Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/12703
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rai, Anuj | en_US |
dc.contributor.author | Anshul, Aditya | en_US |
dc.contributor.author | Jha, Ashwini | en_US |
dc.contributor.author | Jain, Prayag | en_US |
dc.contributor.author | Dey, Somnath | en_US |
dc.date.accessioned | 2023-12-14T12:38:15Z | - |
dc.date.available | 2023-12-14T12:38:15Z | - |
dc.date.issued | 2023 | - |
dc.identifier.citation | Rai, A., Anshul, A., Jha, A., Jain, P., Sharma, R. P., & Dey, S. (2023). An open patch generator based fingerprint presentation attack detection using generative adversarial network. Multimedia Tools and Applications. Scopus. https://doi.org/10.1007/s11042-023-16503-6 | en_US |
dc.identifier.issn | 1380-7501 | - |
dc.identifier.other | EID(2-s2.0-85168575197) | - |
dc.identifier.uri | https://doi.org/10.1007/s11042-023-16503-6 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/12703 | - |
dc.description.abstract | The low-cost, user-friendly, and convenient nature of Automatic Fingerprint Recognition Systems (AFRS) makes them suitable for a wide range of applications. This spreading use of AFRS also makes them vulnerable to various security threats. Presentation Attack (PA) or spoofing is one of the threats which is caused by presenting a spoof of a genuine fingerprint to the sensor of AFRS. Fingerprint Presentation Attack Detection (FPAD) is a countermeasure intended to protect AFRS against fake or spoof fingerprints created using various fabrication materials. In this paper, we have proposed a Convolutional Neural Network (CNN) based technique that uses a Generative Adversarial Network (GAN) to augment the dataset with spoof samples generated from the proposed Open Patch Generator (OPG). This OPG is capable of generating realistic fingerprint samples which have no resemblance to the existing spoof fingerprint samples generated with other materials. The augmented dataset is fed to the DenseNet classifier which helps in increasing the performance of the Presentation Attack Detection (PAD) module for the various real-world attacks possible with unknown spoof materials. Experimental evaluations of the proposed approach are carried out on the Liveness Detection (LivDet) 2015, 2017, and 2019 competition databases. An overall accuracy of 96.20%, 94.97%, and 92.90% has been achieved on the LivDet 2015, 2017, and 2019 databases, respectively under the LivDet protocol scenarios. The performance of the proposed PAD model is also validated in the cross-material and cross-sensor attack paradigm which further exhibits its capability to be used under real-world attack scenarios. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.source | Multimedia Tools and Applications | en_US |
dc.subject | Biometrics | en_US |
dc.subject | Fingerprint | en_US |
dc.subject | Generative adversarial networks | en_US |
dc.subject | Presentation attack detection | en_US |
dc.title | An open patch generator based fingerprint presentation attack detection using generative adversarial network | en_US |
dc.type | Journal Article | en_US |
dc.rights.license | All Open Access, Green | - |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: