14EM1D4702.pdf

August 6, 2017 | Author: Srinivas Vasu | Category: Biometrics, Authentication, Security Technology, Access Control, Areas Of Computer Science
Share Embed Donate


Short Description

Download 14EM1D4702.pdf...

Description

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE A THESIS REPORT Submitted in partial fulfillment of the requirement to JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA

For the Award of the Degree of

Master of Technology in Communication Systems

Submitted by K. APARNA JYOTHI (Regd. No: 14EM1D4702) Under the Esteemed Guidance of

Mr. K.VENKATESULU, M.Tech., Assistant Professor in ECE

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING SWARNANDHRA INSTITUTE OF ENGINEERING AND TECHNOLOGY Accredited by NAAC with ‘A’ Grade (Approved by A.I.C.T.E & Affiliated to JNTUK Kakinada) Seetharampuram, Narsapur-534280, West Godavari (Dt.), A.P. 2015-2016

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING SWARNANDHRA INSTITUTE OF ENGINEERING AND TECHNOLOGY Accredited by NAAC with ‘A’ Grade (Approved by A.I.C.T.E & Affiliated to JNTU Kakinada) Seetharampuram, Narsapur-534280, West Godavari (Dt.), A.P.

CERTIFICATE This is to certify that this dissertation work entitled “Fake Biometric

Detection Using Software based Liveness Detection Technique ” being submitted by K. APARNA JYOTHI (14EM1D4702) in partial fulfillment of the requirements for the award of Master of Technology with COMMUNICATION SYSTEMS as specialization is a record of bonafide work carried out by him, during the academic year 2015 – 2016.

Project Guide

Head of the Department

Mr. K.Venkatesulu, M.Tech.,

Mr.V.Srinivas, M.Tech., (Ph.D)

Assistant Professor, ECE

Associate Professor, ECE

EXTERNAL EXAMINER

ACKNOWLEDGEMENT The satisfaction that accompanies the successful completion of every task during my dissertation would be incomplete without the mention of the people who made it possible. I consider it my privilege to express my gratitude and respect to all who guided, inspired and helped me in completion of my project work. I extend my heartfelt gratitude to the Almighty for giving me strength in proceeding with this project titled “Fake Biometric Detection Using Software Based Liveness Detection Technique”. I owe my special thanks to Dr. S. Ramesh Babu, M.Tech.,Ph.D., Secretary & Correspondent,Swarnandhra College of Engineering and Technology, Seetharampuram for providing necessary arrangements to carry out this project. I express my heartfelt thanks to Dr.T.Madhu, M.Tech., Ph.D.FIE.,MISTE, Principal, Swarnandhra College of Engineering & Technology, Seetharampuram for giving me this opportunity for the successful completion of my degree. I would like to express my sincere thanks to Mr.V.Srinivas,M.Tech.(Ph.D)., Associate Professor & Head of the Department of ECE for his valuable suggestions at the time of need. I record with pleasure, of my gratitude to my Project guide Mr.K.Venkatesulu, M.Tech., Assistant Professor, ECE for his simulating guidance and valuable suggestions throughout the project. I am very much grateful to our M.Tech Coordinator Mr.S.Ravichand, M.Tech.(Ph.D)., Associate professor for giving the encouragement that helped me to complete the project successfully. I would like to express my profound sense of gratitude to all the coordinators and faculty members for their cooperation and encouragement throughout my course. Above all, I thank my parents. I feel deep sense of gratitude for my family who formed part of my vision. Finally I thank one and all that have contributed directly or indirectly to this thesis.

K.Aparna jyothi

(14EM1D4702) i

ABSTRACT Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this PROJECT, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. Designing of a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. We outlined several advances that originated both from the cryptographic and biometric community to address this problem. In particular, we outlined the advantages of cancelable biometrics over other approaches and presented a case study of different techniques.This project can be enhanced by reducing the image using DTCWT. This modification can decrease the image size and execution can be reduced by enhancing the image clarity. This enhancement can be shown using PSNR values. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

ii

LIST OF CONTENTS Name Of The Content

Page No.

ACKNOWLEDGEMENT

i

ABSTRACT

ii

LIST OF CONTENTS

iii

LIST OF FIGURES

v

LIST OF TABLES

vi

CHAPTER 1: INTRODUCTION

1

1.1 INTRODUCTION

2

1.2 AIM AND OBJECTIVES

3

1.3 LITERATURE SURVEY

4

1.4 ORGANISATION REPORT CHAPTER 2: EXISTING SYSTEM

5

2.1 EXISTING SYSTEM

7

2.2 DRAWBACKS OF EXISTING SYSTEM

8

6

2.2.1 Duplication with co-operation

8

2.2.2 Duplication without Co-operation

9

CHAPTER 3: PROPOSED SYSTEM

12

3.1 BIOMETRIC AUTHENTICATION

12

3.2 FINGER PRINT RECOGNIZATION

15

3.2.1 Different patterns

15

3.2.2 Minutia features

16

3.3 IRIS

18

3.3.1 Iris image enhancement

18

3.3.2 Iris image Binarization

19

3.3.3 Iris Image Segmentation

19

3.4 MINUTIA Extraction

19

3.4.1 Iris Ridge Thinning

19

3.4.2 Enhanced Thinning

20

3.4.3Enhanced thinning algorithm

21

3.5 FACE RECOGNITION

21

CHAPTER 4: IMPLEMENTATION OF PROJECT

24

iii

4.1 LIVENESS ASSESSMENT IN AUTHENTICATION SYSTEM

25

4.2 SOFTWARE-BASED TECHNIQUES

25

4.3 IMAGE QUALITY ASSESSMENT FOR LIVENESS DETECTION 4.4 FULL-REFERENCE IQ MEASURES 4.4.1 Different types FR-IQ Measurements

26 28 30

4.5 NO-REFERENCE IQ MEASURES

33

4.6 DUAL TREE COMPLEX WAVELETS TRANSFORM

36

CHAPTER 5: SOFTWARE ASPECTS

39

5.1 INTRODUCTION TO MATLAB

40

CHAPTER 6: RESULTS

47

6.1 TOP MODULE

48

6.2 INPUT PROCESS WINDOW

49

6.3 IDENTIFICATION PROCESS

50

6.4 IQA PARAMETERS

51

6.5 FINAL RESULT

52

6.6 Advantages

53

6.7 Applications

53

CHAPTER 7: CONCLUSION & FUTURE SCOPE

54

7.1 CONCLUSION

55

7.2 FUTURE SCOPE

55

REFERENCES

56

BIBLIOGRAPHY

59

APPENDIX

61

iv

LIST OF FIGURES Figure No.

Name Of The Figure

Page No.

2.1

software-based liveness detection

7

2.2

A Stamp type dummy finger print

9

2.3

A wafer-thin silicon dummy fingerprint

9

3.1

Block diagram of Biometric system

13

3.2(a)

The Arch Pattern

15

3.2(b)

The Loop Pattern

16

3.2(c)

The Whirl pattern

16

3.3(a)

Ridge Ending

17

3.3(b)

Bifurcation

17

3.3(c)

Short Ridge

17

3.4

Iris Real and Fake Images

19

4.1

Block diagram for the proposed system

25

4.2

Classification Of Image Quality Measures

28

4.3

Block diagram for a 3-level DTCWT

36

5.1

Example image (f)

41

5.2

Example picture (rice.png)

45

6.1

Top Module

49

6.2

Input Process Window

50

6.3

Identification Process

51

6.4

Measured IQ Parameters

52

6.5

Final Result

53

v

LIST OF TABLES Table No.

Name of the Table

Page No.

4.1

Different parameters measured for an image

35

4.2

Imtool

46

vi

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 1 INTRODUCTION

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 1

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 1 INTRODUCTION 1.1 INTRODUCTION Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioural characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioural characteristics are related to the pattern of behaviour of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have said that the term behaviour metrics is used to describe the latter class of biometrics. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, so they provide high reliability in verifying the identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information. Securing information and ensuring the privacy of personal identities is a growing concern in today‘s society. Traditional authentication schemes primarily utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Biometrics-based authentication schemes using fingerprints, face recognition, etc., overcome these limitations while offering usability advantages and are therefore rapidly extending traditional authentication schemes. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns as outlined below:

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 2

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

Biometrics is authentic but not secret: Unlike passwords and cryptographic keys that are known only to the user, biometrics such as voice, face, signature, and even fingerprints can be easily recorded and potentially misused without the user‘s consent. There have been several instances where artificial fingerprints have been used to circumvent biometric security systems. Face and voice biometrics are similarly vulnerable to being captured without the user‘s explicit knowledge. In contrast, tokens and knowledge have to be willingly shared by the user to be compromised. Biometrics cannot be revoked or cancelled. Passwords, PINs, etc., can be reset if compromised. Tokens such as credit cards and badges can be replaced if stolen. However, biometrics is permanently associated with the user and cannot be revoked or replaced if compromised. While a user can successively enrol different fingerprints, there is still a limited choice of fingers to choose from. This choice does not exist for other biometric modalities. If once the Biometric is lost, it is compromised forever, why because Biometrics provides usability advantages that it obviates the need to remember and manage multiple passwords and identities. However, this also means that if a biometric is compromised in one application, essentially all applications where the particular biometric is used are compromised. Cross-matching can be used to track individuals without their permission. Since the same biometric might be used for various applications and locations, the user can potentially be tracked if organizations share their respective biometric databases. So in order to provide security from this type of hackers, the traditional authentication schemes are used; by using this scheme the user can maintain different identities/passwords to prevent this hacking. The fact that a biometric remains the same presents a privacy concern. 1.2 AIM & OBJECTIVES: We demonstrate several methods to generate multiple cancellable identifiers from fingerprint images to overcome the hacking techniques. Designing of a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. We outlined several advances that originated both from the cryptographic and biometric community to address this problem. In particular, here we mentioned the advantages of cancellable biometrics SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 3

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

over other approaches and presented a case study of different techniques. This project can be enhanced by reducing the image using DTCWT (Dual Tree Complex Wavelet Transform). The objective of this project is modification can decrease the image size and execution can be reduced by enhancing the image clarity. 1.3 LITERATURE SURVEY: After Rathaetal. formally defined the problem of cancellable biometrics (also called revocable biometrics), many alternate solutions have emerged from both the biometric and cryptographic community. We loosely divide the prior work into the following categories 

Biometric salting: This is similar to password salting in conventional cryptosystems. In this approach, before hashing the password P of the user, it is concatenated with a pseudorandom string S and the resulting hash is stored in the database. The addition of the random sequence increases the entropy and, therefore, the security of the password. Biometric salting is based on the same principle. In some instances, the new representation is quantized to derive robust binary cryptographic keys. However, the quantization is practical only because of the additional entropy introduced through the salt.In this category the defining feature is the addition of user-specific random



information to increase the entropy of the biometric template.  

Biometric key generation: In this approach, a key is derived directly from the biometric signal. The advantage is that there is no need for user-specific keys or tokens as required by ―biometric salting‖ methods and that it is therefore scalable. A key, parameterized by the biometric B, is stored instead of the actual biometric itself.The major problem with this approach is achieving error tolerance in the key. The defining feature of this category is the attempt to derive robust binary representations (keys) from noisy biometric data



without the use of additional information.  

Fuzzy schemes: Another approach for constructing cancellable templates involves the use of public auxiliary information P (also called helper data, shielding functions, or fuzzy extractors), which is combined with biometric information to reduce the intra user variation. The following is the defining feature of this category: The schemes define a metric (e.g., Hamming,

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 4

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

Euclidian, set distance, etc.) on noisy biometric data B and B0. Among the different threats analyzed, the so-called direct or spoofing attacks have motivated the biometric community to study the vulnerabilities against this type of fraudulent actions in modalities such as the iris, the fingerprint, the face, the signature, or even the gait and multimodal approaches. 1.4 ORGANISATION REPORT: This thesis consists of total SEVEN chapters that include introduction and conclusions. Chapter 2 describes about existing system. in chapter 3 conceptual analysis of proposed system.chapter 4 having implementation of project. chapter 5 describes software aspects. Chapter 6 result analysis. in chapter 7 advantages and applications are discussed.

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 5

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER-2 EXISTING SYSTEM

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 6

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 2 EXISTING SYSTEM 2.1 EXISTING SYSTEM: In recent years, the increasing interest in the evaluation of biometric systems security has led to the creation of numerous and very diverse initiatives focused on Biometric systems. Among the different threats analyzed, the so-called direct or spoofing attacks have motivated the biometric community to study the vulnerabilities against this type of fraudulent actions in modalities such as the iris, the fingerprint, the face, the signature, or even the gait and multimodal approaches. In these attacks, the intruder uses some type of synthetically produced artefact (e.g., gummy finger, printed iris image or face mask), or tries to mimic the behaviour of the genuine user (e.g., gait, signature), to fraudulently access the biometric system. As these types of attacks are performed in the analog domain and the interaction with the device is done following the regular protocol, the usual digital protection mechanisms (e.g., encryption, digital signature or watermarking) are not effective. Besides other anti-spoofing approaches such as the use of multi biometrics or challenge-response methods, special attention has been paid by the users to the liveness detection techniques, which use different physiological properties to distinguish between real and fake traits. Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed.

Fig 2.1: Types of attacks detected by hardware-based & software-based liveness detection

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 7

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

Liveness detection methods are usually classified into one of two groups shown in figure 2.1. (i) Hardware-based techniques, which add some specific device to the sensor in order to detect particular properties of a living trait (e.g., fingerprint sweat, blood pressure, or specific reflection properties of the eye). (ii)

Software-based techniques, in this case the fake trait is detected once the sample has been acquired with a standard sensor (i.e., features used to distinguish between real and fake traits are extracted from the biometric sample, and not from the trait itself). The two types of methods present certain advantages and drawbacks over the

other and, in general, a combination of both would be the most desirable protection approach to increase the security of biometric systems. 2.2 DRAWBACKS OF EXISTING SYSTEM: In the existing system we are using hardware techniques for implementing biometrics. In Hardware-based techniques, which add some specific device to the sensor in order to detect particular properties of a living trait (e.g., fingerprint sweat, blood pressure, or specific reflection properties of the eye), as a coarse comparison, hardware-based schemes usually present a higher fake detection rate. Furthermore, as they operate directly on the acquired sample (and not on the biometric trait itself), and the drawbacks in existing system are   



More costlier, 



More complexity, 



High computational delay, 



Harmful to the human. 

And also in hardware Biometric systems one can easily misuse the system by creating fake or dummy fingerprints and dummy face masks etc. for example creation of dummy finger prints are explained below: Dummy fingerprints can be created in two ways (i) Duplication without Co-operation (ii) Duplication with Co-operation. 2.2.1 Duplication without Co-operation: For duplication of a fingerprint without co-operation of the original person it is necessary to obtain a print of the finger from a glass or another surface. One of the best ways to obtain such a print could be the fingerprint scanner itself. If the scanner is cleaned before a person will be using it, an almost perfect print is left on the scanner surface since people tend to press their finger (which is the verification finger!) firmly on the scanner. Some SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 8

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

more expertise is required to create a dummy from such a print, but every dental technician has the skills and equipment to create one. This is an accurate description of how to create a dummy of the fingerprint. A picture of a stamp that is created using this method can be found in Figure 2.

Fig 2.2 A stamp type dummy finger print

2.2.2 Duplication with Co-operation: Duplication of a fingerprint with co-operation of its owner is an easiest method since it is possible to compare the dummy with the original fingerprint in all aspects and adapt it accordingly. First, a plaster cast of the finger is created. This cast is then filled with silicon rubber to create a waferthin silicon dummy. This dummy can be glued to anyone's finger without it being noticeable to the eye. So one can easily create the dummy finger and can get the information without the intervention of original user. It follows that creation of this type of dummy is possible with very limited means within a few hours.

Fig 2.3: A wafer-thin silicon dummy fingerprint

To overcome this drawbacks, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images, that is Software Based techniques are used, in this case the fake trait is detected once the sample has been SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 9

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

acquired with a standard sensor (i.e., features used to distinguish between real and fake traits are extracted from the biometric sample, and not from the trait itself). In this several advances that originated both from the cryptographic and biometric community to address this problem. As a comparison, hardware-based schemes usually present a higher fake detection rate, while software-based techniques are in general less expensive (as no extra device is needed), and less intrusive since their implementation is transparent to the user. Furthermore, as they operate directly on the acquired sample (and not on the biometric trait itself), software-based techniques may be embedded in the feature extractor module which makes them potentially capable of detecting other types of illegal break-in attempts not necessarily classified as spoofing attacks. For instance, software-based methods can protect the system against the injection of reconstructed or synthetic samples into the communication channel between the sensor and the feature extractor.

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 10

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 3 PROPOSED SYSTEM

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 11

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 3 PROPOSED SYSTEM The Proposed project can be enhanced from the existing technique by reducing the image using DTCWT (Dual Tree Complex Wavelet Transform). This modification can decrease the image size and execution can be reduced by enhancing the image clarity. This enhancement can be shown using PSNR (Peak Signal to Noise Ratio) values and provides high security to biometrics from the fake users. 3.1 BIOMETRIC AUTHENTICATION: Many different aspects of human physiology, chemistry or behaviour can be used for biometric authentication. The selection of a particular biometric for use in a specific application involves a weighting of several factors. Jain et al. (1999) identified seven different factors which are used when assessing the suitability of any trait for use in biometric authentication. Universality means that every person using a system should possess the trait. Uniqueness means the trait should be sufficiently different for individuals in the relevant population such that they can be distinguished from one another. Permanence relates to the manner in which a trait varies over time. More specifically, a trait with 'good' permanence will be reasonably invariant over time with respect to the specific matching algorithm. Measurability (collectability) is nothing but ease of acquisition or measurement of the trait. In addition, acquired data should be in a form that permits subsequent processing and extraction of the relevant feature sets. Performance relates to the accuracy, speed, and robustness of technology used (see performance section for more details). Acceptability relates to how well individuals in the relevant population accept the technology such that they are willing to have their biometric trait captured and assessed. Circumvention relates to the ease with which a trait might be imitated using an artifact or substitute. The block diagram illustrates the two basic modes of a biometric system First, in verification (or authentication) mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps are involved in the verification of a person. This process may use a smart card, username or ID number (e.g. PIN) to SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 12

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

indicate which template should be used for comparison 'Positive recognition' is a common use of the verification mode, "where the aim is to prevent multiple people from using same identity.

Fig 3.1 Block diagram of Biometric system

 



In the first step, reference models for all the users are generated and stored in the model database. 



In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold. 



Third step is the testing step.  Second is the identification mode, in identification mode the system

performs a one-to-many comparison against a biometric database whether the given image is original or not (fake image). The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Identification mode can be used either for 'positive recognition' (so that the user does not have to provide any information about the template to be used) or for 'negative recognition' of the person "where the system establishes whether the person is who she (implicitly or explicitly) denies to be". The latter function can only be achieved through biometrics since other methods of personal recognition such as passwords, PINs or keys are ineffective.

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 13

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

The first time an individual uses a biometric system is called enrollmen1t. During the enrolment, biometric information from an individual is captured and stored. In subsequent uses, biometric information is detected and compared with the information stored at the time of enrolment. Note that it is crucial that storage and retrieval of such systems themselves be secure if the biometric system is to be robust. In the block diagram of Biometric system, the first block (sensor) is the interface between the real world and the system; it has to acquire all the necessary data. It is an image acquisition system, but it can change according to the characteristics desired. The second block performs all the necessary pre-processing: it has to removing background noise from the sensor, to enhance the input, to use some kind of normalization, etc. In the third block necessary features are extracted. This step is an important step as the correct features need to be extracted in the optimal way. A vector of numbers or an image with particular properties is used to create a template. A template is a synthesis of the relevant characteristics extracted from the source. Elements of the biometric measurement that are not used in the comparison algorithm are discarded in the template to reduce the file size and to protect the identity of the enrollee during the enrollment phase, the template is simply stored somewhere (on a card or within a database or both). During the matching phase, the obtained template is passed to a matcher that compares it with other existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The matching program will analyze the template with the input. This will then be output for any specified use or purpose (e.g. entrance in a restricted area) Selection of biometrics in any practical application depending upon the characteristic measurements and user requirements. We should consider Performance, Acceptability, Circumvention, Robustness, Population coverage, Size, Identity theft deterrence in selecting a particular biometric. Selection of biometric based on user requirement considers Sensor availability, Device availability, Computational time and reliability, Cost, Sensor area and power consumption.

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 14

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

3.2 FINGERPRINT RECOGNITION: Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Generally most of biometrics which are manufactured at the early years based on finger recognization. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance). The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. But nowadays there are many ways to create a dummy fingerprints without permission of original one. So, in order to overcome all these cheating techniques we are using this liveness security system in biometrics. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. 3.2.1 Different patterns: The three basic patterns of fingerprint ridges are the arch, loop, and whorl: 

Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. 







Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side. 



Whorl: Ridges form circularly around a central point on the finger. 

Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited. The basic structure of three different fingerprint patters are showed below

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 15

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

3.2.2 Minutia features: In the fingerprint recognization the second class of algorithm is minutia algorithm. As a global feature, orientation field describes one of the basic structures of a fingerprint. When the fingerprint is complemented with the minutiae, we can get more information. Thus, a better performance can be obtained by fusing the results of orientation field matching with conventional minutiae-based matching. Some studies showed that incorporating local (minutiae) and global (orientation field) feature can largely improve the performance. However, as stated above, in many practical fingerprint recognition systems, the original images and orientation field images are not saved, and we cannot compute the orientation field directly. In some other systems, additional orientation features cannot be saved into the existing database easily, and we have to compute the orientation field by only using the information of minutiae template. An interpolation algorithm is proposed to estimate the orientation field from minutiae template (they used it to predict the class of the fingerprint but not for fingerprint matching), in which the orientation of a given point was computed from its neighboring minutiae. To consider the global information, we will use the orientation model to reconstruct the orientation field from minutiae. Firstly we interpolate a few virtual‖ minutiae in the sparse areas, and then

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 16

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

apply the model-based method on these mixed minutiae (including the real and virtual minutiae). After that, the reconstructed orientation field is used into the matching stage by combining with conventional minutiae-based matching. In this way we have to create an oriented field fingerprint using minutia extraction techniques. There are many different minutia extraction fields for different fingerprint ridges; here we use mainly three different types of minutia extraction techniques. Our present proposal is liveness detection method which uses this technique whether person who uses the system is original or not. Generally a person can cheat others but a machine not do that but nowadays the cheaters can try to cheat system also by preparing the dummy fingerprints. To protect the world from these unwanted users we are using the fingerprint recognization with minutia extraction fields. When the fingerprint is complemented with the minutiae, we can get more information and better performance can be obtained by fusing the results in biometric systems. The three main minutia extraction fields used in fingerprint ridges are given below; The major minatue features of fingerprint ridges are: Ridge ending and bifurcation &short ridge. The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint. Minutiae and patterns are very important in the analysis of fingerprints since no two fingers have been shown to be identical.

Fingerprint matching is the process used to determine whether two sets of SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 17

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

fingerprint ridge detail come from the same finger. There exist multiple algorithms that do fingerprint matching in many different ways. Some methods involve matching minutiae points between the two images, while others look for similarities in the bigger structure of the fingerprint. In this project we propose a method for fingerprint matching based on minutiae matching. However, unlike conventional minutiae matching algorithms our algorithm also takes into account region and line structures that exist between minutiae pairs. This allows for more structural information of the fingerprint to be accounted for thus resulting in stronger certainty of matching minutiae. Also, since most of the region analysis is pre-processed it does not make the algorithm slower. The Evidence from the testing of the pre-processed images gives stronger assurance that using such data could lead to faster and stronger matches.

3.3 IRIS: The processing capabilities of the IRIS vision systems specifically using the IRIS v. The first stage of the architecture embeds sensors, parallel processing analog and mixed-signal circuitry, control circuitry and memory. This front-stage is implemented through dedicated bio-inspired chips. The second stage of the IRIS vision system architecture is a digital microprocessor. The combination of parallel preprocessing and serial post-processing makes the IRIS systems very efficient particularly the IRIS systems are capable to close the sensor-processing-actuation loop at a high speed. In this demo, the IRIS v is used to recognize data matrix codes at more than 200 codes/sec rate. 3.3.1 Iris image enhancement: Iris Image enhancement is used to improve the image clarity for the easy of further operations. Since the iris images acquired from sensors or other media are not assured with perfect quality, enhancement methods, for increasing the contrast between ridges and furrows and for connecting the false broken points of ridges due to insufficient amount of ink, are very useful to keep a higher accuracy to iris recognition. Two methods are used for the iris image enhancement, the first one is Histogram Equalization; the second one is Fourier Transform. Histogram equalization: Histogram equalization is nothing but to separate the dynamic range and also provide the equal pixels in all the gray levels. Fourier Transform: Fourier (FT) transform is nothing but a mathematical prism. In

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 18

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

FT the original signal is represented in the form of infinite frequencies of varying amplitude. All the Images are periodic signals so FT are used to enhance the images. 3.3.2 Iris Image Binarization: A locally adaptive binarization method is performed to binarize the iris image. Such a named method comes from the mechanism of transforming a pixel value to 1 if the value is larger than the mean intensity value of the current block (16x16) to which the pixel belongs. 3.3.3 Iris Image Segmentation: In general, only a Region of Interest (ROI) is useful to be recognized for each iris image. The image area without effective ridges and furrows is first discarded since it only holds background information. Then the bound of the remaining effective area is sketched out since the minutia in the bounded region is confusing with those spurious minutia‘s that are generated when the ridges are out of the sensor. To extract the ROI, a two-step method is used. The first step is block direction estimation and direction variety check, while the second is intrigued from some Morphological methods. Two Morphological operations called OPEN and CLOSE are adopted. The OPEN operation can expand images and remove peaks introduced by background noise. The CLOSE operation can shrink images and eliminate small cavities.

Fig 3.4 Iris Real and Fake Images

3.4 MINUTIA EXTRACTION: Minutiae Extraction steps are explained below 3.4.1 Iris Ridge Thinning: Thinning is the process of reducing the thickness of each line of patterns to SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 19

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

just a single pixel width [5, 7]. The requirements of a good thinning algorithm with respect to an iris are  The thinned iris image obtained should be of single pixel width with no discontinuities. 



 Each ridge should be thinned to its centre pixel. 



 Noise and singular pixels should be eliminated. 



 No further removal of pixels should be possible after completion of thinning process.  Use an iterative, parallel thinning algorithm, in each scan of the full iris

image, the algorithm marks down redundant pixels in each small image window (3x3). And finally removes all those marked pixels after several scans. But it is tested that such an iterative, parallel thinning algorithm has bad efficiency although it can get an ideal thinned ridge map after enough scans. Uses a one-inall method to extract thinned ridges from gray-level iris images directly. Their method traces along the ridges having maximum gray intensity value. However, binarization is implicitly enforced since only pixels with maximum gray intensity value are remained. The advancement of each trace step still has large computation complexity although it does not require the movement of pixel by pixel as in other thinning algorithms. Thus the third method is bid out which uses the built-in Morphological thinning function in MATLAB to do the thinning and after that an enhanced thinning algorithm is applied to obtain an accurately thinned image. 3.4.2 Enhanced Thinning: Ridge Thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel wide. Ideally, the width of the skeleton should be strictly one pixel. However, this is not always true. There are still some locations, where the skeleton has a two-pixel width at some erroneous pixel locations. An erroneous pixel is defined as the one with more than two 4-connected neighbours. These erroneous pixels exist in the fork regions where bifurcations should be detected, but they have CN = 2 instead of CN>2. The existence of erroneous pixels may  



destroy the integrity of spurious bridges and spurs, 



exchange the type of minutiae points, and 



miss detect true bifurcations, 

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 20

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

Therefore, before minutiae extraction, there is a need to develop a validation algorithm to eliminate the erroneous pixels while preserving the skeleton connectivity at the fork regions. For this purpose an enhanced thinning algorithm is bid out. 3.4.3 Enhanced thinning algorithm: Step 1: Scanning the skeleton of iris image row by row from top-left to bottomright. Check if the pixel is 1. Step 2: Count its four connected neighbours. Step 3: If the sum is 2+,then is erroneous pixel Step 4: Remove the erroneous pixel. Step 5: Repeat steps 1 – 4 until whole of the image is scanned and the erroneous pixels are removed. 3.5 FACE RECOGNITION: Multibiometrics refers to the use of a combination of two or more sensor modalities in a single identification system. The reason for combining different sensor modalities is to improve the recognition accuracy. A multisensory biometric system involving visual and thermal face images is present in this project. Face recognition is one of the most important applications of image analysis, its prime applications being recognition of individuals for the purpose of security. It is one of the most no obtrusive biometric techniques. However, the conclusion was that, though the recognition performance of Even though faces recognition technology has moved from linear subspace methods. Eigen and Fisher faces, to nonlinear methods such as kernel principle component analysis (KPCA) and kernel Fischer discriminate analysis (KFDA), many of the problems are yet to be addressed. Also, the nature of research studies had been more on visible imagery with less attention on its thermal counterpart. Previous studies have shown that infrared imagery offers a promising alternative to visible imagery for handling variations in face appearance due to illumination changes. It is observed that face recognition on thermal images degrades more sharply than with visible images when probe and gallery images are chosen from different sessions. Results in indicated better performance for visible imagery indoors under controlled lighting conditions, but thermal imagery-based face

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 21

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

recognition was better than its visible counterpart outdoors. Also, the recognition results of thermal imagery for both indoors and outdoors was found to be similar, thus proving that illumination had very little effect on thermal imagery. Thermal imagery degraded the fusion of both visible and thermal modalities yielded better overall performance. Feature-based face recognition techniques have demonstrated the capability of invariance to facial variations caused by illumination and have achieved high accuracy rates. To make the recognition process illumination invariant, phase congruency feature maps are used instead of intensity values as the input to the face recognition system. The feature selection process presented in this PROJECT is derived from the concept of modular spaces. Recognition techniques based on local regions have achieved high accuracy rates. Though the face images are affected due to variations such as non uniform illumination, expressions and partial occlusions, facial variations are confined mostly to local regions. Modularizing the images would help to localize these variations, provided the modules created are sufficiently small. But in this process, a large amount of dependencies among various neighboring pixels might be ignored. This can be countered by making the modules larger, but this would result in an improper localization of the facial variations. In order to deal with this problem, a module creation strategy has been implemented in this PROJECT which considers additional pixel dependencies across various sub-regions. This helps in providing additional information that could help in improving the classification accuracy. Also, linear subspace approaches such as PCA will not be able to capture the relationship among more than two variables. They cannot depict the variations caused by illuminations, expressions, etc., properly. In order to capture the relationships among more than two pixels, the data is projected into nonlinear higher dimensional spaces using the kernel method. This enables to capture the nonlinear relationships among the pixels within the modules. Face recognition accuracy in thermal images has been lower compared to visible images under controlled environments. The major problems in thermal face recognition are (i) Variations in local regions due to temperature inequalities and

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 22

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

(ii) Opaqueness of glass and, hence, partially occluded faces. Thermal imaging is sensitive to temperature changes in the surrounding environment. Also it is sensitive to variations in the heat patterns of the face. Factors that could contribute to these variations include facial expressions, physical conditions such as lack of sleep, and psychological conditions such as fear, stress, excitement, etc. Although the problems faced by thermal facial recognition are different from the visual counterpart, they are similar in the sense that many of the variations are confined to local regions. The proposed feature selection process overcomes all the above mentioned challenges due to its robustness to variations caused due to facial expressions, illumination, contrast and partial occlusions.

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 23

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 4 IMPLEMENTATION OF PROJECT

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 24

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 4 IMPLEMENTATION OF PROJECT 4.1 LIVENESS ASSESSMENT IN AUTHENTICATION SYSTEM: Liveness assessment methods represent a challenging engineering problem as they have to satisfy certain demanding requirements: (i) Non-invasive, the technique should in no case be harmful for the individual or require an excessive contact with the user; (ii) User friendly, people should not be reluctant to use it; (iii) Fast results have to be produced in a much reduced interval as the user cannot be asked to interact with the sensor for a long period of time; (iv) Low cost, a wide use cannot be expected if the cost is excessively high; (v) Performance, in addition to having a good fake detection rate, the protection scheme should not degrade the recognition performance (i.e., false rejection) of the biometric system. 4.2 SOFTWARE-BASED TECHNIQUES: In this case the fake trait is detected once the sample has been acquired with a standard sensor (i.e., features used to distinguish between real and fake traits are extracted from the biometric sample, and not from the trait itself).

In the present work we propose a novel software-based multi-biometric and SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 25

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

multi-attack protection method which is used to overcome these limitations by using image quality assessment (IQA). It is not only capable of operating with a very good performance under different biometric systems (multi-biometric) and for diverse spoofing scenarios, but it also provides a very good level of protection against certain non-spoofing attacks (multi-attack). Moreover, the software based techniques for this type of systems provides more advantages and fast and accurate responses, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake. And this technique is user-friendly (transparent to the user) and doesn‘t allow the fake users; cheap and easy to embed in already functional systems (as no new piece of hardware is required). An added advantage of the proposed technique is its speed and very low complexity, which makes it very well suited to operate on real scenarios (one of the desired characteristics of this type of methods). As it does not deploy any traitspecific property (e.g., minutiae points, iris position or face detection), the computation load needed for image processing purposes is very reduced, using only general image quality measures fast to compute, combined with very simple classifiers. It has been tested on publicly available attack databases of iris, fingerprint and 2D face, where it has reached results fully comparable to those obtained on the same databases and following the same experimental protocols by more complex trait-specific top-ranked approaches from the state-of-the-art. 4.3 IMAGE QUALITY ASSESSMENT FOR LIVENESS DETECTION: The use of image quality assessment for Liveness detection is motivated by the assumption that: ―It is expected that a fake image captured in an attack attempt will have different quality than a real sample acquired in the normal operation scenario for which the sensor was designed.‖ Expected quality differences between real and fake samples may include: degree of sharpness, color and luminance levels, local artifacts, amount of information found in both type of images (entropy), structural distortions or natural appearance. For example, iris images captured from a printed PROJECT are more likely to be blurred or out of focus due to trembling; face images captured from a mobile device will probably be over-or under-exposed; and it is not rare that fingerprint images captured from a gummy finger present local acquisition artifacts such as spots and patches. Furthermore, in an eventual attack in which a synthetically SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 26

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

produced image is directly injected to the communication channel before the feature extractor, this fake sample will most likely lack some of the properties found in natural images. Following this ―quality-difference hypothesis, in the present research work we explore the potential of general image quality assessment as a protection method against different biometric attacks (with special attention to spoofing). As the implemented features do not evaluate any specific property of a given biometric modality or of a specific attack, they may be computed on any image. This gives the proposed method a new multi-biometric dimension which is not found in previously described protection schemes. In the current state-of-the-art, the rationale behind the use of IQA features for liveness detection is supported by three factors: Image quality has been successfully used in previous works for image manipulation detection and stag analysis in the forensic field. To a certain extent, many spoofing attacks, especially those which involve taking a picture of a facial image displayed in a2D device (e.g., spoofing attacks with printed iris or face images), may be regarded as a type of image manipulation which can be effectively detected, as shown in the present research work, by the use of different quality features. In addition to the previous studies in the forensic area, different features measuring trait-specific quality properties have already been used for Liveness detection purposes in fingerprint and iris applications. However, even though these two works give a solid basis to the use of image quality as a protection method in biometric systems, none of them is general. For instance, measuring the ridge and valley frequency may be a good parameter to detect certain fingerprint spoofs, but it cannot be used in iris Liveness detection. On the other hand, the amount of occlusion of the eye is valid as an iris antispoofing mechanism, but will have little use in fake fingerprint detection. This same reasoning can be applied to the vast majority of the Liveness detection methods found in the state-of-the art. Although all of them represent very valuable works which bring insight into the difficult problem of spoofing detection, they fail to generalize to different problems as they are usually designed to work on one specific modality and, in many cases, also to detect one specific type of spoofing attack. Human observers very often refer to the different appearance‖ of real and fake samples to distinguish between them. As stated above, the different metrics and SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 27

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

methods designed for IQA intend to estimate in an objective and reliable way the perceived appearance of images by humans. Different quality measures present different sensitivities to image artifacts and distortions. For instance, measures like the mean squared error respond more to additive noise, whereas others such as the spectral phase error are more sensitive to blur; while gradient-related features react to distortions concentrated around edges and textures. Therefore, using a wide range of IQMs exploiting complementary image quality properties should permit to detect the aforementioned quality differences between real and fake samples expected to be found in many attack attempts (i.e., providing the method with multi- attack protection capabilities). All these observations lead us to believe that there is sound proof for the quality-difference‖ hypothesis and that image quality measures have the potential to achieve success in biometric protection tasks.

4.4 FULL-REFERENCE IQ MEASURES: Full-reference (FR) IQA methods rely on the availability of a clean undistorted reference image to estimate the quality of the test sample. In the problem of fake detection addressed in this work such a reference image is unknown, as the detection system only has access to the input sample. In order to circumvent this limitation, the same strategy already successfully used for

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 28

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

image manipulation detection and for stage analysis, is implemented here. The input grey-scale image I (of size N × M) is filtered with a low-pass Gaussian kernel (σ = 0.5 and size 3 × 3) in order to generate a smoothed version Î .Then, the quality between both images (I and Î) is computed according to the corresponding full-reference IQA metric. This approach assumes that the loss of quality produced by Gaussian filtering differs between real and fake biometric samples. Gaussian filter: In electronics and signal processing, a Gaussian filter is a filter whose impulse response is a Gaussian function (or an approximation to it). Gaussian filters have the properties of having no overshoot to a step function input while minimizing the rise and fall time. This behavior is closely connected to the fact that the Gaussian filter has the minimum possible group delay. It is considered the ideal time domain filter, just as the since is the ideal frequency domain filter. These properties are important in areas such as oscilloscope and digital telecommunication systems. Mathematically, a Gaussian filter modifies the input signal by convolution with a Gaussian function; this transformation is also known as the Weierstrass transform. The Gaussian function is non-zero for x \in (-\infty,\infty) and would theoretically require an infinite window length. However, since it decays rapidly, it is often reasonable to truncate the filter window and implement the filter directly for narrow windows, in effect by using a simple rectangular window function. In other cases, the truncation may introduce significant errors. Better results can be achieved by instead using a different window function; see scale space implementation for details. Filtering involves convolution, the filter function is said to be the kernel of an integral transform. The Gaussian kernel is continuous. Most commonly, the discrete equivalent is the sampled Gaussian kernel that is produced by sampling points from the continuous Gaussian. An alternate method is to use the discrete Gaussian kernel which has superior characteristics for some purposes. Unlike the sampled Gaussian kernel, the discrete Gaussian kernel is the solution to the discrete diffusion equation. Since the Fourier transform of the Gaussian function yields a Gaussian function, the signal (preferably after being divided into overlapping windowed blocks) can be transformed with a Fast Fourier transform, multiplied with a Gaussian function and transformed back. This is the standard procedure of applying an arbitrary finite

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 29

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

impulse response filter, with the only difference that the Fourier transform of the filter window is explicitly known. Due to the central limit theorem, the Gaussian can be approximated by several runs of a very simple filter such as the moving average. The simple moving average corresponds to convolution with the constant B-spline ( a rectangular pulse ), and, for example, four iterations of a moving average yields a cubic B-spline as filter window which approximates the Gaussian quite well. 4.4.1 Different types FR-IQ Measurements: Error Sensitivity Measures: Traditional perceptual image quality assessment approaches are based on measuring the errors (i.e., signal differences) between the distorted and the reference images, and attempt to quantify these errors in a way that simulates human visual error sensitivity features. Although their efficiency as signal fidelity measures is somewhat controversial, up to date, these are probably the most widely used methods for IQA as they conveniently make use of many known psychophysical features of the human visual system, they are easy to calculate and usually have very low computational complexity. Several of these metrics have been included in the 25-feature parameterization proposed in the present work. For clarity, these features have been classified here into five different methods those are listed below: 

Pixel Difference measures: These features compute the distortion between two images on the basis of their pixel wise differences. Here we include: Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR), Signal to Noise Ratio (SNR), Structural Content (SC), Maximum Difference (MD), Average Difference (AD), Normalized Absolute Error (NAE), R-Averaged Maximum Difference (RAMD) and Laplacian Mean Squared Error (LMSE). The formal definitions for each of these features are given in Table I. In the RAMD entry in Table I, maxr is defined as the r -highest pixel difference between two images. For the present implementation, R = 10. In the LMSE



entry in Table I, h(Ii, j ) = Ii+1, j +Ii−1, j + Ii, j+1 + Ii, j−1 − 4Ii, j .  

Correlation-based measures: The similarity between two digital images can also be quantified in terms of the correlation function. A variant of correlation based measures can be obtained by considering the statistics of the angles between the pixel vectors of the original and distorted images. These features include (also defined in Table I): Normalized Cross-Correlation (NXC), Mean Angle Similarity (MAS) and Mean Angle-Magnitude Similarity

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 30

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE



(MAMS).  

Edge-based measures: Edges and other two-dimensional features such as corners, are some of the most informative parts of an image, which play a key role in the human visual system and in many computer vision algorithms including quality assessment application . Since the structural distortion of an image is tightly linked with its edge degradation, here we have considered two edge-related quality measures: Total Edge Difference (TED) and Total Corner Difference (TCD). In order to implement both features, which are computed according to the corresponding expressions given in Table I, we use: (i) the Sobel operator to build the binary edge maps IE and ÎE ; ( ii) the Harris corner detector to compute the number of corners Ncr and N̂cr found



in I and Î.  

Spectral distance measures: The Fourier transform is another traditional image processing tool which has been applied to the field of image quality assessment. In this work we will consider as IQ spectral-related features: the Spectral Magnitude Error (SME) and the Spectral Phase Error (SPE), defined in Table I (where F and F̂ are the respective Fourier transforms of I and Î), and arg (F) denotes phase. 



Gradient-based measures: Gradients convey important visual information which can be of great use for quality assessment. Many of the distortions that can affect an image are reflected by a change in its gradient. Therefore, using such information, structural and contrast changes can be effectively captured. Two simple gradient-based features are included in the biometric protection system proposed in the present article: Gradient Magnitude Error (GME) and Gradient Phase Error (GPE), defined in Table I (where G and Ĝ are the gradient maps of I and Î defined as G = Gx+iGy, where Gx and Gy are the  gradients in the x and y directions).

Structural Similarity Measures: Although being very convenient and widely used, the aforementioned image quality metrics based on error sensitivity present several problems which are evidenced by their mismatch (in many cases) with subjective human-based quality scoring system. In this scenario, a recent new paradigm for image quality assessment based on structural similarity was proposed following the hypothesis that the human visual system is highly adapted for extracting structural information from the SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 31

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

viewing field. Therefore, distortions in an image that come from variations in lighting, such as contrast or brightness changes (nonstructural distortions), should be treated differently from structural ones. Among these recent objective perceptual measures, the Structural Similarity Index Measure (SSIM), has the simplest formulation and has gained widespread popularity in a broad range of practical applications. In view of its very attractive properties, the SSIM has been included in the feature parameterization. Information Theoretic Measures: The quality assessment problem may also be understood, from an information theory perspective, as an information-fidelity problem (rather than a signal-fidelity problem). The core idea behind these approaches is that an image source communicates to a receiver through a channel that limits the amount of information that could flow through it, thereby introducing distortions. The goal is to relate the visual quality of the test image to the amount of information shared between the test and the reference signals, or more precisely, the mutual information between them. Under this general framework, image quality measures based on information fidelity exploit the (in some cases imprecise) relationship between statistical image information and visual quality. In the present work we consider two of these information theoretic features: the Visual Information Fidelity (VIF) and the Reduced Reference Entropic Difference index (RRED). Both metrics are based on the information theoretic perspective of IQA but each of them takes either a global or a local approximation to the problem, as is explained below. The VIF metric measures the quality fidelity as the ratio between the total information (measured in terms of entropy) ideally extracted by the brain from the whole distorted image and the total information conveyed within the complete reference image. This metric relies on the assumption that natural images of perfect quality, in the absence of any distortions, pass through the human visual system (HVS) of an observer before entering the brain, which extracts cognitive information from it. For distorted images, it is hypothesized that the reference signal has passed through another ―distortion channel before entering the HVS. The VIF measure is derived from the ratio of two mutual information quantities: the mutual information between the input and the output of the HVS channel when no distortion channel is present (i.e., reference image information) and the mutual information between the input of the distortion channel and the output of SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 32

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

the HVS channel for the test image. Therefore, to compute the VIF metric, the entire reference image is required as quality is assessed on a global basis. On the other hand, the RRED metric approaches the problem of QA from the perspective of measuring the amount of local information difference between the reference image and the projection of the distorted image onto the space of natural images, for a given sub-band of the wavelet domain. In essence, the RRED algorithm computes the average difference between scaled local entropies of wavelet coefficients of reference and projected distorted images in a distributed fashion. This way, contrary to the VIF feature, for the RRED it is not necessary to have access the entire reference image but only to a reduced part of its information (i.e., quality is computed locally). This required information can even be reduced to only one single scalar in case all the scaled entropy terms in the selected wavelet sub-band are considered in one single block. 4.5 NO-REFERENCE IQ MEASURES: Unlike the objective reference IQA methods, in general the human visual system does not require of a reference sample to determine the quality level of an image. Following this same principle, automatic no-reference image quality assessment (NR-IQA) algorithms try to handle the very complex and challenging problem of assessing the visual quality of images, in the absence of a reference. Presently, NR-IQA methods generally estimate the quality of the test image according to some pre-trained statistical models. Depending on the images used to train this model and on the a priori knowledge required, the methods are coarsely divided into one of three trends: • Distortion-specific approaches: These techniques rely on previously acquired knowledge about the type of visual quality loss caused by a specific distortion. The final quality measure is computed according to a model trained on clean images and on images affected by this particular distortion. Two of these measures have been included in the biometric protection method proposed in the present work. The JPEG Quality Index (JQI), which evaluates the quality in images affected by the usual block artifacts found in many compression algorithms running at low bit rates such as the JPEG. The High-Low Frequency Index (HLFI), which is formally, defined in Table. It was inspired by previous work which considered local gradients as a blind metric to detect blur and noise. Similarly, the HLFI feature is sensitive to the SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 33

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

sharpness of the image by computing the difference between the power in the lower and upper frequencies of the Fourier Spectrum. In the HLFI entry in Table I, il , ih, jl , jh are respectively the indices corresponding to the lower and upper frequency thresholds considered by the method. In the current implementation, il = ih = 0.15N and jl = jh = 0.15M. • Training-based approaches: Similarly to the previous class of NR-IQA methods, in this type of techniques a model is trained using clean and distorted images. Then, the quality score is computed based on a number of features extracted from the test image and related to the general model. However, unlike the former approaches, these metrics intend to provide a general quality score not related to a specific distortion. To this end, the statistical model is trained with images affected by different types of distortions. This is the case of the Blind Image Quality Index (BIQI) described in, which is part of the 25 feature set used in the present work. The BIQI follows a two-stage framework in which the individual measures of different distortion-specific experts are combined to generate one global quality score. • Natural Scene Statistic approaches: These blind IQA techniques use a priori knowledge taken from natural scene distortion-free images to train the initial model (i.e. no distorted images are used). The rationale behind this trend relies on the hypothesis that undistorted images of the natural world present certain regular properties which fall within a certain subspace of all possible images. If quantified appropriately, deviations from the regularity of natural statistics can help to evaluate the perceptual quality of an image. This approach is followed by the Natural Image Quality Evaluator (NIQE) used in the present work. The NIQE is a completely blind image quality analyzer based on the construction of a quality aware collection of statistical features (derived from a corpus of natural undistorted images). Measured Parameters From An Image: Image quality assessments measures can be done in two different ways fully reference method and no reference method. Here we are calculating 25 different image quality measurements those are mentioned in the below table

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 34

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

Table 4.1: Different parameters measured for an image MSE Mean Square Error PSNR Peak Signal to Noise Ratio SNR

Signal to Noise Ratio

SC

Structural Content

MD

Maximum Difference

AD

Average Difference

NAE

Normalized Absolute Error

RAMD

R-Average MD

LMSE

Laplacian MSE

NXC

Normalized Cross-Correlation

MAS

Mean Angle Similarity

MAMS

Mean Angle Magnitude Similarity

TED

Total Edge Difference

TCD

Total Corner Difference

SME

Spectral Magnitude Error

SPE

Spectral Phase Error

GME

Gradient Magnitude Error

GPE

Gradient Phase Error

SSIM

Structural Similarity Index

VIF

Visual Information Fidelity

RRED

Reduced Ref. Entropic Difference

JQI

Jpeg Quality Index

HLFI

High-Low Frequency Index

BIQI

Blind Image Quality Index

NIQE

Naturalness Image Quality Estimation

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 35

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

4.6 DUAL TREE COMPLEX WAVELETS TRANSFORM: The complex wavelet transform (CWT) is a complex-valued extension to

thestandard discrete wavelet transform (DWT).It is a two-dimensional

wavelet transform which provides multi resolution , sparse representation, and useful characterization of the structure of an image. Further, it purveys a high degree of shift-invariance in its magnitude, which was investigated in However, a drawback to this transform is that it is exhibits

(where

is the dimension of the signal

being transformed) redundancy compared to a separable (DWT). The use of complex wavelets in image processing was originally set up in 1995 by J.M. Lina and L. Gagnon in the framework of the Daubechies orthogonal filters banks. It was then generalized in 1997 by Prof. Nick Kingsbury. In the area of computer vision, by exploiting the concept of visual contexts, one can quickly focus on candidate regions, where objects of interest may be found, and then compute additional features through the CWT for those regions only. These additional features, while not necessary for global regions, are useful in accurate detection and recognition of smaller objects. Similarly, the CWT may be applied to detect the activated voxels of cortex and additionally the temporal independent component analysis (TICA) may be utilized to extract the underlying independent sources whose number is determined by Bayesian information criterion. The Dual-tree complex wavelet transform (DTCWT) calculates the complex transform of a signal using two separate DWT decompositions (tree a and tree b). If the filters used in one are specifically designed different from those in the other it is possible for one DWT to produce the real coefficients and the other the imaginary.

Fig: 4.3 Block diagram for a 3-level DTCWT

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 36

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

This redundancy of two provides extra information for analysis but at the expense of extra computational power. It also provides approximate shift-invariance (unlike the DWT) yet still allows perfect reconstruction of the signal. The design of the filters is particularly important for the transform to occur correctly and the necessary characteristics are:         

The low-pass filters in the two trees must differ by half a sample period.  Reconstruction filters are the reverse of analysis.  All filters from the same ortho normal set. Tree a filters are the reverse of tree b filters.  Both trees have the same frequency response.  The Discrete Wavelet Transform (DWT) has been a founding stone for all

applications of digital image processing: from image denoising to pattern recognition, passing through image encoding and more. While being a complete and (quasi)invertible transform of 2D data, the Discrete Wavelet Transform gives rise to a phenomenon known as checker board pattern, which means that data orientation analysis is impossible. Furthermore, the DWT is not shift-invariant, making it less useful for methods based on the computation of invariant features. In an attempt to solve these two problems affecting the DWT, Freeman and Adelson first introduced the concept of Steerable filters, which can be used to decompose an image into a Steerable Pyramid, by means of the Steerable Pyramid Transform (SPT). Thus, a further development of the SPT, involving the use of a Hilbert pair of filters to compute the energy response, has been accomplished with the Complex Wavelet Transform (CWT). Similarly to the SPT, in order to retain the whole Fourier spectrum, the transform needs to be over-complete by a factor of 4, i.e. there are 3 complex coefficients for each real one. While the CWT is also efficient, since it can be computed through separable filters, it still lacks the Perfect Reconstruction property. Therefore, Kingsbury also introduced the Dual-tree Complex Wavelet Transform (DTCWT), which has the added characteristic of Perfect Reconstruction at the cost of approximate shift-invariance. The present work has made several contributions to the state-of-the-art in the field of biometric security, in particular: i ) it has shown the high potential of image quality assessment for securing biometric SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 37

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

systems against a variety of attacks; ii) Proposal and validation of a new biometric protection method; iii) Reproducible evaluation on multiple biometric traits based on publicly available databases; iv) Comparative results with other previously proposed protection solutions.

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 38

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 5 SOFTWARE ASPECTS

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 39

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 5 SOFTWARE ASPECTS 5.1 INTRODUCTION TO MATLAB In this section we present the basics of working with images in Matlab. We will see how to read, display, write and convert images. We will also talk about the way images are represented in Matlab and how to convert between the different types. The Matlab command for reading an image is imread('filename') Note that we suppress the output with a semicolon, otherwise we will get in the output all the numbers that make the image. 'filename' is the name of a file in the current directory or the name of a file including the full path. Try >> f = imread('chest-xray.tif'); We now have an array f where the image is stored >> whos f NameSize f

494x600

Bytes Class 296400 uint8 array

Grand total is 296400 elements using 296400 bytes f is an array of class uint8, and size 494x600. That means 494 rows and 600 columns. We can see some of this information with the following commands >> size(f) ans = 494 600 >> class(f) ans = uint8 We will talk later on about the different image classes. Sometimes it is useful to determine the number of rows and columns in an image. We can achieve this by means of >> [M, N] = size(f); To display the image we use imshow >> imshow(f) You will get a window similar to this

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 40

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

Fig5.1: Example image (f)

Note that in the figure toolbar we have buttons that allow us to zoom parts of the image. The syntax imshow(f, [low high])displays all pixels with values less than or equal to low as black, all pixels with values greater or equal to high as white. Try in the image. Once the image has been labeled, use the regionprops command to obtain quantitative information about the objects: D = regionprops(L, properties) There‘s a lot of useful statistical information about objects that can be extracted using regionprops. Here‘s a list: >> imshow(f,[10 50]) Finally, >> imshow(f,[]) sets the variable low to the minimum value of array f and high to its maximum value. This is very useful for displaying images that have a low dynamic range. This occurs very frequently with 16-bit images from a microscope.

We can also display portions of an image by specifying the range

>> imshow(f(200:260,150:220)) Another matlab tool available to display images and do simple image manipulations is imtool. Try >> imtool(f) In the figure window we have now available the following tools: overview, pixel region, image information, adjust contrast and zoom. Try them. SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 41

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

Images can be written to disk using the function imwrite. Its format is imwrite(f, 'filename') with this syntax, filename must include the file format extension. Alternatively imwrite(f, 'filename', format) saves f using format. For example >> imwrite(f, 'test', 'jpeg', 'quality', 25) In the help you can find more information about available formats and their options. Image types, data classes and image classes There are different image types and image classes available in MATLAB. The two primary image types you will be working with are as follows  Intensity images o uint16 [0, 65535]

(CCD cameras on microscopes)

o uint8[0, 255]

(From your standard digital camera)

308

o double [-10 

, 10

308

]

 Binary images (black and white)  o logical, 0 or 1

Raw images typically come in the form of an unsigned integer (uint16 denotes 16-bit unsigned integer, and uint8 denotes 8-bit unsigned integer). However floating-point operations (mathematical operations that involve a decimal point, such as log(a)) can only be done with arrays of class double. Hence, to work on a raw image, first convert it from uint16 or uint8 to double using the double function: >> f = imread('actin.tif'); >> g = double(f); Now type >> whos; to see the different data types associated with each variable. Note that while the data type changes, the actual numbers after the conversion remain the same. Many MATLAB image processing operations operate under the assumption that the image is scaled to the range [0,1]. For instance, when imshow displays an double image, it displays an intensity of 0 as black and 1 as white. You can automatically create a scaled double image using mat2gray:

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 42

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

>> h = mat2gray(g); Certain image processing commands only work with scaled double images. Finally, we can convert an intensity image into a binary image using the command im2bw(f, T), where T is a threshold in the range [0, 1]. Matlab converts f to class double, and then sets to 0 the values below T and to 1 the values above T. The result is of class logical. See the following example. We wish to convert the following double image >> f = [1 2; 3 4] f=

1 2 3 4

to binary such that values 1 and 2 become 0 and the other two values become 1. First we convert it to the range [0, 1] >> g = mat2gray(f) g= 0 0.6667

0.3333 1.0000

We can convert the previous image to a binary one using a threshold, say, of value 0.6: >> gb = im2bw(g, 0.6) gb = 0 0 1 1 Note that we can obtain the same result using relational operators >> gb = f > 2 gb =0 0 1 1 Binary images generated by thresholding often form the basis for extracting morphological features in microscopy images. In the next section, we will extract some basic quantitative information about objects in an image by first using thresholding to generate a binary image and then using the region props command to extract quantitative information from the binary image. Basic Segmentation using Thresholding Many biological images comprise of light objects over a constant dark background (especially those obtained using fluorescence microscopy), in such a way that object and background pixels have gray levels grouped into two dominant modes. One obvious way to SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 43

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

extract the objects from the background is to select a threshold T that separates these modes: g(x,y)

=

1

if

=

0 otherwise

f(x,y) > T

where g(x,y) is the threshold binary image of f(x,y). We can implement the thresholding operation in MATLAB by the following function: g = im2bw(f,T) The first argument f gives the input image, and the second argument T gives the threshold value. Image histograms We need to choose a threshold value T that properly separates light objects from the dark background. Image histograms provide a means to visualize the distribution of grayscale intensity values in the entire image. They are useful for estimating background values, determining thresholds, and for visualizing the effect of contrast adjustments on the image (next section). The matlab function to visualize image histograms is imhist >> f = imread('chest-xray.tif'); >> imhist(f); The histogram has 256 bins by default. The following command makes 20 bins >> imhist(f,20); A good value for T can be obtained by visually inspecting the image histogram obtained using the imhist command: >> im = imread('rice.png');

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 44

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

Fig 5.2 Example picture (rice.png) >> imhist(im); Based on the histogram, pick a grayscale value manually that separates the light rice grains from the dark background. Then threshold the image and display the results. MATLAB provides a function graythresh that automatically computes a threshold value: T = graythresh(im) where im is the input image and T is the resulting threshold. graythresh calculates the threshold value by essentially maximizing the weighted distances between the global mean of the image histogram and the means of the background and foreground intensity pixels. EXAMPLE In this example, we threshold the image of rice grains opened above: >>im=imread('rice.png'); >> im = mat2gray(im); Calculate the threshold value: >> level = graythresh(im); and

create

a

new

binary

image

using

the

obtained

threshold

>> imb = im2bw(im,level); Note that the thresholding operation segments the rice grains quite well. However, a problem in this image is that the rice grains near the bottom of the image aren‘t segmented well – the background is uneven and is low at the bottom, leading to incorrect segmentation. We‘ll see a way to correct for this uneven background using image processing later.Using the binary image, we can then calculate region properties of objects in the image, such as area, diameter, etc… An object in a binary image is a set of white pixels (ones) that are connected to each other. We can enumerate all the objects in the figure using the bwlabel command: [L, num] = bwlabel(f) where L gives the labeled image, and num gives the number of objects. To label the binary image of the rice grains, type:

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 45

value:

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

>> [L, N] = bwlabel(imb); Now look at the labeled image L using imtool. Table 5.1 Imtool

'Area'

'Euler Number'

'Orientation'

'Bounding Box'

'Extent'

'Perimeter'

'Centroid'

'Extrema'

'Pixel Index List'

'Convex Area'

'Filled Area'

'Pixel List'

'Convex Hull'

'Filled Image'

'Solidity'

'Convex Image'

'Image'

'Sub array Idx'

'Eccentricity'

'Major Axis Length'

'Equiv Diameter' 'Minor Axis Length'

Extract the area and perimeter of individual objects in the labeled image as follows: >> D = regionprops(L, 'area', 'perimeter'); The information in D is stored in an object called a structure array. A structure array is a variable in MATLAB that contains multiple fields for storage of information. You can access the field information in D as follows: >> D D =151x1 struct array with fields: Area Perimeter Access an individual element in the structure array by referring to its index in parenthesis: >> D(1) ans = Area: 145 Perimeter: 58.2843

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 46

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 6 RESULT ANALYSIS

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 47

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 6 RESULT ANALYSIS 6.1 TOP MODULE: Finally, after simulation of the code, a window is opened which is shown in figure 6.1. This window consists of 4 labels those are About, Process, Help and Exit. About is used to identify the given biometrics data of fingerprints, iris and 2d faces are fake or original by using IAQ parameters. Help is used to select the process button; the input GUI will open then input is given. Exit is used to quit from the window. Process label gives information about the selection of image (finger print, iris, face) to weather it is fake or real.

Fig 6.1: Top module

After selecting the Process Label another Window is opened which is shown in figure 6.2 this window is called Input window. SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 48

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

6.2 INPUT PROCESS WINDOW: In Input window, an image (fingerprint or face or iris) can be selected by using a Load Image Label shown left side of the figure 6.2. After that, selected image can be converted into Gray colour by selecting Gray Image label then Resize and Filter the image by using the labels shown in input window then click the arrow button for further process.

Fig 6.2: Input Process Window

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 49

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

6.3 IDENTIFICATION PROCESS: After the conversion process explained in second window process i.e., the loaded image can be converted into Gray image, Filtered and Resized the third window is opened shown in Figure 6.3. This gives information about the converted image. Now by click the arrow button shown in this window further process will be done.

Fig 6.3: Identification Process

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 50

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

6.4 IQA PARAMETERS: Using the above identification process the following IQ parameters are measured shown in figure 6.4. Initially some threshold values are mentioned for these parameters. After calculating these parameters and by using the threshold values of these parameters it can recognize whether the loaded image is fake or real.

Fig 6.4: Measured IQ Parameters

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 51

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

6.5 FINAL RESULT: Based on the above calculating parameters for the loaded image it shows that it is fake. Why because some of the parameters get negative values shown in figure 6.4, so that the loaded image is fake shown in figure 6.5.

Fig 6.5: Final Result

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 52

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

6.6 ADVANTAGES:



 



It provides high potential of image quality assessment for securing biometric systems against a variety of attacks. 



The error rates achieved by the proposed protection scheme are in many cases lower than those reported by other trait-specific state-of-the-art antispoofing systems. 



It is simple, fast, non-intrusive and user-friendly because of its Multibiometric and Multi attack characteristics 



I t also provides the analysis of the features individual relevance.

6.7APPLICATIONS:  

It is an applicable system in offices, colleges and other systems which require more security from fake users. 



It is also used in Forensic labs for the detection of finger prints of criminals. 

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 53

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 7 CONCLUSION & FUTURE SCOPE

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 54

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

CHAPTER 7 CONCLUSION & FUTURE SCOPE 7.1 CONCLUSION: Finally, by using DTCWT, IQA techniques, this project is well executed on different sets of images. This is very much efficient in finding of fake or original. This interest has lead to big advances in the field of security-enhancing technologies for biometric-based applications. However, in spite of this noticeable improvement, the development of efficient protection methods against known threats has proven to be a challenging task. Yet, some disparities between the real and fake images may become evident once the images are translated into a proper feature space. These differences come from the fact that biometric traits, as 3d-objects, have their own optical qualities. 7.2 FUTURE SCOPE: To improve the clarity of ridge and valley structures in fingerprint images, a number of techniques have been used to enhance gray-level images and by using the extension of the considered 25 features set with new image quality measures it can be applicable to palm prints, hand geometry and vein. We can also use the enhancement algorithm, which applies a bank of band pass Gabor filters on the normalized fingerprint image using estimated orientation and frequency information. So we will focus on the extraction of a valley mask, not a ridge mask as many methods have used for fingerprint recognition. And it is also used for the systems working with face videos by using enhanced algorithms and filter techniques.

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 55

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

REFERENCES

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 56

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

REFERENCES [1] S. Prabhakar, S. Pankanti, and A. K. Jain, Biometric recognition: Security and privacy concerns, IEEE Security Privacy, vol. 1, no. 2, pp. 33–42, Mar./Apr. 2003. [2] T. Matsumoto, Artificial irises: Importance of vulnerability analysis, in Proc. AWB, 2004. [3] J. Galbally, C. McCool, J. Fierrez, S. Marcel, and J. Ortega-Garcia, On the vulnerability of face verification systems to hill-climbing attacks, Pattern Recognit., vol. 43, no. 3, pp. 1027– 1038, 2010 [4] A. K. Jain, K. Nandakumar, and A. Nagar, Biometric template security,EURASIP J. Adv. Signal Process., vol. 2008, pp. 113–129, Jan. 2008. [5] J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia, A high performance fingerprint liveness detection method based on quality related features,Future Generat. Comput. Syst., vol. 28, no. 1, pp. 311–321, 2012. [6] K. A. Nixon, V. Aimale, and R. K. Rowe, Spoof detection schemes, Handbook of Biometrics. New York, NY, USA: Springer-Verlag, 2008, pp. 403–423. [7] ISO/IEC 19792:2009, Information Technology—Security Techniques—Security Evaluation of Biometrics, ISO/IEC Standard 19792, 2009. [8] Biometric Evaluation Methodology. v1.0, Common Criteria, 2002. [9] K. Bowyer, T. Boult, A. Kumar, and P. Flynn, Proceedings of the IEEE Int. Joint Conf. on Biometrics. Piscataway, NJ, USA: IEEE Press, 2011. [10] G. L. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, et al., First international fingerprint liveness detection competition LivDet 2009, in Proc. IAPR ICIAP, Springer LNCS-5716. 2009, pp. 12–23. [11] M. M. Chakka, A. Anjos, S. Marcel, R. Tronci, B. Muntoni, G. Fadda, et al., Competition on countermeasures to 2D facial spoofing attacks, in Proc. IEEE IJCB, Oct. 2011, pp. 1–6. [12] J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M. Martinez-Diaz, Evaluation of direct attacks to fingerprint verification systems, J. Telecommun. Syst., vol. 47, nos. 3–4, pp. 243–254, 2011. [13] A. Anjos and S. Marcel, Counter-measures to photo attacks in face recognition: A public database and a baseline, in Proc. IEEE IJCB, Oct. 2011, pp. 1–7. [14] Biometrics Institute, London, U.K. (2011). Biometric VulnerabilityAssessment Expert Group [Online]. Available:

BEAT: Biometrices Evaluation and Testing

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 57

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

[Online]. Available: http://www.beat-eu.org/ [16] (2010). Trusted Biometrics Under Spoofing Attacks (TABULA RASA) [Online]. Available: http://www.tabularasa-euproject.org/ [17] J. Galbally, R. Cappelli, A. Lumini, G. G. de Rivera, D. Maltoni, J. Fierrez, et al., An evaluation of direct and indirect attacks using fake fingers generated from ISO templates, Pattern Recognit. Lett., vol. 31,no. 8, pp. 725–732, 2010. [18] J. Hennebert, R. Loeffel, A. Humm, and R. Ingold, A new forgery scenario based on regaining dynamics of signature, in Proc. IAPR ICB, vol. Springer LNCS4642. 2007, pp. 366– 375. [19] A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietikainen, J. Bustard, and M. Nixon, Can gait biometrics be spoofed? in Proc. IAPR ICPR, 2012, pp. 3280–3283. [20] Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli, Evaluation of serial and parallel multibiometric systems under spoofing attacks, in Proc. IEEE 5th Int. Conf. BTAS, Sep. 2012, pp. 283–288. [21] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York, NY, USA: Springer Verlag, 2009. [22] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, Fingerprint image reconstruction from standard templates, IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 9, pp. 1489–1503, Sep. 2007. [23] S. Shah and A. Ross, Generating synthetic irises by feature agglomeration,‖in Proc. IEEE ICIP, Oct. 2006, pp. 317–320. [24] S. Bayram, I. Avcibas, B. Sankur, and N. Memon, Image manipulation detection, J. Electron. Imag., vol. 15, no. 4, pp. 041102-1–041102-17, 2006. [25] M. C. Stamm and K. J. R. Liu, Forensic detection of image manipulation using statistical intrinsic fingerprints, IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492–496, Sep. 2010. [26] I. Avcibas, N. Memon, and B. Sankur, Steganalysis using image quality metrics, IEEE Trans. Image Process., vol. 12, no. 2, pp. 221–229, Feb. 2003. [27] S. Lyu and H. Farid, Steganalysis using higher-order image statistics, IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111–119, Mar. 2006.

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 58

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

BIBLIOGRAPHY

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 59

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

BIBLIOGRAPHY 1. Digital image processing , S.jayaraman,S.Esakkirajan, Mc Graw hill Publications. 2.Digital image processing, Rafael C.Gonzalez and Richard E.Woods, Pearson education. 3.S.Sridhar, Digital image processing Oxford publishers. 4.Digital image processing and analysis , B.Chanda and D.Dutta Majumder, Prentice Hall of India. 5.Digital signal processing ,P.ramesh Babu, Scitech Publications. 6.www.scirp.org/journal/wsn 7.jwcn.eurasipjournals.com

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 60

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

APPENDIX

APPENDIX SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 61

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

SOURCE CODE function varargout = DeskGUI(varargin) % DESKGUI MATLAB code for DeskGUI.fig %

DESKGUI, by itself, creates a new DESKGUI or raises the existing

%

singleton*.

%

H = DESKGUI returns the handle to a new DESKGUI or the handle to

%

the existing singleton*.

%

DESKGUI('CALLBACK',hObject,eventData,handles,...) calls the local

% %

function named CALLBACK in DESKGUI.M with the given input arguments. DESKGUI('Property','Value',...) creates a new DESKGUI or raises the

%

existing singleton*. Starting from the left, property value pairs are

%

applied to the GUI before DeskGUI_OpeningFcn gets called. An

%

unrecognized property name or invalid value makes property application

%

stop. All inputs are passed to DeskGUI_OpeningFcn via varargin.

%

*See GUI Options on GUIDE's Tools menu. Choose "GUI allows only one

%

instance to run (singleton)".

% See also: GUIDE, GUIDATA, GUIHANDLES % Edit the above text to modify the response to help DeskGUi % Last Modified by GUIDE v2.5 31-May-2014 10:32:02 % Begin initialization code - DO NOT EDIT gui_Singleton = 1; gui_State = struct('gui_Name',

mfilename, ...

'gui_Singleton', gui_Singleton, ... 'gui_OpeningFcn', @DeskGUI_OpeningFcn, ... 'gui_OutputFcn', @DeskGUI_OutputFcn, ... 'gui_LayoutFcn', [] , ... 'gui_Callback', []); if nargin && ischar(varargin{1}) gui_State.gui_Callback = str2func(varargin{1});

end if nargout [varargout{1:nargout}] = gui_mainfcn(gui_State, varargin{:}); else

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 62

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

gui_mainfcn(gui_State, varargin{:}); end % End initialization code - DO NOT EDIT % --- Executes just before DeskGUI is made visible. function DeskGUI_OpeningFcn(hObject, eventdata, handles, varargin) % This function has no output args, see OutputFcn. % hObject handle to figure % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) % varargin command line arguments to DeskGUI (see VARARGIN) % Choose default command line output for DeskGUI handles.output = hObject; % Update

handles

structure

guidata(hObject, handles);

% UIWAIT makes DeskGUI wait for user response (see UIRESUME) % uiwait(handles.figure1); % --- Outputs from this function are returned to the command line. function varargout = DeskGUI_OutputFcn(hObject, eventdata, handles) % varargout cell array for returning output args (see VARARGOUT); % hObject handle to figure % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) % a = imread('icon\a.jpg'); % b=imresize(a,0.4); % set(handles.input, 'CData', b); % a = imread('icon\e.jpg'); % b=imresize(a,0.4); % set(handles.exit, 'CData', b); % a = imread('icon\h.jpg'); % b=imresize(a,0.4); % set(handles.help, 'CData', b); % a = imread('icon\p.jpg'); % b=imresize(a,0.2); SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 63

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

% set(handles.Process, 'CData', b); % Get default command line output from handles structure varargout{1} = handles.output; % --- Executes on button press in input. function input_Callback(hObject, eventdata, handles) % hObject handle to input (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) AboutProject % --- Executes on button press in Process. function Process_Callback(hObject, eventdata, handles) % hObject handle to Process (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) close() InputProcess % --- Executes on button press in help. function help_Callback(hObject, eventdata, handles) % hObject handle to help (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) help % --- Executes on button press in exit. function exit_Callback(hObject, eventdata, handles) % hObject handle to exit (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) close() function x=quafeature(img1,img2) clc [m n]=size(img1); a=double(img1); b=double(img2); c=a^2; d=b^2; e=(a-b)^2;

MSE=sum(sum((e)/(m*n))) PSNR= 10*log(max(max((c)/ MSE)))+3; SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 64

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

SNR=log(sum(sum((c)/(n*m*MSE)))); SC=sum(sum((c)/(d))); MD=max(mad(a-b)); AD=sum(sum((a-b)/(n*m))); NAE=(mad(ab))/(mad(a)); NXC=sum(sum((a*b)/c)); ed1=edge(img1,'sobel'); ed2=edge(img2,'sobel'); Ted=mad(ed1-ed2) TED=sum(Ted); C1=corner(img1); D1=round(mean(C1)); CD1=D1(1); C2=corner(img2); D2=round(mean(C2)); CD2=D2(1); TCD=(CD1-CD2)/(max(CD1,CD2)); SSI=ssim(img1,img2); psnval=psnr(img1,img2,vv) warndlg(psnval) x=[MSE PSNR SNR SC MD AD NAE NXC TED TCD SSI];

LIST OF ACRONYMS

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 65

FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE

PSNR

Peak Signal to Noise Ratio

DWT

Discrete Wavelet Transform

CWT

Complex Wavelet Transform

DTCWT

Dual Tree Complex Wavelet Transform

KPCA

Kernel Principle Component Analysis

KFDA

Kernel Fischer Discriminate Analysis

IQA

Image Quality Assessment

IQM

Image Quality Measures

FRIQM

Full Reference Image Quality Measure

NR IQM

No Reference Image Quality Measure

NIQE

Natural Image Quality Evaluator

SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY

Page 66

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF