Altered Fingerprints: Detection and Localization

by   Elham Tabassi, et al.
Michigan State University

Fingerprint alteration, also referred to as obfuscation presentation attack, is to intentionally tamper or damage the real friction ridge patterns to avoid identification by an AFIS. This paper proposes a method for detection and localization of fingerprint alterations. Our main contributions are: (i) design and train CNN models on fingerprint images and minutiae-centered local patches in the image to detect and localize regions of fingerprint alterations, and (ii) train a Generative Adversarial Network (GAN) to synthesize altered fingerprints whose characteristics are similar to true altered fingerprints. A successfully trained GAN can alleviate the limited availability of altered fingerprint images for research. A database of 4,815 altered fingerprints from 270 subjects, and an equal number of rolled fingerprint images are used to train and test our models. The proposed approach achieves a True Detection Rate (TDR) of 99.24 results. The altered fingerprint detection and localization model and code, and the synthetically generated altered fingerprint dataset will be open-sourced.


page 1

page 3

page 4

page 5

page 6

page 7

page 8


Fingerprint Synthesis: Search with 100 Million Prints

Evaluation of large-scale fingerprint search algorithms has been limited...

RFDforFin: Robust Deep Forgery Detection for GAN-generated Fingerprint Images

With the rapid development of the image generation technologies, the mal...

Single architecture and multiple task deep neural network for altered fingerprint analysis

Fingerprints are one of the most copious evidence in a crime scene and, ...

Robust Defect Detection with Contrastive Localization

Defect detection aims to detect and localize regions out of the normal d...

FDeblur-GAN: Fingerprint Deblurring using Generative Adversarial Network

While working with fingerprint images acquired from crime scenes, mobile...

Comparative analysis of segmentation and generative models for fingerprint retrieval task

Biometric Authentication like Fingerprints has become an integral part o...

DeepMasterPrint: Generating Fingerprints for Presentation Attacks

We present two related methods for creating MasterPrints, synthetic fing...

Please sign up or login with your details

Forgot password? Click here to reset