Cargando…

On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection

Within the last few decades, the need for subject authentication has grown steadily, and biometric recognition technology has been established as a reliable alternative to passwords and tokens, offering automatic decisions. However, as unsupervised processes, biometric systems are vulnerable to pres...

Descripción completa

Detalles Bibliográficos
Autores principales: Kolberg, Jascha, Gläsner, Daniel, Breithaupt, Ralph, Gomez-Barrero, Marta, Reinhold, Jörg, von Twickel, Arndt, Busch, Christoph
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8433742/
https://www.ncbi.nlm.nih.gov/pubmed/34502576
http://dx.doi.org/10.3390/s21175686
_version_ 1783751431153516544
author Kolberg, Jascha
Gläsner, Daniel
Breithaupt, Ralph
Gomez-Barrero, Marta
Reinhold, Jörg
von Twickel, Arndt
Busch, Christoph
author_facet Kolberg, Jascha
Gläsner, Daniel
Breithaupt, Ralph
Gomez-Barrero, Marta
Reinhold, Jörg
von Twickel, Arndt
Busch, Christoph
author_sort Kolberg, Jascha
collection PubMed
description Within the last few decades, the need for subject authentication has grown steadily, and biometric recognition technology has been established as a reliable alternative to passwords and tokens, offering automatic decisions. However, as unsupervised processes, biometric systems are vulnerable to presentation attacks targeting the capture devices, where presentation attack instruments (PAI) instead of bona fide characteristics are presented. Due to the capture devices being exposed to the public, any person could potentially execute such attacks. In this work, a fingerprint capture device based on thin film transistor (TFT) technology has been modified to additionally acquire the impedances of the presented fingers. Since the conductance of human skin differs from artificial PAIs, those impedance values were used to train a presentation attack detection (PAD) algorithm. Based on a dataset comprising 42 different PAI species, the results showed remarkable performance in detecting most attack presentations with an APCER = 2.89% in a user-friendly scenario specified by a BPCER = 0.2%. However, additional experiments utilising unknown attacks revealed a weakness towards particular PAI species.
format Online
Article
Text
id pubmed-8433742
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-84337422021-09-12 On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection Kolberg, Jascha Gläsner, Daniel Breithaupt, Ralph Gomez-Barrero, Marta Reinhold, Jörg von Twickel, Arndt Busch, Christoph Sensors (Basel) Article Within the last few decades, the need for subject authentication has grown steadily, and biometric recognition technology has been established as a reliable alternative to passwords and tokens, offering automatic decisions. However, as unsupervised processes, biometric systems are vulnerable to presentation attacks targeting the capture devices, where presentation attack instruments (PAI) instead of bona fide characteristics are presented. Due to the capture devices being exposed to the public, any person could potentially execute such attacks. In this work, a fingerprint capture device based on thin film transistor (TFT) technology has been modified to additionally acquire the impedances of the presented fingers. Since the conductance of human skin differs from artificial PAIs, those impedance values were used to train a presentation attack detection (PAD) algorithm. Based on a dataset comprising 42 different PAI species, the results showed remarkable performance in detecting most attack presentations with an APCER = 2.89% in a user-friendly scenario specified by a BPCER = 0.2%. However, additional experiments utilising unknown attacks revealed a weakness towards particular PAI species. MDPI 2021-08-24 /pmc/articles/PMC8433742/ /pubmed/34502576 http://dx.doi.org/10.3390/s21175686 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Kolberg, Jascha
Gläsner, Daniel
Breithaupt, Ralph
Gomez-Barrero, Marta
Reinhold, Jörg
von Twickel, Arndt
Busch, Christoph
On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
title On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
title_full On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
title_fullStr On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
title_full_unstemmed On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
title_short On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection
title_sort on the effectiveness of impedance-based fingerprint presentation attack detection
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8433742/
https://www.ncbi.nlm.nih.gov/pubmed/34502576
http://dx.doi.org/10.3390/s21175686
work_keys_str_mv AT kolbergjascha ontheeffectivenessofimpedancebasedfingerprintpresentationattackdetection
AT glasnerdaniel ontheeffectivenessofimpedancebasedfingerprintpresentationattackdetection
AT breithauptralph ontheeffectivenessofimpedancebasedfingerprintpresentationattackdetection
AT gomezbarreromarta ontheeffectivenessofimpedancebasedfingerprintpresentationattackdetection
AT reinholdjorg ontheeffectivenessofimpedancebasedfingerprintpresentationattackdetection
AT vontwickelarndt ontheeffectivenessofimpedancebasedfingerprintpresentationattackdetection
AT buschchristoph ontheeffectivenessofimpedancebasedfingerprintpresentationattackdetection