Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?

التفاصيل البيبلوغرافية
العنوان: Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?
المؤلفون: Fabio Roli, Marco Micheletto, Gian Luca Marcialis, Giulia Orrù
المصدر: IEEE Transactions on Information Forensics and Security. 16:5338-5351
بيانات النشر: Institute of Electrical and Electronics Engineers (IEEE), 2021.
سنة النشر: 2021
مصطلحات موضوعية: Spoofing, FOS: Computer and information sciences, Computer Science - Cryptography and Security, Computer Networks and Communications, Computer science, Computer Vision and Pattern Recognition (cs.CV), Computer Science - Computer Vision and Pattern Recognition, Fingerprint Verification Competition, Fingerprint recognition, Machine learning, computer.software_genre, Tools, Software, Need to know, Safety, Risk, Reliability and Quality, Probabilistic logic, business.industry, Biometrics, Error analysis, Instruments, Presentation attacks detection (PAD), Security, Terminology, Deep learning, Fingerprint (computing), NIST, Artificial intelligence, business, Cryptography and Security (cs.CR), computer
الوصف: The diffusion of fingerprint verification systems for security applications makes it urgent to investigate the embedding of software-based presentation attack detection algorithms (PAD) into such systems. Companies and institutions need to know whether such integration would make the system more "secure" and whether the technology available is ready, and, if so, at what operational working conditions. Despite significant improvements, especially by adopting deep learning approaches to fingerprint PAD, current research did not state much about their effectiveness when embedded in fingerprint verification systems. We believe that the lack of works is explained by the lack of instruments to investigate the problem, that is, modeling the cause-effect relationships when two non-zero error-free systems work together. Accordingly, this paper explores the fusion of PAD into verification systems by proposing a novel investigation instrument: a performance simulator based on the probabilistic modeling of the relationships among the Receiver Operating Characteristics (ROC) of the two individual systems when PAD and verification stages are implemented sequentially. As a matter of fact, this is the most straightforward, flexible, and widespread approach. We carry out simulations on the PAD algorithms' ROCs submitted to the most recent editions of LivDet (2017-2019), the state-of-the-art NIST Bozorth3, and the top-level Veryfinger 12 matchers. Reported experiments explore significant scenarios to get the conditions under which fingerprint matching with embedded PAD can improve, rather than degrade, the overall personal verification performance.
تدمد: 1556-6021
1556-6013
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dc5168c830f408ef8c280ec064822d7dTest
https://doi.org/10.1109/tifs.2021.3121201Test
حقوق: OPEN
رقم الانضمام: edsair.doi.dedup.....dc5168c830f408ef8c280ec064822d7d
قاعدة البيانات: OpenAIRE