Pattern
Recognition Letters (2022). URL: https://www.sciencedirect.
com/science/article/pii/S0167865522002653.
doi:https://doi.org/10.1016/j.patrec.</p>
        <p>2022.09.002.
[11] M. Micheletto, G. L. Marcialis, G. Orrù, F. Roli,
Fingerprint recognition with embedded presentation
attacks detection: are we ready?, IEEE Transactions
on Information Forensics and Security 16 (2021)
5338–5351.
[12] R. Casula, M. Micheletto, G. Orrù, R. Delussu,</p>
        <p>S. Concas, A. Panzino, G. L. Marcialis, Livdet 2021
ifngerprint liveness detection competition-into the
unknown, in: 2021 IEEE International Joint
Conference on Biometrics (IJCB), IEEE, 2021, pp. 1–6.
[13] S.-M. Moosavi-Dezfooli, A. Fawzi, P. Frossard,</p>
        <p>Deepfool: a simple and accurate method to fool
deep neural networks, in: Proceedings of the IEEE
Conference on Computer Vision and Pattern
Recognition, 2016, pp. 2574–2582.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Marcel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Nixon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fiérrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. W. D.</given-names>
            <surname>Evans</surname>
          </string-name>
          (Eds.),
          <source>Handbook of Biometric Anti-Spoofing - Presentation Attack Detection</source>
          , Second Edition, Advances in Computer Vision and Pattern Recognition, Springer,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .1007/ 978-3-
          <fpage>319</fpage>
          -92627-8.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Akhtar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Micheloni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Foresti</surname>
          </string-name>
          ,
          <article-title>Biometric liveness detection: Challenges and research opportunities</article-title>
          ,
          <source>IEEE Security &amp; Privacy</source>
          <volume>13</volume>
          (
          <year>2015</year>
          )
          <fpage>63</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ghiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Yambay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Mura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Marcialis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Roli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Schuckers</surname>
          </string-name>
          ,
          <article-title>Review of the fingerprint liveness detection (livdet) competition series: 2009 to 2015, Image</article-title>
          and
          <source>Vision Computing</source>
          <volume>58</volume>
          (
          <year>2017</year>
          )
          <fpage>110</fpage>
          -
          <lpage>128</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Chugh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <article-title>Fingerprint spoof buster: Use of minutiae-centered patches</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          <volume>13</volume>
          (
          <year>2018</year>
          )
          <fpage>2190</fpage>
          -
          <lpage>2202</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Marrone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sansone</surname>
          </string-name>
          ,
          <article-title>Adversarial perturbations against fingerprint based authentication systems</article-title>
          , in: 2019
          <source>International Conference on Biometrics (ICB)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Marrone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sansone</surname>
          </string-name>
          ,
          <article-title>On the transferability of adversarial perturbation attacks against fingerprint based authentication systems</article-title>
          ,
          <source>Pattern Recognition Letters</source>
          <volume>152</volume>
          (
          <year>2021</year>
          )
          <fpage>253</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Galli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gravina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Marrone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mattiello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sansone</surname>
          </string-name>
          ,
          <article-title>Adversarial liveness detector: Leveraging adversarial perturbations in fingerprint liveness detection</article-title>
          ,
          <source>IET Biometrics</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>