Next Article in Journal
An RSS Transform—Based WKNN for Indoor Positioning
Previous Article in Journal
An Improved Adaptive Spatial Preprocessing Method for Remote Sensing Images
Previous Article in Special Issue
Transformers and Generative Adversarial Networks for Liveness Detection in Multitarget Fingerprint Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection

1
da/sec—Biometrics and Internet Security Research Group, Hochschule Darmstadt, 64295 Darmstadt, Germany
2
Federal Office for Information Security, 53133 Bonn, Germany
3
Fakultät Wirtschaft, Hochschule Ansbach, 91522 Ansbach, Germany
4
Jenetric GmbH, 07745 Jena, Germany
*
Author to whom correspondence should be addressed.
Submission received: 30 June 2021 / Revised: 16 August 2021 / Accepted: 18 August 2021 / Published: 24 August 2021
(This article belongs to the Special Issue Biometric Sensors and Applications)

Abstract

:
Within the last few decades, the need for subject authentication has grown steadily, and biometric recognition technology has been established as a reliable alternative to passwords and tokens, offering automatic decisions. However, as unsupervised processes, biometric systems are vulnerable to presentation attacks targeting the capture devices, where presentation attack instruments (PAI) instead of bona fide characteristics are presented. Due to the capture devices being exposed to the public, any person could potentially execute such attacks. In this work, a fingerprint capture device based on thin film transistor (TFT) technology has been modified to additionally acquire the impedances of the presented fingers. Since the conductance of human skin differs from artificial PAIs, those impedance values were used to train a presentation attack detection (PAD) algorithm. Based on a dataset comprising 42 different PAI species, the results showed remarkable performance in detecting most attack presentations with an APCER = 2.89% in a user-friendly scenario specified by a BPCER = 0.2%. However, additional experiments utilising unknown attacks revealed a weakness towards particular PAI species.

1. Introduction

Within the last decade, biometric recognition systems have been deployed in several applications used in our daily lives. Almost all new smartphones can be unlocked with biometrics, which is very user-friendly. On the other hand, border control utilises biometrics to enhance the security. Hence, the usage of biometric recognition itself is flexible and suits different scenarios. In this context, the fingerprint has always been one of the most used biometric characteristics [1].
However, with the capture devices being exposed to the public, biometric systems are vulnerable to external attacks [2]. This kind of attack is defined within the ISO/IEC 30107-1 [3] as a “presentation to the biometric data capture subsystem with the goal of interfering with the operation of the biometric system”. The intention of the attacker can be either to impersonate someone’s identity or to conceal his own identity. In both cases, a presentation attack instrument (PAI) instead of the bona fide characteristic is presented to the capture device. In this context, a group of PAIs made from the same material is called a PAI species. As a consequence, a secure biometric system requires an automated presentation attack detection (PAD) module, which needs to learn the differences between bona fide presentations (BPs) and attack presentations (APs) [4]. Correct assignment of the two classes is becoming more complicated with the many options available for creating PAIs. For fingerprint artefacts in particular, there are multiple recipes based on a variety of materials available [5].
The challenge of PAD was addressed by multiple international research projects, such as Tabula Rasa [6], BEAT [7], Odin [8], and RESPECT [9]. Additionally, the LivDet challenges [10,11] have invited researchers from academia and industry to benchmark their PAD algorithms on identical datasets since 2009. These efforts allowed significant research and development of new countermeasures across different biometric characteristics. In general, PAD methods can be categorised into software-based and hardware-based approaches. While the first category analyses the samples acquired with legacy fingerprint captures in a deeper way (i.e., PAD based solely on data of the biometric sensor), the latter one introduces additional sensors to capture complementary information solely used by the PAD algorithm (i.e., PAD based on data of additional dedicated PAD sensors). Examples of hardware-based methods are multispectral illuminations and pulse detection, which require additional modules and thus usually result in bigger capture devices than pure fingerprint sensors [12].
This work focused on adding a hardware-based sensor to an existing capture device and validating whether this additional information is suited to detecting APs for fingerprint recognition. The idea is that human skin has different conductivity than the artificial materials of PAIs, and hence can be discriminated from them. Therefore, this study aims to answer the question of whether a finger’s impedance is an effective feature for reliable fingerprint PAD. To that end, we describe the functionality of the capture device which was used to acquire a dataset of 757 BPs and 915 APs from 42 different PAI species. A fingerprint PAD algorithm was trained and evaluated on this dataset.
The development of fingerprint PAD methods requires a dataset with BPs and APs. As a consequence, PAIs need to be created from either cooperative target subjects or latent (or synthetic) fingerprints. In a cooperative approach, the bona fide finger is placed in a moulding material, which includes the negative fingerprint pattern after hardening. Subsequently, this mould can be filled with the casting material (e.g., latex or ecoflex) to retrieve the actual PAI. Depending on the properties of the moulding and casting materials, the mould can be reused for additional fabrications. For latent fingerprints, the representation needs to be digitised first. Then the negative image is used to create the mould (e.g., 3D printer or laser cutter), which can be filled again with the casting material.
The remainder of this article is structured as follows: Section 2 reviews the state-of-the-art for fingerprint PAD. Our capture device is introduced in Section 3, followed by the method for fingerprint PAD in Section 4. Subsequently, the experimental evaluation is presented and discussed in Section 5, and finally, Section 6 concludes the findings.

2. Related Work

The PAD approaches reviewed in the following are also summarised in Table 1. Since this work proposes a new hardware-based approach and presents a detailed analysis with regard to generalisation capabilities towards unknown attacks, related work has been selected from these areas as well. Due to the fact that most of these works were tested on different datasets and report results from multiple experiments, a fair comparison is not possible. Finally, this overview is by no means complete but focuses on selected approaches to put our own contribution into context. However, the interested reader is referred to more extensive surveys on fingerprint PAD methods [13,14,15,16,17].
The publicly available LivDet datasets [18,19,20,21,22,23] established a well known and commonly used foundation for software-based fingerprint PAD development. While early fingerprint PAD algorithms mostly utilised handcrafted feature extractions and classifiers [24,25,26,27,28,29], a shift towards deep learning approaches is noticeable in more recent publications [30,31,32,33]. However, when focussing on unknown attacks and cross-sensor and cross-database scenarios, it is clear that handcrafted methods are able to outperform deep learning approaches, as was shown by the winner of the LivDet 2019 competition [34]. This work was further extended in [35] to include even more features into the fisher vector encoding before classifying these with a support vector machine (SVM).
Table 1. A summary of related fingerprint PAD approaches.
Table 1. A summary of related fingerprint PAD approaches.
YearRef.ApproachDescriptionDatabase (# PAI Species)
2008[36]handcraftedpulse + oxygen levelown DB (1)
2011[24]handcraftedstatic + intensity featuresLivDet 2009 (3)
[37]handcraftedpulse + multi-spectralown DB (4)
2013[38]handcraftedoptical methodsown DB (N/A)
2014[25]handcrafteddata augmentation + SVMLivDet 2009–2013 (8)
2015[26]handcraftedone-class SVMLivDet 2011 (7)
[27]handcraftedone-class SVM/GMMLivDet 2013 (7)
[30]deep learningdeep representationsLivDet 2013 (7)
2016[28]handcraftedone-class SVMsLivDet 2011 (7)
[31]deep learningdeep belief networkLivDet 2013 (7)
[32]deep learningpre-trained CNNsLivDet 2009–2013 (8)
2017[29]handcraftedfeature fusionLivDet 2009–2013 (8)
[33]deep learningpatch-based CNNLivDet 2011–2013 (8)
[39]sensor designultrasonic fingerprintno DB (0)
2018[40]deep learningFingerprint Spoof BusterLivDet 2011–2015, (12)
MSU-FPAD, PBSKD
2019[41]deep learningone-class GANsown DB (12)
2020[42]handcraftedfinger vein skeletonown DB (32)
[43]deep learningadversarial learningLivDet 2015 (9)
[44]deep learninguniversal material generatorLivDet 2017, (12)
MSU-FPAD, PBSKD
[45]deep learningadversarial representationsLivDet 2015–2017, (11)
MSU-FPAD
2021[34]handcraftedlocal feature encodingLivDet 2011–2019 (15)
[35]handcraftedfisher vector encodingLivDet 2011–2017 (13)
[46]deep learningconvolutional autoencoderown DB 1 (45)
[47]deep learningLOO benchmarkown DB 1 (45)
[48]deep learningOCT autoencoderown DB (101)
[49]sensor designultrasonic fingerprintno DB (0)
1 Part of the dataset has already been released: https://github.com/ISICV/PADISI_USC_Dataset accessed on 20 August 2021.
In the area of deep learning, Chugh and Jain [40] proposed their Fingerprint Spoof Buster as a patch-based convolutional neural network (CNN) together with two datasets, MSU-FPAD and PBSKD. Using a training set, this approach was able to detect additional unknown attacks due to their similarity to known attacks. The authors followed up on this and extended the approach with a synthetic sample generator [44]. Based on these additional samples for different PAI species, the network could be trained on a larger dataset. Subsequently, Grosz et al. [45] combined this synthetic generator with adversarial representation learning to overcome the weakness regarding cross-sensor and unknown attack scenarios. Using an adversarial and transfer learning approach, Pereira et al. [43] improved the robustness of the model to unknown PAI species. After their encoder mapped the input to a latent space, a classifier distinguished between APs and BPs. However, another classifier additionally tried to determine the corresponding PAI species of the latent feature vector. This information was then returned to the encoder with the goal of finding a new representation that was independent of the PAI species. Thus, the encoder learnt a generalising representation that was robust to unknown PAI species.
While the previous approaches targeted the problem of unknown attacks, they still needed numerous APs for training. In the area of anomaly detection, one-class classifiers can be trained on BPs only. Hence, all attacks are unknown by default, and every presentation that appears different to the BPs in training is automatically classified as AP. In this context, some research evaluated handcrafted classifiers such as SVMs or Gaussian mixture models (GMMs), which did not see APs during training [26,27]. Later, Engelsma and Jain [41] utilised one-class generative adversarial networks (GANs) for fingerprint PAD based on images captured with the RaspiReader [50]. In another approach, Kolberg et al. [46] proposed a convolutional autoencoder for multi-spectral images from a camera-based capture device. In a similar fashion, Liu et al. [48] evaluated an autoencoder on samples acquired with an optical coherence tomography (OCT) sensor.
Regarding hardware-based approaches, various methods and sensing techniques have been proposed. One of the early approaches [36] combines pulse measurement with haemoglobin observation within the finger veins. Using a near infra-red light source, the oxygen saturation is analysed, which also allows the detection of cadaver fingers. The idea of extracting the finger vein skeleton for fingerprint PAD was later evaluated in [42]. The analysis showed that full fake fingers were easily detected, and for thin and transparent overlays the veins were still visible. Hence, those PAI species could not be distinguished from BPs. Following up on pulse measurement, Hengfoss et al. [37] additionally acquired multi-spectral samples. Their conclusion states that the capture time for pulse measurement exceeds the time taken for others, and thus is less favourable. A similar observation was made by Drahansky et al. [38], who tested optical methods for pulse, pressure, and skin reflections.
In a different approach, Jiang et al. [39] proposed a new ultrasonic fingerprint capture device. This technology allows one to acquire fingerprint images beneath the epidermis, which is theoretically harder to attack than, e.g., capacitive sensors. A more recent approach [49] additionally captures the finger vessels underneath the fingerprint, which in theory is even more robust against APs. However, both works did not collect APs to confirm the PAD capabilities. On the other hand, Kolberg et al. [47] presented an extensive benchmark of multiple fingerprint PAD algorithms for multi-spectral images. The leave-one-out (LOO) experiments showed that a fusion of complementary input data benefits the PAD performance in the presence of unknown attacks.

3. Capture Device and Data

Even if it is possible to implement software-based PAD methods to distinguish between BPs and APs, this work instead introduces a hardware-based adjustment to derive the decision based on additional data. The goal is to measure the impedance, since the conductivity of human skin differs from the conductivity other artificial materials.
The capture device is based on the Jenetric LIVETOUCH QUATTRO (https://www.jenetric.com/en/products/livetouch-quattro.html, accessed on 20 August 2021), which is depicted in Figure 1a. The optical thin film transistor (TFT) technology allows capturing up to four fingerprints at a time. In this process, the display beneath serves as illumination source (Figure 1b) and can be used for user guidance as well. While this technique enables reliable acquisitions of bona fide fingerprints, it also captures the fingerprint patterns from particular APs as shown in Figure 2. The main advantage of TFT sensors is their size. While it is possible to cover large areas (e.g., four fingers simultaneously), the glass is only 0.7 mm thick, and thus it is easy to include in various devices. As this offers huge potential for numerous applications, fingerprint PAD for TFT capture devices has relied so far on software-based analysis of fingerprint images. However, research has shown that APs can indeed have similar fingerprint quality as BPs [51], which can be a problem for purely software-based PAD solutions. On the other hand, adding established PAD sensors is difficult to do without losing the advantage of the TFT technology.
In the proposed approach, we measure the impedance on top of the optical fingerprint sensor. To that end, the usage of transparent electrodes is necessary in order not to interfere with the fingerprint acquisition. Hence, a strip-shaped indium-tin-oxide (ITO) coating is applied to the top layer of the capture device. The electric circuit utilises an alternating current source with various specified frequencies and a peak-to-peak voltage of 1 V. Once a finger connects the two electrodes, the finger’s impedance can be measured. This PAD adjustment is illustrated in Figure 3. According to Ohm’s law, voltage drops within the circuit are indirectly proportional to the corresponding resistances. In our case, the resistance of human skin is a complex quantity, as it is composed of capacitive and ohmic resistances. Hence, the resistance of skin decreases with increasing frequency, which causes the voltage to increase.
The prototype has a controllable output, and for the context of fingerprint PAD, nine frequencies in the range between 1 and 500 kHz are used. Finally, a second-order high-pass filter in combination with a bridge rectifier removes 50 Hz noise and smoothes the signal, which thus corresponds to a DC voltage. Those measured impedance values can then be used by PAD algorithms.

4. Presentation Attack Detection Method

With our fingerprint PAD approach, we aimed to keep things as simple as possible, while preserving full compatibility with the base fingerprint sensor. The finger’s impedance is measured at nine selected frequencies in the range from 1 to 500 kHz, which are listed in Table 2. The first frequency was chosen to have enough distance from the 50 Hz high-pass filter to avoid interference with the attenuation. Additionally, the frequency generator is technically capped at 1 MHz; thus, the remaining frequencies were selected such that the maximum possible range is covered with few selected measurement points, while also taking into account the decreasing resistance for increasing frequencies. Therefore, for each presentation, nine float values of PAD data are acquired. No conductivity results in a zero vector and the measured impedance values rise for conductive presentations. Hence, this nine-dimensional feature vector can directly be used for classification without further pre-processing.
For this purpose, the SVM [52] is used as a classifier, since it constantly achieved remarkable performances across different fingerprint PAD studies [34,35,53,54,55,56,57]. The SVM is designed to work on high-dimensional input data and derive binary decisions by defining a hyperplane that separates both classes. Hence, it is perfectly suited for fingerprint PAD tasks. We are only interested in detecting whether an input is an AP and not which material was used to fabricate this particular PAI. In the training process, 5-fold cross-validation was used to automatically determine the best-suited hyperparameters for the RBF kernel on the available training data. During prediction, the test sample is mapped into the SVM feature space, where it can be compared to the hyperplane in order to retrieve a real-time classification result. The full fingerprint PAD processing pipeline is illustrated in Figure 4. Although the main contribution is the impedance measurement and not a classifier benchmark, the SVM approach is shown in comparison to k-nearest neighbours (KNN) and multi-layer perceptron (MLP) classifiers.

5. Experimental Evaluation

In this section, we first introduce the database and experimental protocol, which were used to run the experiments with the goal of answering the question of whether the impedance-based technology presented here is suited for fingerprint PAD. We then present and discuss the results.

5.1. Database and Experimental Protocol

The data acquisition was split over three distinct locations. Each party collected BPs from all ten fingers, and in total, 59 subjects contributed 757 BPs. Since the data collection took place during a pandemic, fingers and the sensor surface were disinfected between collecting data from different subjects. Apart from that, the presented fingers had different moisture levels. In addition, each party created their own PAIs, which resulted in a total of 915 APs from 42 different PAI species for the dataset. On the other hand, this led to unequal numbers of APs per PAI species, as shown in Table 3. It should be noted that for some PAI species (e.g., 3D printed) it was not possible to capture the fingerprint with the optical sensor. However, those APs were still included (5) in the database in order to show that this PAI species was considered in the data collection. In a similar manner, the acquisition of particular PAI species was stopped when it turned out that those materials showed no conductive properties. Thus, the focus lay on acquiring APs with measurable impedance values. Hence, non conductive materials were, e.g., additionally coated with electric paint, or, e.g., glycerol was added during the casting process. Those augmentations are listed on the right-hand side of Table 3 and example photos are shown in Figure 5. While both nanotips and bare paint can be applied to solid PAIs, the viscous bare paint cannot be used on softer PAIs without destroying the ridge lines. An overview of the impedance values for all conductive presentations is plotted in the Figure A1 in Appendix A.
The goal was to collect a wide variety of different PAI species in first place. Hence, the used materials were selected based on their availability and experience from former projects. All ingredients are easily purchasable, and their fabrication requires low expertise to allow sufficient numbers of PAIs for the data collection. Based on the results, more sophisticated PAIs exploiting the vulnerability of this capture device can be created.
For the experimental protocol, different dataset partitions were defined in order to evaluate the following scenarios. In general, all partitions were split into non-overlapping training and test sets to guarantee a fair evaluation of the proposed fingerprint PAD method. First, a mixed partitioning was used, where each conductive PAI species was present in both training and test sets. A maximum of 1/3 of APs from a particular PAI species were used for training, and the other samples were seen only during testing. This served as a baseline experiment with only known PAI species in the test set. Second, an additional set of experiments aimed to analyse the fingerprint PAD performance towards unknown PAI species. In this context, a leave-one-out protocol was applied were single PAI species were removed from the training set and only occurred during testing. The LOO partitions were created only for conductive materials or their conductive augmentations, respectively. In other words, one particular PAI species (e.g., playdoh) or all its augmentations (e.g., latex + nanotips and latex + bare paint) were not seen during training. Since the same augmentations were applied to multiple base materials, additional LOO partitions excluded all modifications with bare paint or nanotips, respectively.
The numbers of training and testing samples for the different partitions are summarised in Table 4. An identical number of APs and BPs was chosen for the training partition to prevent bias towards a particular class. Additional samples were moved to the test set for the baseline partition. The LOO partitions removed AP samples after filling the training set. In order to maintain a meaningful training set, a maximum of 15 conductive APs from the same PAI species were included in the training set, and finally, the remaining space was filled with random samples from non-conductive PAI species. Hence, the training set had no bias towards one class (AP or BP), nor towards particular PAI species. Therefore, the experiments allowed fair benchmarking of different LOO partitions and sound conclusions regarding the vulnerability towards unknown attacks.

5.2. Metrics

The results of the impedance-based PAD algorithm were analysed with the following metrics defined in ISO/IEC 30107-3 [58]:
  • Attack Presentation Classification Error Rate (APCER): percentage of APs incorrectly classified as BPs.
  • Bona fide Presentation Classification Error Rate (BPCER): percentage of BPs incorrectly classified as APs.
For this purpose, the detection error tradeoff (DET) visualises the fingerprint PAD performance for all possible decision thresholds. While high security applications require a low APCER, low BPCERs represent convenient use cases. In order to benchmark the different results, two operation points were chosen: (i) detection equal error rate (D-EER), as the point where APCER = BPCER; and (ii) APCER0.2, as the APCER for a fixed BPCER of 0.2%, thereby representing a convenient scenario.

5.3. Results and Discussion

Based on the specified protocol, different experiments were evaluated. The DET plot of the baseline partition is shown in Figure 6a. The SVM approach significantly outperformed the other two approaches; thus, the further analysis and the LOO experiments focused on these results. The plot shows that there is one BP that will always be misclassified as an AP. Hence, a BPCER below 0.2% is not possible for this scenario. On the other hand, over 97% of all APs were correctly classified for both operation points, D-EER and APCER0.2.
The next set of experiments evaluated the generalisation capabilities of the fingerprint PAD algorithm towards unknown attacks. The results of the 16 LOO experiments are plotted in Figure 6b. Since the BPs within the test set remained identical to the baseline partition, the same sample kept getting wrongly classified across all LOO partitions. Additionally, the number of APs in the test set was generally lower for the LOO experiments than for the baseline. Thus, the corresponding DET curves ended earlier, and achieving very low APCERs was not possible in these cases. Depending on the PAI species used in the particular training set and their similarity to BPs, the BPCER could be significantly higher than for the baseline partition. On the other hand, some of the conductive PAI species that were left out during training were completely classified as APs without error. Those perfect classifications cannot be shown by the DET plot; thus, the specific error rates in terms of D-EER and APCER0.2 are additionally in Table 5 for all experiments.
For the baseline partition, a D-EER of 2.45% and an APCER0.2 of 2.89% were achieved. This translates to 20 misclassified APs, which mainly stemmed from the gelatin PAI species. As a consequence, the fingerprint PAD method reliably detected all other known PAI species in the baseline scenario. These findings were basically confirmed by the LOO experiments. For most LOO partitions, a D-EER below 1% was reported, with gelatin being the biggest outlier (D-EER = 19%). It should be noted that the computation of the D-EER anticipated both error rates to be equal at some point. Therefore, the computation reported BPCER/2 for those cases where all APs were correctly classified. Given the one misclassified BP, this resulted in a D-EER of 0.1%. When switching to the convenient threshold for BPCER = 0.2%, additional outliers were revealed. Following gelatin (APCER0.2 ≈ 25%), gelafix was misclassified in 7/37 cases (APCER0.2 = 19%). However, the least convenient performance was reported after leaving out all bare paint adjustments from training. This LOO group achieved an APCER0.2 > 90%, but the D-EER seemed stable at 1.15%. The reason for this behaviour lies in the fact that these unknown attacks have very similar impedance values as the BPs. Hence, the classifier mixed both classes such that the results allowed no separation for very low BPCERs.
Summarising the results, one can say that the concept of using an impedance-based fingerprint PAD module is generally suited for convenient use cases. Except for one constant error, the remaining BPs could be separated from APs and thus kept the false alarm rate low. Additionally, the reported baseline performance showed that a large share of the APs were correctly detected, which indicates strong security against APs in general. However, the following LOO experiments revealed that this fingerprint PAD method is indeed vulnerable against unknown attacks. In particular, PAI species that are conductive by nature (e.g., gelatin and gelafix) pose a severe threat when unknown to the PAD algorithm. Additionally, the results from the LOO bare paint partition show that unknown conductive adjustments are likely to be misclassified as BPs independently of the base material used for the PAI. Since there are more ways to add conductance to PAI species than the ones used in this work, impedance on its own might not be sufficient for secure fingerprint PAD.

5.4. Comparison to State-of-the-Art

This Section places our results next to already published ones of state-of-the-art fingerprint PAD approaches. However, since all experimental test sets differ, the focus is on a baseline scenario. Moreover, software-based methods that evaluated the LivDet protocols often only reported the average classification error rate (ACER), which is defined as:
A C E R = A P C E R + B P C E R 2
Since the error rates highly depend on the database size and the PAI species that are included, those specifications are presented. The main specifications for the comparison are summarised in Table 6. It should be noted that the numbers of PAI species, APs and BPs for the software-based solutions were added up for all evaluated datasets. However, the best performance is usually not achieved through cross-sensor or cross-database experiments; thus, only a fraction of the overall samples were used for this. In general, it is difficult to compare fingerprint PAD performances across totally different scenarios. However, it can be observed that the datasets for software-based methods usually comprised less PAI species than in the data for hardware-based methods. On the other hand, it is possible to evaluate a software-based PAD algorithm with multiple datasets to analyse the generalisation capabilities.
On the other hand, the hardware-based approaches have shown remarkable numbers of PAI species and total database sizes. The reported performances are similar to that of our approach in the baseline scenario. Furthermore, the topic of unknown attacks is addressed by using one-class classifiers. In accordance with our LOO experiments, the overall error rates are generally higher than for the baseline results, which proves the need for further research in this area.
All in all, it can be said that our fingerprint PAD performance is among the state-of-the-art. However, a larger data collection effort is required to confirm these findings regarding the suitability in highly frequented real-world applications.

6. Conclusions and Future Work

In this study, an optical capture device was modified to additionally measure the finger’s impedance across nine selected frequencies. These additional data were then used to train an SVM for the task of fingerprint PAD. The idea is that all BPs show a common conductive response, but APs should differ in this regard, due to their physical properties differing from those of human skin. The collected dataset comprises a total of 1672 samples, including 42 different PAI species. The proposed fingerprint PAD method made a real-time decision based on the measured impedance values, thereby taking into account the conductivity itself and the separation between the different frequencies. The experiments showed remarkable results for the baseline scenario, such that an APCER = 2.89% was reached for a convenient use case defined by a BPCER = 0.2%. Hence, 41/42 PAI species were correctly classified in the best case. The only weakness was gelatin APs, which have natural conductance.
On the other hand, the LOO experiments showed additional limitations of this fingerprint PAD method unseen during training: gelafix and bare paint adjustments. While all other PAI species were reliably detected, even if unknown to the classifier, real-life applications can be considered unsafe when there is one attack that succeeds at remaining undetected regularly. Hence, it must be concluded that impedance on its own is not sufficient for secure fingerprint PAD, although all BPs (except for one) were correctly classified.
In this context, it was shown that complementary information channels can be fused to improve the overall PAD performance [47,60]. For this particular capture device, the optical fingerprint image could be used as a second data source, thereby combining software and hardware-based fingerprint PAD approaches. Furthermore, since the display is the illumination source for the optical capture process, differently coloured illuminations are already available, which should allow a multi-spectral fingerprint PAD approach similar to [61,62].

Author Contributions

Sensor fabrication and the software for the new capture device were performed by D.G. Data collection was led by J.K., D.G. and R.B. for their particular locations. J.K. performed the data curation, experimental protocol, and experiments. The article was written by J.K.; edited by M.G.-B.; and reviewed by D.G., R.B., J.R., A.v.T. and C.B. Supervision was performed by M.G.-B. and J.R.; C.B. was in charge of the project management. Finally, R.B. and A.v.T. were responsible for the funding acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the German Federal Office for Information Security within the research project DIRECT-PAD.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data is available for in-house testing during an internship at da/sec (https://dasec.h-da.de, accessed on 20 August 2021).

Acknowledgments

Additional thanks goes to Jannis Priesnitz, Rolf Huesmann, and Julian Stoldt for organising a joint data collection. Furthermore, the authors would like to thank Jenetric GmbH for their support by providing the capture device and contributing to the data collection.

Conflicts of Interest

The authors declare no conflict of interest. The funders contributed with a part of the data collection and reviewing the manuscript.

Abbreviations

The following abbreviations are used in this manuscript:
ACERAverage Classification Error Rate
APAttack Presentation
APCERAttack Presentation Classification Error Rate
BPBona fide Presentation
BPCERBona fide Presentation Classification Error Rate
CNNConvolutional Neural Network
D-EERDetection Equal Error Rate
DETDetection Error Tradeoff
GANGenerative Adversarial Network
GMMGaussian Mixture Model
ITOIndium-Tin-Oxide
KNNK-nearest Neighbours
LOOLeave-one-out
MLPMulti-Layer Perceptron
OCTOptical Coherence Technology
PADPresentation Attack Detection
PAIPresentation Attack Instrument
SVMSupport Vector Machine
TFTThin Film Transistor

Appendix A

Medians and standard deviations of the impedance values for all conductive presentations across all nine frequencies are plotted in Figure A1.
Figure A1. For each frequency (ai), the plots visualise the impedance values using the median (orange), ± 25 % (box), the standard deviation (end of line), and outliers (green dots) for all conductive presentations.
Figure A1. For each frequency (ai), the plots visualise the impedance values using the median (orange), ± 25 % (box), the standard deviation (end of line), and outliers (green dots) for all conductive presentations.
Sensors 21 05686 g0a1aSensors 21 05686 g0a1b

References

  1. Maltoni, D.; Maio, D.; Jain, A.K.; Prabhakar, S. Handbook of Fingerprint Recognition; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009. [Google Scholar] [CrossRef]
  2. Zwiesele, A.; Munde, A.; Busch, C.; Daum, H. BioIS Study—Comparative Study of Biometric Identification Systems. In Proceedings of the IEEE International Carnahan Conference on Security Technology (CCST), Ottawa, ON, Canada, 23–25 October 2000; IEEE Computer Society: Ottawa, Canada, 2000; pp. 60–63. [Google Scholar] [CrossRef]
  3. ISO/IEC JTC1 SC37 Biometrics. ISO/IEC 30107-1. Information Technology—Biometric Presentation Attack Detection—Part 1: Framework; ISO/IEC, 2016. [Google Scholar]
  4. Marcel, S.; Nixon, M.S.; Fierrez, J.; Evans, N. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection; Springer: Cham, Switzerland, 2019. [Google Scholar] [CrossRef] [Green Version]
  5. Kanich, O.; Drahansky, M.; Mézl, M. Use of Creative Materials for Fingerprint Spoofs. In Proceedings of the International Workshop on Biometrics and Forensics (IWBF), Sassari, Italy, 7–8 June 2018; pp. 1–8. [Google Scholar] [CrossRef]
  6. TABULA RASA. Trusted Biometrics under Spoofing Attacks. 2010. Available online: http://www.tabularasa-euproject.org/ (accessed on 20 August 2021).
  7. Marcel, S. BEAT–Biometrics Evaluation and Testing. Biom. Technol. Today 2013, 1, 5–7. [Google Scholar] [CrossRef]
  8. ODNI; IARPA. IARPA-BAA-16-04 (Thor). Available online: https://www.iarpa.gov/index.php/research-programs/odin/odin-baa (accessed on 20 August 2021).
  9. RESPECT. Reliable, Secure and Privacy Preserving Multi-biometric Person Authentication. 2019. Available online: http://www.respect-project.eu/ (accessed on 20 August 2021).
  10. Yambay, D.; Ghiani, L.; Marcialis, G.L.; Roli, F.; Schuckers, S. Review of Fingerprint Presentation Attack Detection Competitions. In Handbook of Biometric Anti-Spoofing; Springer: Cham, Switzerland, 2019; pp. 109–131. [Google Scholar] [CrossRef]
  11. Yambay, D.; Czajka, A.; Bowyer, K.; Vatsa, M.; Singh, R.; Schuckers, S. Review of Iris Presentation Attack Detection Competitions. In Handbook of Biometric Anti-Spoofing; Springer: Cham, Switzerland, 2019; pp. 169–183. [Google Scholar] [CrossRef]
  12. Spinoulas, L.; Hussein, M.; Geissbühler, D.; Mathai, J.; Almeida, O.G.; Clivaz, G.; Marcel, S.; AbdAlmageed, W. Multispectral Biometrics System Framework: Application to Presentation Attack Detection. IEEE Sens. J. 2021, 21, 15022–15041. [Google Scholar] [CrossRef]
  13. Husseis, A.; Liu-Jimenez, J.; Goicoechea-Telleria, I.; Sanchez-Reillo, R. A Survey in Presentation Attack and Presentation Attack Detection. In Proceedings of the International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019; pp. 1–13. [Google Scholar] [CrossRef]
  14. Kiefer, R.; Stevens, J.; Patel, A.; Patel, M. A Survey on Spoofing Detection Systems for Fake Fingerprint Presentation Attacks. In Proceedings of the International Conference on Information and Communication Technology for Intelligent Systems, Ahmedabad, India, 15–16 May 2020; pp. 315–334. [Google Scholar] [CrossRef]
  15. Marasco, E.; Ross, A. A Survey on Antispoofing Schemes for Fingerprint Recognition Systems. ACM Comput. Surv. (CSUR) 2014, 47, 1–36. [Google Scholar] [CrossRef]
  16. Singh, J.M.; Madhun, A.; Li, G.; Ramachandra, R. A Survey on Unknown Presentation Attack Detection for Fingerprint. In Proceedings of the International Conference on Intelligent Technologies and Applications, Grimstad, Norway, 28–30 September 2020; pp. 189–202. [Google Scholar] [CrossRef]
  17. Sousedik, C.; Busch, C. Presentation Attack Detection Methods for Fingerprint Recognition Systems: A Survey. IET Biom. 2014, 3, 219–233. [Google Scholar] [CrossRef] [Green Version]
  18. Marcialis, G.M.; Lewicke, A.; Tan, B.; Coli, P.; Grimberg, D.; Congiu, A.; Tidu, A.; Roli, F.; Schuckers, S. First International Fingerprint Liveness Detection Competition—LivDet 2009. In Proceedings of the International Conference on Image Analysis and Processing, Vietri sul Mare, Italy, 8–11 September 2009; pp. 12–23. [Google Scholar] [CrossRef] [Green Version]
  19. Yambay, D.; Ghiani, L.; Denti, P.; Marcialis, G.L.; Roli, F.; Schuckers, S. LivDet 2011 Fingerprint Liveness Detection Competition 2011. In Proceedings of the International Conference on Biometrics (ICB), Washington, DC, USA, 11–13 October 2011; pp. 208–215. [Google Scholar] [CrossRef]
  20. Ghiani, L.; Yambay, D.; Mura, V.; Tocco, S.; Marcialis, G.L.; Roli, F.; Schuckers, S.A. LivDet 2013 Fingerprint Liveness Detection Competition 2013. In Proceedings of the International Conference on Biometrics (ICB), Madrid, Spain, 4–7 June 2013; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  21. Mura, V.; Ghiani, L.; Marcialis, G.L.; Roli, F.; Yambay, D.; Schuckers, S. LivDet 2015 Fingerprint Liveness Detection Competition 2015. In Proceedings of the International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA, 8–11 September 2015; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  22. Mura, V.; Orrù, G.; Casula, R.; Sibiriu, A.; Loi, G.; Tuveri, P.; Ghiani, L.; Marcialis, G.L. LivDet 2017 Fingerprint Liveness Detection Competition 2017. In Proceedings of the International Conference on Biometrics (ICB), Gold Coast, Australia, 20–23 February 2018; pp. 297–302. [Google Scholar] [CrossRef] [Green Version]
  23. Orrù, G.; Casula, R.; Tuveri, P.; Bazzoni, C.; Dessalvi, G.; Micheletto, M.; Ghiani, L.; Marcialis, G.L. LivDet in Action—Fingerprint Liveness Detection Competition 2019. In Proceedings of the International Conference on Biometrics (ICB), Crete, Greece, 4–7 June 2019; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  24. Marasco, E.; Sansone, C. On the Robustness of Fingerprint Liveness Detection Algorithms against New Materials used for Spoofing. Biosignals 2011, 8, 553–555. [Google Scholar] [CrossRef] [Green Version]
  25. Nogueira, R.F.; de Alencar Lotufo, R.; Machado, R.C. Evaluating software-based fingerprint liveness detection using Convolutional Networks and Local Binary Patterns. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), Rome, Italy, 17 October 2014; pp. 22–29. [Google Scholar] [CrossRef] [Green Version]
  26. Rattani, A.; Scheirer, W.J.; Ross, A. Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials. IEEE Trans. Inf. Forensics Secur. (TIFS) 2015, 10, 2447–2460. [Google Scholar] [CrossRef]
  27. Sequeira, A.F.; Cardoso, J.S. Fingerprint Liveness Detection in the Presence of Capable Intruders. Sensors 2015, 15, 14615–14638. [Google Scholar] [CrossRef] [Green Version]
  28. Ding, Y.; Ross, A. An Ensemble of One-Class SVMs for Fingerprint Spoof Detection Across Different Fabrication Materials. In Proceedings of the International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, United Arab Emirates, 4–7 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
  29. Toosi, A.; Bottino, A.; Cumani, S.; Negri, P.; Sottile, P.L. Feature Fusion for Fingerprint Liveness Detection: A Comparative Study. IEEE Access 2017, 5, 23695–23709. [Google Scholar] [CrossRef]
  30. Menotti, D.; Chiachia, G.; Pinto, A.; Schwartz, W.R.; Pedrini, H.; Falcao, A.X.; Rocha, A. Deep Representations for Iris, Face, and Fingerprint Spoofing Detection. IEEE Trans. Inf. Forensics Secur. 2015, 10, 864–879. [Google Scholar] [CrossRef] [Green Version]
  31. Kim, S.; Park, B.; Song, B.; Yang, S. Deep Belief Network based Statistical Feature Learning for Fingerprint Liveness Detection. Pattern Recognit. Lett. 2016, 77, 58–65. [Google Scholar] [CrossRef]
  32. Nogueira, R.F.; de Alencar Lotufo, R.; Machado, R.C. Fingerprint Liveness Detection Using Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. (TIFS) 2016, 11, 1206–1213. [Google Scholar] [CrossRef]
  33. Toosi, A.; Cumani, S.; Bottino, A. CNN Patch-Based Voting for Fingerprint Liveness Detection. In Proceedings of the International Joint Conference Computational Intelligence (IJCCI), Funchal, Portugal, 1–3 November 2017; pp. 158–165. [Google Scholar] [CrossRef]
  34. González-Soler, L.J.; Gomez-Barrero, M.; Chang, L.; Perez-Suarez, A.; Busch, C. Fingerprint Presentation Attack Detection based on Local Features Encoding for Unknown Attacks. IEEE Access 2021, 9, 5806–5820. [Google Scholar] [CrossRef]
  35. González-Soler, L.J.; Gomez-Barrero, M.; Kolberg, J.; Chang, L.; Pérez-Suárez, A.; Busch, C. Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors. IET Biom. 2021, 10, 374–391. [Google Scholar] [CrossRef]
  36. Venkata Reddy, P.; Kumar, A.; Rahman, S.M.K.; Mundra, T.S. A New Antispoofing Approach for Biometric Devices. IEEE Trans. Biomed. Circuits Syst. (TBCAS) 2008, 2, 328–337. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  37. Hengfoss, C.; Kulcke, A.; Mull, G.; Edler, C.; Püschel, K.; Jopp, E. Dynamic Liveness and Forgeries Detection of the Finger Surface on the Basis of Spectroscopy in the 400–1650nm Region. Forensic Sci. Int. 2011, 212, 61–68. [Google Scholar] [CrossRef] [PubMed]
  38. Drahansky, M.; Dolezel, M.; Michal, J.; Brezinova, E.; Yim, J.; Shim, K. New Optical Methods for Liveness Detection on Fingers. BioMed Res. Int. 2013, 2013, 197925. [Google Scholar] [CrossRef]
  39. Jiang, X.; Tang, H.Y.; Lu, Y.; Ng, E.J.; Tsai, J.M.; Boser, B.E.; Horsley, D.A. Ultrasonic Fingerprint Sensor with Transmit Beamforming based on a PMUT Array bonded to CMOS Circuitry. IEEE Trans. Ultrason. Ferroelectr. Freq. Control (TUFFC) 2017, 64, 1401–1408. [Google Scholar] [CrossRef]
  40. Chugh, T.; Cao, K.; Jain, A. Fingerprint Spoof Buster: Use of Minutiae-Centered Patches. IEEE Trans. Inf. Forensics Secur. (TIFS) 2018, 13, 2190–2202. [Google Scholar] [CrossRef]
  41. Engelsma, J.J.; Jain, A.K. Generalizing Fingerprint Spoof Detector: Learning a One-class Classifier. In Proceedings of the International Conference on Biometrics (ICB), Crete, Greece, 4–7 June 2019; pp. 1–8. [Google Scholar] [CrossRef] [Green Version]
  42. Kolberg, J.; Gomez-Barrero, M.; Venkatesh, S.; Ramachandra, R.; Busch, C. Presentation Attack Detection for Finger Recognition. In Handbook of Vascular Biometrics; Springer: Cham, Switzerland, 2020; pp. 435–463. [Google Scholar] [CrossRef] [Green Version]
  43. Pereira, J.A.; Sequeira, A.F.; Pernes, D.; Cardoso, J.S. A Robust Fingerprint Presentation Attack Detection Method Against Unseen Attacks Through Adversarial Learning. In Proceedings of the International Conference on Biometrics Special Interest Group (BIOSIG), Online, 16–18 September 2020; pp. 1–5. [Google Scholar]
  44. Chugh, T.; Jain, A. Fingerprint Spoof Detector Generalization. IEEE Trans. Inf. Forensics Secur. (TIFS) 2020, 16, 42–55. [Google Scholar] [CrossRef]
  45. Grosz, S.A.; Chugh, T.; Jain, A.K. Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach. In Proceedings of the International Conference on Biometrics (IJCB), Houston, TX, USA, 28 September–1 October 2020. [Google Scholar] [CrossRef]
  46. Kolberg, J.; Grimmer, M.; Gomez-Barrero, M.; Busch, C. Anomaly Detection with Convolutional Autoencoders for Fingerprint Presentation Attack Detection. Trans. Biom. Behav. Identity Sci. (TBIOM) 2021, 3, 190–202. [Google Scholar] [CrossRef]
  47. Kolberg, J.; Gomez-Barrero, M.; Busch, C. On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain. IET Biom. 2021, 10, 359–373. [Google Scholar] [CrossRef]
  48. Liu, F.; Liu, H.; Zhang, W.; Liu, G.; Shen, L. One-Class Fingerprint Presentation Attack Detection Using Auto-Encoder Network. IEEE Trans. Image Process. (TIP) 2021, 30, 2394–2407. [Google Scholar] [CrossRef] [PubMed]
  49. Peng, C.; Chen, M.; Jiang, X. Under-Display Ultrasonic Fingerprint Recognition With Finger Vessel Imaging. IEEE Sens. J. 2021, 21, 7412–7419. [Google Scholar] [CrossRef]
  50. Engelsma, J.J.; Cao, K.; Jain, A.K. RaspiReader: Open Source Fingerprint Reader. IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI) 2018, 41, 2511–2524. [Google Scholar] [CrossRef] [Green Version]
  51. Kauba, C.; Debiasi, L.; Uhl, A. Enabling Fingerprint Presentation Attacks: Fake Fingerprint Fabrication Techniques and Recognition Performance. arXiv 2020, arXiv:2012.00606. [Google Scholar]
  52. Cortes, C.; Vapnik, V. Support-vector Networks. Mach. Learn. 1995, 20, 273–297. [Google Scholar] [CrossRef]
  53. Gomez-Barrero, M.; Kolberg, J.; Busch, C. Towards Multi-Modal Finger Presentation Attack Detection. In Proceedings of the International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), Las Palmas de Gran Canaria, Spain, 26–29 November 2018; pp. 547–552. [Google Scholar] [CrossRef]
  54. Keilbach, P.; Kolberg, J.; Gomez-Barrero, M.; Busch, C.; Langweg, H. Fingerprint Presentation Attack Detection using Laser Speckle Contrast Imaging. In Proceedings of the International Conference on Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 26–28 September 2018; pp. 1–6. [Google Scholar] [CrossRef]
  55. Kolberg, J.; Gomez-Barrero, M.; Busch, C. Multi-algorithm Benchmark for Fingerprint Presentation Attack Detection with Laser Speckle Contrast Imaging. In Proceedings of the International Conference on Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 18–20 September 2019; pp. 1–5. [Google Scholar]
  56. Qian, X.; Hua, X.S.; Chen, P.; Ke, L. PLBP: An Effective Local Binary Patterns Texture Descriptor with Pyramid Representation. Pattern Recognit. 2011, 44, 2502–2515. [Google Scholar] [CrossRef]
  57. Husseis, A.; Liu-Jimenez, J.; Sanchez-Reillo, R. Fingerprint Presentation Attack Detection Utilizing Spatio-Temporal Features. Sensors 2021, 21, 2059. [Google Scholar] [CrossRef]
  58. ISO/IEC JTC1 SC37 Biometrics. ISO/IEC 30107-3. Information Technology—Biometric Presentation Attack Detection—Part 3: Testing and Reporting; ISO/IEC, 2017. [Google Scholar]
  59. Plesh, R.; Bahmani, K.; Jang, G.; Yambay, D.; Brownlee, K.; Swyka, T.; Johnson, P.; Ross, A.; Schuckers, S. Fingerprint Presentation Attack Detection utilizing Time-Series, Color Fingerprint Captures. In Proceedings of the International Conference on Biometrics (ICB), Crete, Greece, 4–7 June 2019; pp. 1–8. [Google Scholar] [CrossRef]
  60. Gomez-Barrero, M.; Kolberg, J.; Busch, C. Multi-Modal Fingerprint Presentation Attack Detection: Looking at the Surface and the Inside. In Proceedings of the International Conference on Biometrics (ICB), Crete, Greece, 4–7 June 2019; pp. 1–8. [Google Scholar] [CrossRef]
  61. Rowe, R.K.; Nixon, K.A.; Butler, P.W. Multispectral Fingerprint Image Acquisition. In Advances in Biometrics: Sensors, Algorithms and Systems; Springer: London, UK, 2008; pp. 3–23. [Google Scholar] [CrossRef]
  62. Gomez-Barrero, M.; Tolosana, R.; Kolberg, J.; Busch, C. Multi-Spectral Short Wave Infrared Sensors and Convolutional Neural Networks for Biometric Presentation Attack Detection. In AI and Deep Learning in Biometric Security: Trends, Potential and Challenges; CRC Press: Boca Raton, FL, USA, 2021; pp. 105–132. [Google Scholar] [CrossRef]
Figure 1. An illustration of the fingerprint capture device. ©Jenetric GmbH.
Figure 1. An illustration of the fingerprint capture device. ©Jenetric GmbH.
Sensors 21 05686 g001
Figure 2. A bona fide fingerprint and five different PAIs.
Figure 2. A bona fide fingerprint and five different PAIs.
Sensors 21 05686 g002
Figure 3. The ITO conductors are structured vertically on the capture device to lie in the same direction as the fingers.
Figure 3. The ITO conductors are structured vertically on the capture device to lie in the same direction as the fingers.
Sensors 21 05686 g003
Figure 4. While capturing the fingerprint, the impedance is measured at nine selected frequencies. The resulting feature vector i = i 1 ,   i 2 ,   ,   i 9 is processed by the SVM to derive a decision.
Figure 4. While capturing the fingerprint, the impedance is measured at nine selected frequencies. The resulting feature vector i = i 1 ,   i 2 ,   ,   i 9 is processed by the SVM to derive a decision.
Sensors 21 05686 g004
Figure 5. Conductive augmentations can be created by applying, e.g., nanotips (a) or electric bare paint (b) to the fingerprint PAI (c).
Figure 5. Conductive augmentations can be created by applying, e.g., nanotips (a) or electric bare paint (b) to the fingerprint PAI (c).
Sensors 21 05686 g005
Figure 6. DET plots for the different experiments: (a) baseline and (b) LOO.
Figure 6. DET plots for the different experiments: (a) baseline and (b) LOO.
Sensors 21 05686 g006
Table 2. Nine different frequencies in the range from 1 to 500 kHz are used for the impedance measurements.
Table 2. Nine different frequencies in the range from 1 to 500 kHz are used for the impedance measurements.
FQ 1 FQ 2 FQ 3 FQ 4 FQ 5 FQ 6 FQ 7 FQ 8 FQ 9
(Hz)10002500500010,00025,00050,000100,000250,000500,000
Table 3. A detailed list with the number of samples per PAI species.
Table 3. A detailed list with the number of samples per PAI species.
#PAI Species#Conductive Augmentations
53D printed22dragonskin + bare paint
17acryl22ecoflex + bare paint
16dragonskin20hot glue + bare paint
32ecoflex60latex + bare paint
18foil15school glue + bare paint
37gelafix15wax + bare paint
69gelatin15wood glue + bare paint
6glove nitrile
5hot glue23dragonskin + nanotips
57latex19ecoflex + nanotips
6micro kristal klear20hot glue + nanotips
6MINT stamp60latex + nanotips
20mouldable glue20mouldable glue + nanotips
6nyloprint20school glue + nanotips
8opti clean60silly putty + nanotips
33paper15wax + nanotips
20playdoh19wood glue + nanotips
4school glue
27silicone13wood glue + glycerol
20silly putty
10silly putty metallic
10wax
21windowcolour
5wood
19wood glue
Table 4. Numbers of samples per dataset partition. The same BPs of the baseline partition were used in all LOO partitions.
Table 4. Numbers of samples per dataset partition. The same BPs of the baseline partition were used in all LOO partitions.
TrainingTest
baseline (AP)223692
baseline (BP)223534
LOO dragonskin b , n 22345
LOO ecoflex b , n 22341
LOO gelafix22337
LOO gelatin22369
LOO hot glue b , n 22340
LOO latex b , n 223120
LOO micro kristal klear2236
LOO mouldable glue n 22320
LOO playdoh22320
LOO school glue b , n 22335
LOO silly putty n 22360
LOO wax b , n 22330
LOO wood glue b , n 22334
LOO wood glue glycerol22313
LOO bare paint223169
LOO nanotips223256
b = bare paint, n = nanotips.
Table 5. Results in terms of D-EER and APCER0.2 for the particular partitions.
Table 5. Results in terms of D-EER and APCER0.2 for the particular partitions.
PartitionD-EERAPCER0.2
(%)(%)(#)
baseline2.452.8920/692
LOO dragonskin2.242.221/45
LOO ecoflex0.282.441/41
LOO gelafix0.2818.927/37
LOO gelatin19.0624.6417/69
LOO hot glue0.000.000/40
LOO latex0.982.503/120
LOO micro kristal klear0.100.000/6
LOO mouldable glue0.100.000/20
LOO playdoh0.100.000/20
LOO school glue0.100.000/35
LOO silly putty0.181.671/60
LOO wax0.100.000/30
LOO wood glue0.100.000/34
LOO wood glue glycerol0.100.000/13
LOO bare paint1.1590.53153/169
LOO nanotips0.380.391/256
Table 6. Comparison of state-of-the-art with the proposed fingerprint PAD method regarding the main specifications. The error rates are presented in percentages.
Table 6. Comparison of state-of-the-art with the proposed fingerprint PAD method regarding the main specifications. The error rates are presented in percentages.
Ref.APCERBPCERACER# PAI Species# APs# BPs
software-based
[34]--1.7415≈11,000≈10,200
[35]--2.2313≈9700≈9200
[40]7.301.004.1512≈13,000≈9500
[44]8.220.204.7112≈9700≈5700
hardware-based
[47]1.810.201.0145433919,711
[57]5.001.113.0671386396
[59]3.550.201.831621,70014,892
one-class + hardware-based
[41]50.200.2025.2012553111,880
[46]6.590.203.4045433919,711
[48]5.003.414.21101121233
ours2.890.201.5542915757
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kolberg, J.; Gläsner, D.; Breithaupt, R.; Gomez-Barrero, M.; Reinhold, J.; von Twickel, A.; Busch, C. On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection. Sensors 2021, 21, 5686. https://0-doi-org.brum.beds.ac.uk/10.3390/s21175686

AMA Style

Kolberg J, Gläsner D, Breithaupt R, Gomez-Barrero M, Reinhold J, von Twickel A, Busch C. On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection. Sensors. 2021; 21(17):5686. https://0-doi-org.brum.beds.ac.uk/10.3390/s21175686

Chicago/Turabian Style

Kolberg, Jascha, Daniel Gläsner, Ralph Breithaupt, Marta Gomez-Barrero, Jörg Reinhold, Arndt von Twickel, and Christoph Busch. 2021. "On the Effectiveness of Impedance-Based Fingerprint Presentation Attack Detection" Sensors 21, no. 17: 5686. https://0-doi-org.brum.beds.ac.uk/10.3390/s21175686

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop