14EM1D4702.pdf
Short Description
Download 14EM1D4702.pdf...
Description
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE A THESIS REPORT Submitted in partial fulfillment of the requirement to JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
For the Award of the Degree of
Master of Technology in Communication Systems
Submitted by K. APARNA JYOTHI (Regd. No: 14EM1D4702) Under the Esteemed Guidance of
Mr. K.VENKATESULU, M.Tech., Assistant Professor in ECE
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING SWARNANDHRA INSTITUTE OF ENGINEERING AND TECHNOLOGY Accredited by NAAC with ‘A’ Grade (Approved by A.I.C.T.E & Affiliated to JNTUK Kakinada) Seetharampuram, Narsapur-534280, West Godavari (Dt.), A.P. 2015-2016
DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING SWARNANDHRA INSTITUTE OF ENGINEERING AND TECHNOLOGY Accredited by NAAC with ‘A’ Grade (Approved by A.I.C.T.E & Affiliated to JNTU Kakinada) Seetharampuram, Narsapur-534280, West Godavari (Dt.), A.P.
CERTIFICATE This is to certify that this dissertation work entitled “Fake Biometric
Detection Using Software based Liveness Detection Technique ” being submitted by K. APARNA JYOTHI (14EM1D4702) in partial fulfillment of the requirements for the award of Master of Technology with COMMUNICATION SYSTEMS as specialization is a record of bonafide work carried out by him, during the academic year 2015 – 2016.
Project Guide
Head of the Department
Mr. K.Venkatesulu, M.Tech.,
Mr.V.Srinivas, M.Tech., (Ph.D)
Assistant Professor, ECE
Associate Professor, ECE
EXTERNAL EXAMINER
ACKNOWLEDGEMENT The satisfaction that accompanies the successful completion of every task during my dissertation would be incomplete without the mention of the people who made it possible. I consider it my privilege to express my gratitude and respect to all who guided, inspired and helped me in completion of my project work. I extend my heartfelt gratitude to the Almighty for giving me strength in proceeding with this project titled “Fake Biometric Detection Using Software Based Liveness Detection Technique”. I owe my special thanks to Dr. S. Ramesh Babu, M.Tech.,Ph.D., Secretary & Correspondent,Swarnandhra College of Engineering and Technology, Seetharampuram for providing necessary arrangements to carry out this project. I express my heartfelt thanks to Dr.T.Madhu, M.Tech., Ph.D.FIE.,MISTE, Principal, Swarnandhra College of Engineering & Technology, Seetharampuram for giving me this opportunity for the successful completion of my degree. I would like to express my sincere thanks to Mr.V.Srinivas,M.Tech.(Ph.D)., Associate Professor & Head of the Department of ECE for his valuable suggestions at the time of need. I record with pleasure, of my gratitude to my Project guide Mr.K.Venkatesulu, M.Tech., Assistant Professor, ECE for his simulating guidance and valuable suggestions throughout the project. I am very much grateful to our M.Tech Coordinator Mr.S.Ravichand, M.Tech.(Ph.D)., Associate professor for giving the encouragement that helped me to complete the project successfully. I would like to express my profound sense of gratitude to all the coordinators and faculty members for their cooperation and encouragement throughout my course. Above all, I thank my parents. I feel deep sense of gratitude for my family who formed part of my vision. Finally I thank one and all that have contributed directly or indirectly to this thesis.
K.Aparna jyothi
(14EM1D4702) i
ABSTRACT Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this PROJECT, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. Designing of a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. We outlined several advances that originated both from the cryptographic and biometric community to address this problem. In particular, we outlined the advantages of cancelable biometrics over other approaches and presented a case study of different techniques.This project can be enhanced by reducing the image using DTCWT. This modification can decrease the image size and execution can be reduced by enhancing the image clarity. This enhancement can be shown using PSNR values. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
ii
LIST OF CONTENTS Name Of The Content
Page No.
ACKNOWLEDGEMENT
i
ABSTRACT
ii
LIST OF CONTENTS
iii
LIST OF FIGURES
v
LIST OF TABLES
vi
CHAPTER 1: INTRODUCTION
1
1.1 INTRODUCTION
2
1.2 AIM AND OBJECTIVES
3
1.3 LITERATURE SURVEY
4
1.4 ORGANISATION REPORT CHAPTER 2: EXISTING SYSTEM
5
2.1 EXISTING SYSTEM
7
2.2 DRAWBACKS OF EXISTING SYSTEM
8
6
2.2.1 Duplication with co-operation
8
2.2.2 Duplication without Co-operation
9
CHAPTER 3: PROPOSED SYSTEM
12
3.1 BIOMETRIC AUTHENTICATION
12
3.2 FINGER PRINT RECOGNIZATION
15
3.2.1 Different patterns
15
3.2.2 Minutia features
16
3.3 IRIS
18
3.3.1 Iris image enhancement
18
3.3.2 Iris image Binarization
19
3.3.3 Iris Image Segmentation
19
3.4 MINUTIA Extraction
19
3.4.1 Iris Ridge Thinning
19
3.4.2 Enhanced Thinning
20
3.4.3Enhanced thinning algorithm
21
3.5 FACE RECOGNITION
21
CHAPTER 4: IMPLEMENTATION OF PROJECT
24
iii
4.1 LIVENESS ASSESSMENT IN AUTHENTICATION SYSTEM
25
4.2 SOFTWARE-BASED TECHNIQUES
25
4.3 IMAGE QUALITY ASSESSMENT FOR LIVENESS DETECTION 4.4 FULL-REFERENCE IQ MEASURES 4.4.1 Different types FR-IQ Measurements
26 28 30
4.5 NO-REFERENCE IQ MEASURES
33
4.6 DUAL TREE COMPLEX WAVELETS TRANSFORM
36
CHAPTER 5: SOFTWARE ASPECTS
39
5.1 INTRODUCTION TO MATLAB
40
CHAPTER 6: RESULTS
47
6.1 TOP MODULE
48
6.2 INPUT PROCESS WINDOW
49
6.3 IDENTIFICATION PROCESS
50
6.4 IQA PARAMETERS
51
6.5 FINAL RESULT
52
6.6 Advantages
53
6.7 Applications
53
CHAPTER 7: CONCLUSION & FUTURE SCOPE
54
7.1 CONCLUSION
55
7.2 FUTURE SCOPE
55
REFERENCES
56
BIBLIOGRAPHY
59
APPENDIX
61
iv
LIST OF FIGURES Figure No.
Name Of The Figure
Page No.
2.1
software-based liveness detection
7
2.2
A Stamp type dummy finger print
9
2.3
A wafer-thin silicon dummy fingerprint
9
3.1
Block diagram of Biometric system
13
3.2(a)
The Arch Pattern
15
3.2(b)
The Loop Pattern
16
3.2(c)
The Whirl pattern
16
3.3(a)
Ridge Ending
17
3.3(b)
Bifurcation
17
3.3(c)
Short Ridge
17
3.4
Iris Real and Fake Images
19
4.1
Block diagram for the proposed system
25
4.2
Classification Of Image Quality Measures
28
4.3
Block diagram for a 3-level DTCWT
36
5.1
Example image (f)
41
5.2
Example picture (rice.png)
45
6.1
Top Module
49
6.2
Input Process Window
50
6.3
Identification Process
51
6.4
Measured IQ Parameters
52
6.5
Final Result
53
v
LIST OF TABLES Table No.
Name of the Table
Page No.
4.1
Different parameters measured for an image
35
4.2
Imtool
46
vi
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 1 INTRODUCTION
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 1
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 1 INTRODUCTION 1.1 INTRODUCTION Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioural characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioural characteristics are related to the pattern of behaviour of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have said that the term behaviour metrics is used to describe the latter class of biometrics. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, so they provide high reliability in verifying the identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information. Securing information and ensuring the privacy of personal identities is a growing concern in today‘s society. Traditional authentication schemes primarily utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Biometrics-based authentication schemes using fingerprints, face recognition, etc., overcome these limitations while offering usability advantages and are therefore rapidly extending traditional authentication schemes. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns as outlined below:
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 2
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
Biometrics is authentic but not secret: Unlike passwords and cryptographic keys that are known only to the user, biometrics such as voice, face, signature, and even fingerprints can be easily recorded and potentially misused without the user‘s consent. There have been several instances where artificial fingerprints have been used to circumvent biometric security systems. Face and voice biometrics are similarly vulnerable to being captured without the user‘s explicit knowledge. In contrast, tokens and knowledge have to be willingly shared by the user to be compromised. Biometrics cannot be revoked or cancelled. Passwords, PINs, etc., can be reset if compromised. Tokens such as credit cards and badges can be replaced if stolen. However, biometrics is permanently associated with the user and cannot be revoked or replaced if compromised. While a user can successively enrol different fingerprints, there is still a limited choice of fingers to choose from. This choice does not exist for other biometric modalities. If once the Biometric is lost, it is compromised forever, why because Biometrics provides usability advantages that it obviates the need to remember and manage multiple passwords and identities. However, this also means that if a biometric is compromised in one application, essentially all applications where the particular biometric is used are compromised. Cross-matching can be used to track individuals without their permission. Since the same biometric might be used for various applications and locations, the user can potentially be tracked if organizations share their respective biometric databases. So in order to provide security from this type of hackers, the traditional authentication schemes are used; by using this scheme the user can maintain different identities/passwords to prevent this hacking. The fact that a biometric remains the same presents a privacy concern. 1.2 AIM & OBJECTIVES: We demonstrate several methods to generate multiple cancellable identifiers from fingerprint images to overcome the hacking techniques. Designing of a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. We outlined several advances that originated both from the cryptographic and biometric community to address this problem. In particular, here we mentioned the advantages of cancellable biometrics SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 3
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
over other approaches and presented a case study of different techniques. This project can be enhanced by reducing the image using DTCWT (Dual Tree Complex Wavelet Transform). The objective of this project is modification can decrease the image size and execution can be reduced by enhancing the image clarity. 1.3 LITERATURE SURVEY: After Rathaetal. formally defined the problem of cancellable biometrics (also called revocable biometrics), many alternate solutions have emerged from both the biometric and cryptographic community. We loosely divide the prior work into the following categories
Biometric salting: This is similar to password salting in conventional cryptosystems. In this approach, before hashing the password P of the user, it is concatenated with a pseudorandom string S and the resulting hash is stored in the database. The addition of the random sequence increases the entropy and, therefore, the security of the password. Biometric salting is based on the same principle. In some instances, the new representation is quantized to derive robust binary cryptographic keys. However, the quantization is practical only because of the additional entropy introduced through the salt.In this category the defining feature is the addition of user-specific random
information to increase the entropy of the biometric template.
Biometric key generation: In this approach, a key is derived directly from the biometric signal. The advantage is that there is no need for user-specific keys or tokens as required by ―biometric salting‖ methods and that it is therefore scalable. A key, parameterized by the biometric B, is stored instead of the actual biometric itself.The major problem with this approach is achieving error tolerance in the key. The defining feature of this category is the attempt to derive robust binary representations (keys) from noisy biometric data
without the use of additional information.
Fuzzy schemes: Another approach for constructing cancellable templates involves the use of public auxiliary information P (also called helper data, shielding functions, or fuzzy extractors), which is combined with biometric information to reduce the intra user variation. The following is the defining feature of this category: The schemes define a metric (e.g., Hamming,
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 4
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
Euclidian, set distance, etc.) on noisy biometric data B and B0. Among the different threats analyzed, the so-called direct or spoofing attacks have motivated the biometric community to study the vulnerabilities against this type of fraudulent actions in modalities such as the iris, the fingerprint, the face, the signature, or even the gait and multimodal approaches. 1.4 ORGANISATION REPORT: This thesis consists of total SEVEN chapters that include introduction and conclusions. Chapter 2 describes about existing system. in chapter 3 conceptual analysis of proposed system.chapter 4 having implementation of project. chapter 5 describes software aspects. Chapter 6 result analysis. in chapter 7 advantages and applications are discussed.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 5
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER-2 EXISTING SYSTEM
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 6
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 2 EXISTING SYSTEM 2.1 EXISTING SYSTEM: In recent years, the increasing interest in the evaluation of biometric systems security has led to the creation of numerous and very diverse initiatives focused on Biometric systems. Among the different threats analyzed, the so-called direct or spoofing attacks have motivated the biometric community to study the vulnerabilities against this type of fraudulent actions in modalities such as the iris, the fingerprint, the face, the signature, or even the gait and multimodal approaches. In these attacks, the intruder uses some type of synthetically produced artefact (e.g., gummy finger, printed iris image or face mask), or tries to mimic the behaviour of the genuine user (e.g., gait, signature), to fraudulently access the biometric system. As these types of attacks are performed in the analog domain and the interaction with the device is done following the regular protocol, the usual digital protection mechanisms (e.g., encryption, digital signature or watermarking) are not effective. Besides other anti-spoofing approaches such as the use of multi biometrics or challenge-response methods, special attention has been paid by the users to the liveness detection techniques, which use different physiological properties to distinguish between real and fake traits. Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed.
Fig 2.1: Types of attacks detected by hardware-based & software-based liveness detection
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 7
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
Liveness detection methods are usually classified into one of two groups shown in figure 2.1. (i) Hardware-based techniques, which add some specific device to the sensor in order to detect particular properties of a living trait (e.g., fingerprint sweat, blood pressure, or specific reflection properties of the eye). (ii)
Software-based techniques, in this case the fake trait is detected once the sample has been acquired with a standard sensor (i.e., features used to distinguish between real and fake traits are extracted from the biometric sample, and not from the trait itself). The two types of methods present certain advantages and drawbacks over the
other and, in general, a combination of both would be the most desirable protection approach to increase the security of biometric systems. 2.2 DRAWBACKS OF EXISTING SYSTEM: In the existing system we are using hardware techniques for implementing biometrics. In Hardware-based techniques, which add some specific device to the sensor in order to detect particular properties of a living trait (e.g., fingerprint sweat, blood pressure, or specific reflection properties of the eye), as a coarse comparison, hardware-based schemes usually present a higher fake detection rate. Furthermore, as they operate directly on the acquired sample (and not on the biometric trait itself), and the drawbacks in existing system are
More costlier,
More complexity,
High computational delay,
Harmful to the human.
And also in hardware Biometric systems one can easily misuse the system by creating fake or dummy fingerprints and dummy face masks etc. for example creation of dummy finger prints are explained below: Dummy fingerprints can be created in two ways (i) Duplication without Co-operation (ii) Duplication with Co-operation. 2.2.1 Duplication without Co-operation: For duplication of a fingerprint without co-operation of the original person it is necessary to obtain a print of the finger from a glass or another surface. One of the best ways to obtain such a print could be the fingerprint scanner itself. If the scanner is cleaned before a person will be using it, an almost perfect print is left on the scanner surface since people tend to press their finger (which is the verification finger!) firmly on the scanner. Some SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 8
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
more expertise is required to create a dummy from such a print, but every dental technician has the skills and equipment to create one. This is an accurate description of how to create a dummy of the fingerprint. A picture of a stamp that is created using this method can be found in Figure 2.
Fig 2.2 A stamp type dummy finger print
2.2.2 Duplication with Co-operation: Duplication of a fingerprint with co-operation of its owner is an easiest method since it is possible to compare the dummy with the original fingerprint in all aspects and adapt it accordingly. First, a plaster cast of the finger is created. This cast is then filled with silicon rubber to create a waferthin silicon dummy. This dummy can be glued to anyone's finger without it being noticeable to the eye. So one can easily create the dummy finger and can get the information without the intervention of original user. It follows that creation of this type of dummy is possible with very limited means within a few hours.
Fig 2.3: A wafer-thin silicon dummy fingerprint
To overcome this drawbacks, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images, that is Software Based techniques are used, in this case the fake trait is detected once the sample has been SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 9
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
acquired with a standard sensor (i.e., features used to distinguish between real and fake traits are extracted from the biometric sample, and not from the trait itself). In this several advances that originated both from the cryptographic and biometric community to address this problem. As a comparison, hardware-based schemes usually present a higher fake detection rate, while software-based techniques are in general less expensive (as no extra device is needed), and less intrusive since their implementation is transparent to the user. Furthermore, as they operate directly on the acquired sample (and not on the biometric trait itself), software-based techniques may be embedded in the feature extractor module which makes them potentially capable of detecting other types of illegal break-in attempts not necessarily classified as spoofing attacks. For instance, software-based methods can protect the system against the injection of reconstructed or synthetic samples into the communication channel between the sensor and the feature extractor.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 10
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 3 PROPOSED SYSTEM
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 11
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 3 PROPOSED SYSTEM The Proposed project can be enhanced from the existing technique by reducing the image using DTCWT (Dual Tree Complex Wavelet Transform). This modification can decrease the image size and execution can be reduced by enhancing the image clarity. This enhancement can be shown using PSNR (Peak Signal to Noise Ratio) values and provides high security to biometrics from the fake users. 3.1 BIOMETRIC AUTHENTICATION: Many different aspects of human physiology, chemistry or behaviour can be used for biometric authentication. The selection of a particular biometric for use in a specific application involves a weighting of several factors. Jain et al. (1999) identified seven different factors which are used when assessing the suitability of any trait for use in biometric authentication. Universality means that every person using a system should possess the trait. Uniqueness means the trait should be sufficiently different for individuals in the relevant population such that they can be distinguished from one another. Permanence relates to the manner in which a trait varies over time. More specifically, a trait with 'good' permanence will be reasonably invariant over time with respect to the specific matching algorithm. Measurability (collectability) is nothing but ease of acquisition or measurement of the trait. In addition, acquired data should be in a form that permits subsequent processing and extraction of the relevant feature sets. Performance relates to the accuracy, speed, and robustness of technology used (see performance section for more details). Acceptability relates to how well individuals in the relevant population accept the technology such that they are willing to have their biometric trait captured and assessed. Circumvention relates to the ease with which a trait might be imitated using an artifact or substitute. The block diagram illustrates the two basic modes of a biometric system First, in verification (or authentication) mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps are involved in the verification of a person. This process may use a smart card, username or ID number (e.g. PIN) to SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 12
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
indicate which template should be used for comparison 'Positive recognition' is a common use of the verification mode, "where the aim is to prevent multiple people from using same identity.
Fig 3.1 Block diagram of Biometric system
In the first step, reference models for all the users are generated and stored in the model database.
In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold.
Third step is the testing step. Second is the identification mode, in identification mode the system
performs a one-to-many comparison against a biometric database whether the given image is original or not (fake image). The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Identification mode can be used either for 'positive recognition' (so that the user does not have to provide any information about the template to be used) or for 'negative recognition' of the person "where the system establishes whether the person is who she (implicitly or explicitly) denies to be". The latter function can only be achieved through biometrics since other methods of personal recognition such as passwords, PINs or keys are ineffective.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 13
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
The first time an individual uses a biometric system is called enrollmen1t. During the enrolment, biometric information from an individual is captured and stored. In subsequent uses, biometric information is detected and compared with the information stored at the time of enrolment. Note that it is crucial that storage and retrieval of such systems themselves be secure if the biometric system is to be robust. In the block diagram of Biometric system, the first block (sensor) is the interface between the real world and the system; it has to acquire all the necessary data. It is an image acquisition system, but it can change according to the characteristics desired. The second block performs all the necessary pre-processing: it has to removing background noise from the sensor, to enhance the input, to use some kind of normalization, etc. In the third block necessary features are extracted. This step is an important step as the correct features need to be extracted in the optimal way. A vector of numbers or an image with particular properties is used to create a template. A template is a synthesis of the relevant characteristics extracted from the source. Elements of the biometric measurement that are not used in the comparison algorithm are discarded in the template to reduce the file size and to protect the identity of the enrollee during the enrollment phase, the template is simply stored somewhere (on a card or within a database or both). During the matching phase, the obtained template is passed to a matcher that compares it with other existing templates, estimating the distance between them using any algorithm (e.g. Hamming distance). The matching program will analyze the template with the input. This will then be output for any specified use or purpose (e.g. entrance in a restricted area) Selection of biometrics in any practical application depending upon the characteristic measurements and user requirements. We should consider Performance, Acceptability, Circumvention, Robustness, Population coverage, Size, Identity theft deterrence in selecting a particular biometric. Selection of biometric based on user requirement considers Sensor availability, Device availability, Computational time and reliability, Cost, Sensor area and power consumption.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 14
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
3.2 FINGERPRINT RECOGNITION: Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Generally most of biometrics which are manufactured at the early years based on finger recognization. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance). The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. But nowadays there are many ways to create a dummy fingerprints without permission of original one. So, in order to overcome all these cheating techniques we are using this liveness security system in biometrics. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. 3.2.1 Different patterns: The three basic patterns of fingerprint ridges are the arch, loop, and whorl:
Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger.
Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side.
Whorl: Ridges form circularly around a central point on the finger.
Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited. The basic structure of three different fingerprint patters are showed below
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 15
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
3.2.2 Minutia features: In the fingerprint recognization the second class of algorithm is minutia algorithm. As a global feature, orientation field describes one of the basic structures of a fingerprint. When the fingerprint is complemented with the minutiae, we can get more information. Thus, a better performance can be obtained by fusing the results of orientation field matching with conventional minutiae-based matching. Some studies showed that incorporating local (minutiae) and global (orientation field) feature can largely improve the performance. However, as stated above, in many practical fingerprint recognition systems, the original images and orientation field images are not saved, and we cannot compute the orientation field directly. In some other systems, additional orientation features cannot be saved into the existing database easily, and we have to compute the orientation field by only using the information of minutiae template. An interpolation algorithm is proposed to estimate the orientation field from minutiae template (they used it to predict the class of the fingerprint but not for fingerprint matching), in which the orientation of a given point was computed from its neighboring minutiae. To consider the global information, we will use the orientation model to reconstruct the orientation field from minutiae. Firstly we interpolate a few virtual‖ minutiae in the sparse areas, and then
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 16
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
apply the model-based method on these mixed minutiae (including the real and virtual minutiae). After that, the reconstructed orientation field is used into the matching stage by combining with conventional minutiae-based matching. In this way we have to create an oriented field fingerprint using minutia extraction techniques. There are many different minutia extraction fields for different fingerprint ridges; here we use mainly three different types of minutia extraction techniques. Our present proposal is liveness detection method which uses this technique whether person who uses the system is original or not. Generally a person can cheat others but a machine not do that but nowadays the cheaters can try to cheat system also by preparing the dummy fingerprints. To protect the world from these unwanted users we are using the fingerprint recognization with minutia extraction fields. When the fingerprint is complemented with the minutiae, we can get more information and better performance can be obtained by fusing the results in biometric systems. The three main minutia extraction fields used in fingerprint ridges are given below; The major minatue features of fingerprint ridges are: Ridge ending and bifurcation &short ridge. The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint. Minutiae and patterns are very important in the analysis of fingerprints since no two fingers have been shown to be identical.
Fingerprint matching is the process used to determine whether two sets of SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 17
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
fingerprint ridge detail come from the same finger. There exist multiple algorithms that do fingerprint matching in many different ways. Some methods involve matching minutiae points between the two images, while others look for similarities in the bigger structure of the fingerprint. In this project we propose a method for fingerprint matching based on minutiae matching. However, unlike conventional minutiae matching algorithms our algorithm also takes into account region and line structures that exist between minutiae pairs. This allows for more structural information of the fingerprint to be accounted for thus resulting in stronger certainty of matching minutiae. Also, since most of the region analysis is pre-processed it does not make the algorithm slower. The Evidence from the testing of the pre-processed images gives stronger assurance that using such data could lead to faster and stronger matches.
3.3 IRIS: The processing capabilities of the IRIS vision systems specifically using the IRIS v. The first stage of the architecture embeds sensors, parallel processing analog and mixed-signal circuitry, control circuitry and memory. This front-stage is implemented through dedicated bio-inspired chips. The second stage of the IRIS vision system architecture is a digital microprocessor. The combination of parallel preprocessing and serial post-processing makes the IRIS systems very efficient particularly the IRIS systems are capable to close the sensor-processing-actuation loop at a high speed. In this demo, the IRIS v is used to recognize data matrix codes at more than 200 codes/sec rate. 3.3.1 Iris image enhancement: Iris Image enhancement is used to improve the image clarity for the easy of further operations. Since the iris images acquired from sensors or other media are not assured with perfect quality, enhancement methods, for increasing the contrast between ridges and furrows and for connecting the false broken points of ridges due to insufficient amount of ink, are very useful to keep a higher accuracy to iris recognition. Two methods are used for the iris image enhancement, the first one is Histogram Equalization; the second one is Fourier Transform. Histogram equalization: Histogram equalization is nothing but to separate the dynamic range and also provide the equal pixels in all the gray levels. Fourier Transform: Fourier (FT) transform is nothing but a mathematical prism. In
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 18
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
FT the original signal is represented in the form of infinite frequencies of varying amplitude. All the Images are periodic signals so FT are used to enhance the images. 3.3.2 Iris Image Binarization: A locally adaptive binarization method is performed to binarize the iris image. Such a named method comes from the mechanism of transforming a pixel value to 1 if the value is larger than the mean intensity value of the current block (16x16) to which the pixel belongs. 3.3.3 Iris Image Segmentation: In general, only a Region of Interest (ROI) is useful to be recognized for each iris image. The image area without effective ridges and furrows is first discarded since it only holds background information. Then the bound of the remaining effective area is sketched out since the minutia in the bounded region is confusing with those spurious minutia‘s that are generated when the ridges are out of the sensor. To extract the ROI, a two-step method is used. The first step is block direction estimation and direction variety check, while the second is intrigued from some Morphological methods. Two Morphological operations called OPEN and CLOSE are adopted. The OPEN operation can expand images and remove peaks introduced by background noise. The CLOSE operation can shrink images and eliminate small cavities.
Fig 3.4 Iris Real and Fake Images
3.4 MINUTIA EXTRACTION: Minutiae Extraction steps are explained below 3.4.1 Iris Ridge Thinning: Thinning is the process of reducing the thickness of each line of patterns to SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 19
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
just a single pixel width [5, 7]. The requirements of a good thinning algorithm with respect to an iris are The thinned iris image obtained should be of single pixel width with no discontinuities.
Each ridge should be thinned to its centre pixel.
Noise and singular pixels should be eliminated.
No further removal of pixels should be possible after completion of thinning process. Use an iterative, parallel thinning algorithm, in each scan of the full iris
image, the algorithm marks down redundant pixels in each small image window (3x3). And finally removes all those marked pixels after several scans. But it is tested that such an iterative, parallel thinning algorithm has bad efficiency although it can get an ideal thinned ridge map after enough scans. Uses a one-inall method to extract thinned ridges from gray-level iris images directly. Their method traces along the ridges having maximum gray intensity value. However, binarization is implicitly enforced since only pixels with maximum gray intensity value are remained. The advancement of each trace step still has large computation complexity although it does not require the movement of pixel by pixel as in other thinning algorithms. Thus the third method is bid out which uses the built-in Morphological thinning function in MATLAB to do the thinning and after that an enhanced thinning algorithm is applied to obtain an accurately thinned image. 3.4.2 Enhanced Thinning: Ridge Thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel wide. Ideally, the width of the skeleton should be strictly one pixel. However, this is not always true. There are still some locations, where the skeleton has a two-pixel width at some erroneous pixel locations. An erroneous pixel is defined as the one with more than two 4-connected neighbours. These erroneous pixels exist in the fork regions where bifurcations should be detected, but they have CN = 2 instead of CN>2. The existence of erroneous pixels may
destroy the integrity of spurious bridges and spurs,
exchange the type of minutiae points, and
miss detect true bifurcations,
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 20
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
Therefore, before minutiae extraction, there is a need to develop a validation algorithm to eliminate the erroneous pixels while preserving the skeleton connectivity at the fork regions. For this purpose an enhanced thinning algorithm is bid out. 3.4.3 Enhanced thinning algorithm: Step 1: Scanning the skeleton of iris image row by row from top-left to bottomright. Check if the pixel is 1. Step 2: Count its four connected neighbours. Step 3: If the sum is 2+,then is erroneous pixel Step 4: Remove the erroneous pixel. Step 5: Repeat steps 1 – 4 until whole of the image is scanned and the erroneous pixels are removed. 3.5 FACE RECOGNITION: Multibiometrics refers to the use of a combination of two or more sensor modalities in a single identification system. The reason for combining different sensor modalities is to improve the recognition accuracy. A multisensory biometric system involving visual and thermal face images is present in this project. Face recognition is one of the most important applications of image analysis, its prime applications being recognition of individuals for the purpose of security. It is one of the most no obtrusive biometric techniques. However, the conclusion was that, though the recognition performance of Even though faces recognition technology has moved from linear subspace methods. Eigen and Fisher faces, to nonlinear methods such as kernel principle component analysis (KPCA) and kernel Fischer discriminate analysis (KFDA), many of the problems are yet to be addressed. Also, the nature of research studies had been more on visible imagery with less attention on its thermal counterpart. Previous studies have shown that infrared imagery offers a promising alternative to visible imagery for handling variations in face appearance due to illumination changes. It is observed that face recognition on thermal images degrades more sharply than with visible images when probe and gallery images are chosen from different sessions. Results in indicated better performance for visible imagery indoors under controlled lighting conditions, but thermal imagery-based face
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 21
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
recognition was better than its visible counterpart outdoors. Also, the recognition results of thermal imagery for both indoors and outdoors was found to be similar, thus proving that illumination had very little effect on thermal imagery. Thermal imagery degraded the fusion of both visible and thermal modalities yielded better overall performance. Feature-based face recognition techniques have demonstrated the capability of invariance to facial variations caused by illumination and have achieved high accuracy rates. To make the recognition process illumination invariant, phase congruency feature maps are used instead of intensity values as the input to the face recognition system. The feature selection process presented in this PROJECT is derived from the concept of modular spaces. Recognition techniques based on local regions have achieved high accuracy rates. Though the face images are affected due to variations such as non uniform illumination, expressions and partial occlusions, facial variations are confined mostly to local regions. Modularizing the images would help to localize these variations, provided the modules created are sufficiently small. But in this process, a large amount of dependencies among various neighboring pixels might be ignored. This can be countered by making the modules larger, but this would result in an improper localization of the facial variations. In order to deal with this problem, a module creation strategy has been implemented in this PROJECT which considers additional pixel dependencies across various sub-regions. This helps in providing additional information that could help in improving the classification accuracy. Also, linear subspace approaches such as PCA will not be able to capture the relationship among more than two variables. They cannot depict the variations caused by illuminations, expressions, etc., properly. In order to capture the relationships among more than two pixels, the data is projected into nonlinear higher dimensional spaces using the kernel method. This enables to capture the nonlinear relationships among the pixels within the modules. Face recognition accuracy in thermal images has been lower compared to visible images under controlled environments. The major problems in thermal face recognition are (i) Variations in local regions due to temperature inequalities and
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 22
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
(ii) Opaqueness of glass and, hence, partially occluded faces. Thermal imaging is sensitive to temperature changes in the surrounding environment. Also it is sensitive to variations in the heat patterns of the face. Factors that could contribute to these variations include facial expressions, physical conditions such as lack of sleep, and psychological conditions such as fear, stress, excitement, etc. Although the problems faced by thermal facial recognition are different from the visual counterpart, they are similar in the sense that many of the variations are confined to local regions. The proposed feature selection process overcomes all the above mentioned challenges due to its robustness to variations caused due to facial expressions, illumination, contrast and partial occlusions.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 23
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 4 IMPLEMENTATION OF PROJECT
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 24
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 4 IMPLEMENTATION OF PROJECT 4.1 LIVENESS ASSESSMENT IN AUTHENTICATION SYSTEM: Liveness assessment methods represent a challenging engineering problem as they have to satisfy certain demanding requirements: (i) Non-invasive, the technique should in no case be harmful for the individual or require an excessive contact with the user; (ii) User friendly, people should not be reluctant to use it; (iii) Fast results have to be produced in a much reduced interval as the user cannot be asked to interact with the sensor for a long period of time; (iv) Low cost, a wide use cannot be expected if the cost is excessively high; (v) Performance, in addition to having a good fake detection rate, the protection scheme should not degrade the recognition performance (i.e., false rejection) of the biometric system. 4.2 SOFTWARE-BASED TECHNIQUES: In this case the fake trait is detected once the sample has been acquired with a standard sensor (i.e., features used to distinguish between real and fake traits are extracted from the biometric sample, and not from the trait itself).
In the present work we propose a novel software-based multi-biometric and SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 25
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
multi-attack protection method which is used to overcome these limitations by using image quality assessment (IQA). It is not only capable of operating with a very good performance under different biometric systems (multi-biometric) and for diverse spoofing scenarios, but it also provides a very good level of protection against certain non-spoofing attacks (multi-attack). Moreover, the software based techniques for this type of systems provides more advantages and fast and accurate responses, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake. And this technique is user-friendly (transparent to the user) and doesn‘t allow the fake users; cheap and easy to embed in already functional systems (as no new piece of hardware is required). An added advantage of the proposed technique is its speed and very low complexity, which makes it very well suited to operate on real scenarios (one of the desired characteristics of this type of methods). As it does not deploy any traitspecific property (e.g., minutiae points, iris position or face detection), the computation load needed for image processing purposes is very reduced, using only general image quality measures fast to compute, combined with very simple classifiers. It has been tested on publicly available attack databases of iris, fingerprint and 2D face, where it has reached results fully comparable to those obtained on the same databases and following the same experimental protocols by more complex trait-specific top-ranked approaches from the state-of-the-art. 4.3 IMAGE QUALITY ASSESSMENT FOR LIVENESS DETECTION: The use of image quality assessment for Liveness detection is motivated by the assumption that: ―It is expected that a fake image captured in an attack attempt will have different quality than a real sample acquired in the normal operation scenario for which the sensor was designed.‖ Expected quality differences between real and fake samples may include: degree of sharpness, color and luminance levels, local artifacts, amount of information found in both type of images (entropy), structural distortions or natural appearance. For example, iris images captured from a printed PROJECT are more likely to be blurred or out of focus due to trembling; face images captured from a mobile device will probably be over-or under-exposed; and it is not rare that fingerprint images captured from a gummy finger present local acquisition artifacts such as spots and patches. Furthermore, in an eventual attack in which a synthetically SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 26
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
produced image is directly injected to the communication channel before the feature extractor, this fake sample will most likely lack some of the properties found in natural images. Following this ―quality-difference hypothesis, in the present research work we explore the potential of general image quality assessment as a protection method against different biometric attacks (with special attention to spoofing). As the implemented features do not evaluate any specific property of a given biometric modality or of a specific attack, they may be computed on any image. This gives the proposed method a new multi-biometric dimension which is not found in previously described protection schemes. In the current state-of-the-art, the rationale behind the use of IQA features for liveness detection is supported by three factors: Image quality has been successfully used in previous works for image manipulation detection and stag analysis in the forensic field. To a certain extent, many spoofing attacks, especially those which involve taking a picture of a facial image displayed in a2D device (e.g., spoofing attacks with printed iris or face images), may be regarded as a type of image manipulation which can be effectively detected, as shown in the present research work, by the use of different quality features. In addition to the previous studies in the forensic area, different features measuring trait-specific quality properties have already been used for Liveness detection purposes in fingerprint and iris applications. However, even though these two works give a solid basis to the use of image quality as a protection method in biometric systems, none of them is general. For instance, measuring the ridge and valley frequency may be a good parameter to detect certain fingerprint spoofs, but it cannot be used in iris Liveness detection. On the other hand, the amount of occlusion of the eye is valid as an iris antispoofing mechanism, but will have little use in fake fingerprint detection. This same reasoning can be applied to the vast majority of the Liveness detection methods found in the state-of-the art. Although all of them represent very valuable works which bring insight into the difficult problem of spoofing detection, they fail to generalize to different problems as they are usually designed to work on one specific modality and, in many cases, also to detect one specific type of spoofing attack. Human observers very often refer to the different appearance‖ of real and fake samples to distinguish between them. As stated above, the different metrics and SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 27
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
methods designed for IQA intend to estimate in an objective and reliable way the perceived appearance of images by humans. Different quality measures present different sensitivities to image artifacts and distortions. For instance, measures like the mean squared error respond more to additive noise, whereas others such as the spectral phase error are more sensitive to blur; while gradient-related features react to distortions concentrated around edges and textures. Therefore, using a wide range of IQMs exploiting complementary image quality properties should permit to detect the aforementioned quality differences between real and fake samples expected to be found in many attack attempts (i.e., providing the method with multi- attack protection capabilities). All these observations lead us to believe that there is sound proof for the quality-difference‖ hypothesis and that image quality measures have the potential to achieve success in biometric protection tasks.
4.4 FULL-REFERENCE IQ MEASURES: Full-reference (FR) IQA methods rely on the availability of a clean undistorted reference image to estimate the quality of the test sample. In the problem of fake detection addressed in this work such a reference image is unknown, as the detection system only has access to the input sample. In order to circumvent this limitation, the same strategy already successfully used for
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 28
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
image manipulation detection and for stage analysis, is implemented here. The input grey-scale image I (of size N × M) is filtered with a low-pass Gaussian kernel (σ = 0.5 and size 3 × 3) in order to generate a smoothed version Î .Then, the quality between both images (I and Î) is computed according to the corresponding full-reference IQA metric. This approach assumes that the loss of quality produced by Gaussian filtering differs between real and fake biometric samples. Gaussian filter: In electronics and signal processing, a Gaussian filter is a filter whose impulse response is a Gaussian function (or an approximation to it). Gaussian filters have the properties of having no overshoot to a step function input while minimizing the rise and fall time. This behavior is closely connected to the fact that the Gaussian filter has the minimum possible group delay. It is considered the ideal time domain filter, just as the since is the ideal frequency domain filter. These properties are important in areas such as oscilloscope and digital telecommunication systems. Mathematically, a Gaussian filter modifies the input signal by convolution with a Gaussian function; this transformation is also known as the Weierstrass transform. The Gaussian function is non-zero for x \in (-\infty,\infty) and would theoretically require an infinite window length. However, since it decays rapidly, it is often reasonable to truncate the filter window and implement the filter directly for narrow windows, in effect by using a simple rectangular window function. In other cases, the truncation may introduce significant errors. Better results can be achieved by instead using a different window function; see scale space implementation for details. Filtering involves convolution, the filter function is said to be the kernel of an integral transform. The Gaussian kernel is continuous. Most commonly, the discrete equivalent is the sampled Gaussian kernel that is produced by sampling points from the continuous Gaussian. An alternate method is to use the discrete Gaussian kernel which has superior characteristics for some purposes. Unlike the sampled Gaussian kernel, the discrete Gaussian kernel is the solution to the discrete diffusion equation. Since the Fourier transform of the Gaussian function yields a Gaussian function, the signal (preferably after being divided into overlapping windowed blocks) can be transformed with a Fast Fourier transform, multiplied with a Gaussian function and transformed back. This is the standard procedure of applying an arbitrary finite
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 29
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
impulse response filter, with the only difference that the Fourier transform of the filter window is explicitly known. Due to the central limit theorem, the Gaussian can be approximated by several runs of a very simple filter such as the moving average. The simple moving average corresponds to convolution with the constant B-spline ( a rectangular pulse ), and, for example, four iterations of a moving average yields a cubic B-spline as filter window which approximates the Gaussian quite well. 4.4.1 Different types FR-IQ Measurements: Error Sensitivity Measures: Traditional perceptual image quality assessment approaches are based on measuring the errors (i.e., signal differences) between the distorted and the reference images, and attempt to quantify these errors in a way that simulates human visual error sensitivity features. Although their efficiency as signal fidelity measures is somewhat controversial, up to date, these are probably the most widely used methods for IQA as they conveniently make use of many known psychophysical features of the human visual system, they are easy to calculate and usually have very low computational complexity. Several of these metrics have been included in the 25-feature parameterization proposed in the present work. For clarity, these features have been classified here into five different methods those are listed below:
Pixel Difference measures: These features compute the distortion between two images on the basis of their pixel wise differences. Here we include: Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR), Signal to Noise Ratio (SNR), Structural Content (SC), Maximum Difference (MD), Average Difference (AD), Normalized Absolute Error (NAE), R-Averaged Maximum Difference (RAMD) and Laplacian Mean Squared Error (LMSE). The formal definitions for each of these features are given in Table I. In the RAMD entry in Table I, maxr is defined as the r -highest pixel difference between two images. For the present implementation, R = 10. In the LMSE
entry in Table I, h(Ii, j ) = Ii+1, j +Ii−1, j + Ii, j+1 + Ii, j−1 − 4Ii, j .
Correlation-based measures: The similarity between two digital images can also be quantified in terms of the correlation function. A variant of correlation based measures can be obtained by considering the statistics of the angles between the pixel vectors of the original and distorted images. These features include (also defined in Table I): Normalized Cross-Correlation (NXC), Mean Angle Similarity (MAS) and Mean Angle-Magnitude Similarity
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 30
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
(MAMS).
Edge-based measures: Edges and other two-dimensional features such as corners, are some of the most informative parts of an image, which play a key role in the human visual system and in many computer vision algorithms including quality assessment application . Since the structural distortion of an image is tightly linked with its edge degradation, here we have considered two edge-related quality measures: Total Edge Difference (TED) and Total Corner Difference (TCD). In order to implement both features, which are computed according to the corresponding expressions given in Table I, we use: (i) the Sobel operator to build the binary edge maps IE and ÎE ; ( ii) the Harris corner detector to compute the number of corners Ncr and N̂cr found
in I and Î.
Spectral distance measures: The Fourier transform is another traditional image processing tool which has been applied to the field of image quality assessment. In this work we will consider as IQ spectral-related features: the Spectral Magnitude Error (SME) and the Spectral Phase Error (SPE), defined in Table I (where F and F̂ are the respective Fourier transforms of I and Î), and arg (F) denotes phase.
Gradient-based measures: Gradients convey important visual information which can be of great use for quality assessment. Many of the distortions that can affect an image are reflected by a change in its gradient. Therefore, using such information, structural and contrast changes can be effectively captured. Two simple gradient-based features are included in the biometric protection system proposed in the present article: Gradient Magnitude Error (GME) and Gradient Phase Error (GPE), defined in Table I (where G and Ĝ are the gradient maps of I and Î defined as G = Gx+iGy, where Gx and Gy are the gradients in the x and y directions).
Structural Similarity Measures: Although being very convenient and widely used, the aforementioned image quality metrics based on error sensitivity present several problems which are evidenced by their mismatch (in many cases) with subjective human-based quality scoring system. In this scenario, a recent new paradigm for image quality assessment based on structural similarity was proposed following the hypothesis that the human visual system is highly adapted for extracting structural information from the SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 31
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
viewing field. Therefore, distortions in an image that come from variations in lighting, such as contrast or brightness changes (nonstructural distortions), should be treated differently from structural ones. Among these recent objective perceptual measures, the Structural Similarity Index Measure (SSIM), has the simplest formulation and has gained widespread popularity in a broad range of practical applications. In view of its very attractive properties, the SSIM has been included in the feature parameterization. Information Theoretic Measures: The quality assessment problem may also be understood, from an information theory perspective, as an information-fidelity problem (rather than a signal-fidelity problem). The core idea behind these approaches is that an image source communicates to a receiver through a channel that limits the amount of information that could flow through it, thereby introducing distortions. The goal is to relate the visual quality of the test image to the amount of information shared between the test and the reference signals, or more precisely, the mutual information between them. Under this general framework, image quality measures based on information fidelity exploit the (in some cases imprecise) relationship between statistical image information and visual quality. In the present work we consider two of these information theoretic features: the Visual Information Fidelity (VIF) and the Reduced Reference Entropic Difference index (RRED). Both metrics are based on the information theoretic perspective of IQA but each of them takes either a global or a local approximation to the problem, as is explained below. The VIF metric measures the quality fidelity as the ratio between the total information (measured in terms of entropy) ideally extracted by the brain from the whole distorted image and the total information conveyed within the complete reference image. This metric relies on the assumption that natural images of perfect quality, in the absence of any distortions, pass through the human visual system (HVS) of an observer before entering the brain, which extracts cognitive information from it. For distorted images, it is hypothesized that the reference signal has passed through another ―distortion channel before entering the HVS. The VIF measure is derived from the ratio of two mutual information quantities: the mutual information between the input and the output of the HVS channel when no distortion channel is present (i.e., reference image information) and the mutual information between the input of the distortion channel and the output of SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 32
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
the HVS channel for the test image. Therefore, to compute the VIF metric, the entire reference image is required as quality is assessed on a global basis. On the other hand, the RRED metric approaches the problem of QA from the perspective of measuring the amount of local information difference between the reference image and the projection of the distorted image onto the space of natural images, for a given sub-band of the wavelet domain. In essence, the RRED algorithm computes the average difference between scaled local entropies of wavelet coefficients of reference and projected distorted images in a distributed fashion. This way, contrary to the VIF feature, for the RRED it is not necessary to have access the entire reference image but only to a reduced part of its information (i.e., quality is computed locally). This required information can even be reduced to only one single scalar in case all the scaled entropy terms in the selected wavelet sub-band are considered in one single block. 4.5 NO-REFERENCE IQ MEASURES: Unlike the objective reference IQA methods, in general the human visual system does not require of a reference sample to determine the quality level of an image. Following this same principle, automatic no-reference image quality assessment (NR-IQA) algorithms try to handle the very complex and challenging problem of assessing the visual quality of images, in the absence of a reference. Presently, NR-IQA methods generally estimate the quality of the test image according to some pre-trained statistical models. Depending on the images used to train this model and on the a priori knowledge required, the methods are coarsely divided into one of three trends: • Distortion-specific approaches: These techniques rely on previously acquired knowledge about the type of visual quality loss caused by a specific distortion. The final quality measure is computed according to a model trained on clean images and on images affected by this particular distortion. Two of these measures have been included in the biometric protection method proposed in the present work. The JPEG Quality Index (JQI), which evaluates the quality in images affected by the usual block artifacts found in many compression algorithms running at low bit rates such as the JPEG. The High-Low Frequency Index (HLFI), which is formally, defined in Table. It was inspired by previous work which considered local gradients as a blind metric to detect blur and noise. Similarly, the HLFI feature is sensitive to the SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 33
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
sharpness of the image by computing the difference between the power in the lower and upper frequencies of the Fourier Spectrum. In the HLFI entry in Table I, il , ih, jl , jh are respectively the indices corresponding to the lower and upper frequency thresholds considered by the method. In the current implementation, il = ih = 0.15N and jl = jh = 0.15M. • Training-based approaches: Similarly to the previous class of NR-IQA methods, in this type of techniques a model is trained using clean and distorted images. Then, the quality score is computed based on a number of features extracted from the test image and related to the general model. However, unlike the former approaches, these metrics intend to provide a general quality score not related to a specific distortion. To this end, the statistical model is trained with images affected by different types of distortions. This is the case of the Blind Image Quality Index (BIQI) described in, which is part of the 25 feature set used in the present work. The BIQI follows a two-stage framework in which the individual measures of different distortion-specific experts are combined to generate one global quality score. • Natural Scene Statistic approaches: These blind IQA techniques use a priori knowledge taken from natural scene distortion-free images to train the initial model (i.e. no distorted images are used). The rationale behind this trend relies on the hypothesis that undistorted images of the natural world present certain regular properties which fall within a certain subspace of all possible images. If quantified appropriately, deviations from the regularity of natural statistics can help to evaluate the perceptual quality of an image. This approach is followed by the Natural Image Quality Evaluator (NIQE) used in the present work. The NIQE is a completely blind image quality analyzer based on the construction of a quality aware collection of statistical features (derived from a corpus of natural undistorted images). Measured Parameters From An Image: Image quality assessments measures can be done in two different ways fully reference method and no reference method. Here we are calculating 25 different image quality measurements those are mentioned in the below table
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 34
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
Table 4.1: Different parameters measured for an image MSE Mean Square Error PSNR Peak Signal to Noise Ratio SNR
Signal to Noise Ratio
SC
Structural Content
MD
Maximum Difference
AD
Average Difference
NAE
Normalized Absolute Error
RAMD
R-Average MD
LMSE
Laplacian MSE
NXC
Normalized Cross-Correlation
MAS
Mean Angle Similarity
MAMS
Mean Angle Magnitude Similarity
TED
Total Edge Difference
TCD
Total Corner Difference
SME
Spectral Magnitude Error
SPE
Spectral Phase Error
GME
Gradient Magnitude Error
GPE
Gradient Phase Error
SSIM
Structural Similarity Index
VIF
Visual Information Fidelity
RRED
Reduced Ref. Entropic Difference
JQI
Jpeg Quality Index
HLFI
High-Low Frequency Index
BIQI
Blind Image Quality Index
NIQE
Naturalness Image Quality Estimation
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 35
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
4.6 DUAL TREE COMPLEX WAVELETS TRANSFORM: The complex wavelet transform (CWT) is a complex-valued extension to
thestandard discrete wavelet transform (DWT).It is a two-dimensional
wavelet transform which provides multi resolution , sparse representation, and useful characterization of the structure of an image. Further, it purveys a high degree of shift-invariance in its magnitude, which was investigated in However, a drawback to this transform is that it is exhibits
(where
is the dimension of the signal
being transformed) redundancy compared to a separable (DWT). The use of complex wavelets in image processing was originally set up in 1995 by J.M. Lina and L. Gagnon in the framework of the Daubechies orthogonal filters banks. It was then generalized in 1997 by Prof. Nick Kingsbury. In the area of computer vision, by exploiting the concept of visual contexts, one can quickly focus on candidate regions, where objects of interest may be found, and then compute additional features through the CWT for those regions only. These additional features, while not necessary for global regions, are useful in accurate detection and recognition of smaller objects. Similarly, the CWT may be applied to detect the activated voxels of cortex and additionally the temporal independent component analysis (TICA) may be utilized to extract the underlying independent sources whose number is determined by Bayesian information criterion. The Dual-tree complex wavelet transform (DTCWT) calculates the complex transform of a signal using two separate DWT decompositions (tree a and tree b). If the filters used in one are specifically designed different from those in the other it is possible for one DWT to produce the real coefficients and the other the imaginary.
Fig: 4.3 Block diagram for a 3-level DTCWT
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 36
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
This redundancy of two provides extra information for analysis but at the expense of extra computational power. It also provides approximate shift-invariance (unlike the DWT) yet still allows perfect reconstruction of the signal. The design of the filters is particularly important for the transform to occur correctly and the necessary characteristics are:
The low-pass filters in the two trees must differ by half a sample period. Reconstruction filters are the reverse of analysis. All filters from the same ortho normal set. Tree a filters are the reverse of tree b filters. Both trees have the same frequency response. The Discrete Wavelet Transform (DWT) has been a founding stone for all
applications of digital image processing: from image denoising to pattern recognition, passing through image encoding and more. While being a complete and (quasi)invertible transform of 2D data, the Discrete Wavelet Transform gives rise to a phenomenon known as checker board pattern, which means that data orientation analysis is impossible. Furthermore, the DWT is not shift-invariant, making it less useful for methods based on the computation of invariant features. In an attempt to solve these two problems affecting the DWT, Freeman and Adelson first introduced the concept of Steerable filters, which can be used to decompose an image into a Steerable Pyramid, by means of the Steerable Pyramid Transform (SPT). Thus, a further development of the SPT, involving the use of a Hilbert pair of filters to compute the energy response, has been accomplished with the Complex Wavelet Transform (CWT). Similarly to the SPT, in order to retain the whole Fourier spectrum, the transform needs to be over-complete by a factor of 4, i.e. there are 3 complex coefficients for each real one. While the CWT is also efficient, since it can be computed through separable filters, it still lacks the Perfect Reconstruction property. Therefore, Kingsbury also introduced the Dual-tree Complex Wavelet Transform (DTCWT), which has the added characteristic of Perfect Reconstruction at the cost of approximate shift-invariance. The present work has made several contributions to the state-of-the-art in the field of biometric security, in particular: i ) it has shown the high potential of image quality assessment for securing biometric SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 37
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
systems against a variety of attacks; ii) Proposal and validation of a new biometric protection method; iii) Reproducible evaluation on multiple biometric traits based on publicly available databases; iv) Comparative results with other previously proposed protection solutions.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 38
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 5 SOFTWARE ASPECTS
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 39
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 5 SOFTWARE ASPECTS 5.1 INTRODUCTION TO MATLAB In this section we present the basics of working with images in Matlab. We will see how to read, display, write and convert images. We will also talk about the way images are represented in Matlab and how to convert between the different types. The Matlab command for reading an image is imread('filename') Note that we suppress the output with a semicolon, otherwise we will get in the output all the numbers that make the image. 'filename' is the name of a file in the current directory or the name of a file including the full path. Try >> f = imread('chest-xray.tif'); We now have an array f where the image is stored >> whos f NameSize f
494x600
Bytes Class 296400 uint8 array
Grand total is 296400 elements using 296400 bytes f is an array of class uint8, and size 494x600. That means 494 rows and 600 columns. We can see some of this information with the following commands >> size(f) ans = 494 600 >> class(f) ans = uint8 We will talk later on about the different image classes. Sometimes it is useful to determine the number of rows and columns in an image. We can achieve this by means of >> [M, N] = size(f); To display the image we use imshow >> imshow(f) You will get a window similar to this
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 40
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
Fig5.1: Example image (f)
Note that in the figure toolbar we have buttons that allow us to zoom parts of the image. The syntax imshow(f, [low high])displays all pixels with values less than or equal to low as black, all pixels with values greater or equal to high as white. Try in the image. Once the image has been labeled, use the regionprops command to obtain quantitative information about the objects: D = regionprops(L, properties) There‘s a lot of useful statistical information about objects that can be extracted using regionprops. Here‘s a list: >> imshow(f,[10 50]) Finally, >> imshow(f,[]) sets the variable low to the minimum value of array f and high to its maximum value. This is very useful for displaying images that have a low dynamic range. This occurs very frequently with 16-bit images from a microscope.
We can also display portions of an image by specifying the range
>> imshow(f(200:260,150:220)) Another matlab tool available to display images and do simple image manipulations is imtool. Try >> imtool(f) In the figure window we have now available the following tools: overview, pixel region, image information, adjust contrast and zoom. Try them. SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 41
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
Images can be written to disk using the function imwrite. Its format is imwrite(f, 'filename') with this syntax, filename must include the file format extension. Alternatively imwrite(f, 'filename', format) saves f using format. For example >> imwrite(f, 'test', 'jpeg', 'quality', 25) In the help you can find more information about available formats and their options. Image types, data classes and image classes There are different image types and image classes available in MATLAB. The two primary image types you will be working with are as follows Intensity images o uint16 [0, 65535]
(CCD cameras on microscopes)
o uint8[0, 255]
(From your standard digital camera)
308
o double [-10
, 10
308
]
Binary images (black and white) o logical, 0 or 1
Raw images typically come in the form of an unsigned integer (uint16 denotes 16-bit unsigned integer, and uint8 denotes 8-bit unsigned integer). However floating-point operations (mathematical operations that involve a decimal point, such as log(a)) can only be done with arrays of class double. Hence, to work on a raw image, first convert it from uint16 or uint8 to double using the double function: >> f = imread('actin.tif'); >> g = double(f); Now type >> whos; to see the different data types associated with each variable. Note that while the data type changes, the actual numbers after the conversion remain the same. Many MATLAB image processing operations operate under the assumption that the image is scaled to the range [0,1]. For instance, when imshow displays an double image, it displays an intensity of 0 as black and 1 as white. You can automatically create a scaled double image using mat2gray:
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 42
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
>> h = mat2gray(g); Certain image processing commands only work with scaled double images. Finally, we can convert an intensity image into a binary image using the command im2bw(f, T), where T is a threshold in the range [0, 1]. Matlab converts f to class double, and then sets to 0 the values below T and to 1 the values above T. The result is of class logical. See the following example. We wish to convert the following double image >> f = [1 2; 3 4] f=
1 2 3 4
to binary such that values 1 and 2 become 0 and the other two values become 1. First we convert it to the range [0, 1] >> g = mat2gray(f) g= 0 0.6667
0.3333 1.0000
We can convert the previous image to a binary one using a threshold, say, of value 0.6: >> gb = im2bw(g, 0.6) gb = 0 0 1 1 Note that we can obtain the same result using relational operators >> gb = f > 2 gb =0 0 1 1 Binary images generated by thresholding often form the basis for extracting morphological features in microscopy images. In the next section, we will extract some basic quantitative information about objects in an image by first using thresholding to generate a binary image and then using the region props command to extract quantitative information from the binary image. Basic Segmentation using Thresholding Many biological images comprise of light objects over a constant dark background (especially those obtained using fluorescence microscopy), in such a way that object and background pixels have gray levels grouped into two dominant modes. One obvious way to SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 43
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
extract the objects from the background is to select a threshold T that separates these modes: g(x,y)
=
1
if
=
0 otherwise
f(x,y) > T
where g(x,y) is the threshold binary image of f(x,y). We can implement the thresholding operation in MATLAB by the following function: g = im2bw(f,T) The first argument f gives the input image, and the second argument T gives the threshold value. Image histograms We need to choose a threshold value T that properly separates light objects from the dark background. Image histograms provide a means to visualize the distribution of grayscale intensity values in the entire image. They are useful for estimating background values, determining thresholds, and for visualizing the effect of contrast adjustments on the image (next section). The matlab function to visualize image histograms is imhist >> f = imread('chest-xray.tif'); >> imhist(f); The histogram has 256 bins by default. The following command makes 20 bins >> imhist(f,20); A good value for T can be obtained by visually inspecting the image histogram obtained using the imhist command: >> im = imread('rice.png');
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 44
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
Fig 5.2 Example picture (rice.png) >> imhist(im); Based on the histogram, pick a grayscale value manually that separates the light rice grains from the dark background. Then threshold the image and display the results. MATLAB provides a function graythresh that automatically computes a threshold value: T = graythresh(im) where im is the input image and T is the resulting threshold. graythresh calculates the threshold value by essentially maximizing the weighted distances between the global mean of the image histogram and the means of the background and foreground intensity pixels. EXAMPLE In this example, we threshold the image of rice grains opened above: >>im=imread('rice.png'); >> im = mat2gray(im); Calculate the threshold value: >> level = graythresh(im); and
create
a
new
binary
image
using
the
obtained
threshold
>> imb = im2bw(im,level); Note that the thresholding operation segments the rice grains quite well. However, a problem in this image is that the rice grains near the bottom of the image aren‘t segmented well – the background is uneven and is low at the bottom, leading to incorrect segmentation. We‘ll see a way to correct for this uneven background using image processing later.Using the binary image, we can then calculate region properties of objects in the image, such as area, diameter, etc… An object in a binary image is a set of white pixels (ones) that are connected to each other. We can enumerate all the objects in the figure using the bwlabel command: [L, num] = bwlabel(f) where L gives the labeled image, and num gives the number of objects. To label the binary image of the rice grains, type:
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 45
value:
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
>> [L, N] = bwlabel(imb); Now look at the labeled image L using imtool. Table 5.1 Imtool
'Area'
'Euler Number'
'Orientation'
'Bounding Box'
'Extent'
'Perimeter'
'Centroid'
'Extrema'
'Pixel Index List'
'Convex Area'
'Filled Area'
'Pixel List'
'Convex Hull'
'Filled Image'
'Solidity'
'Convex Image'
'Image'
'Sub array Idx'
'Eccentricity'
'Major Axis Length'
'Equiv Diameter' 'Minor Axis Length'
Extract the area and perimeter of individual objects in the labeled image as follows: >> D = regionprops(L, 'area', 'perimeter'); The information in D is stored in an object called a structure array. A structure array is a variable in MATLAB that contains multiple fields for storage of information. You can access the field information in D as follows: >> D D =151x1 struct array with fields: Area Perimeter Access an individual element in the structure array by referring to its index in parenthesis: >> D(1) ans = Area: 145 Perimeter: 58.2843
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 46
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 6 RESULT ANALYSIS
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 47
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 6 RESULT ANALYSIS 6.1 TOP MODULE: Finally, after simulation of the code, a window is opened which is shown in figure 6.1. This window consists of 4 labels those are About, Process, Help and Exit. About is used to identify the given biometrics data of fingerprints, iris and 2d faces are fake or original by using IAQ parameters. Help is used to select the process button; the input GUI will open then input is given. Exit is used to quit from the window. Process label gives information about the selection of image (finger print, iris, face) to weather it is fake or real.
Fig 6.1: Top module
After selecting the Process Label another Window is opened which is shown in figure 6.2 this window is called Input window. SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 48
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
6.2 INPUT PROCESS WINDOW: In Input window, an image (fingerprint or face or iris) can be selected by using a Load Image Label shown left side of the figure 6.2. After that, selected image can be converted into Gray colour by selecting Gray Image label then Resize and Filter the image by using the labels shown in input window then click the arrow button for further process.
Fig 6.2: Input Process Window
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 49
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
6.3 IDENTIFICATION PROCESS: After the conversion process explained in second window process i.e., the loaded image can be converted into Gray image, Filtered and Resized the third window is opened shown in Figure 6.3. This gives information about the converted image. Now by click the arrow button shown in this window further process will be done.
Fig 6.3: Identification Process
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 50
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
6.4 IQA PARAMETERS: Using the above identification process the following IQ parameters are measured shown in figure 6.4. Initially some threshold values are mentioned for these parameters. After calculating these parameters and by using the threshold values of these parameters it can recognize whether the loaded image is fake or real.
Fig 6.4: Measured IQ Parameters
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 51
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
6.5 FINAL RESULT: Based on the above calculating parameters for the loaded image it shows that it is fake. Why because some of the parameters get negative values shown in figure 6.4, so that the loaded image is fake shown in figure 6.5.
Fig 6.5: Final Result
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 52
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
6.6 ADVANTAGES:
It provides high potential of image quality assessment for securing biometric systems against a variety of attacks.
The error rates achieved by the proposed protection scheme are in many cases lower than those reported by other trait-specific state-of-the-art antispoofing systems.
It is simple, fast, non-intrusive and user-friendly because of its Multibiometric and Multi attack characteristics
I t also provides the analysis of the features individual relevance.
6.7APPLICATIONS:
It is an applicable system in offices, colleges and other systems which require more security from fake users.
It is also used in Forensic labs for the detection of finger prints of criminals.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 53
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 7 CONCLUSION & FUTURE SCOPE
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 54
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
CHAPTER 7 CONCLUSION & FUTURE SCOPE 7.1 CONCLUSION: Finally, by using DTCWT, IQA techniques, this project is well executed on different sets of images. This is very much efficient in finding of fake or original. This interest has lead to big advances in the field of security-enhancing technologies for biometric-based applications. However, in spite of this noticeable improvement, the development of efficient protection methods against known threats has proven to be a challenging task. Yet, some disparities between the real and fake images may become evident once the images are translated into a proper feature space. These differences come from the fact that biometric traits, as 3d-objects, have their own optical qualities. 7.2 FUTURE SCOPE: To improve the clarity of ridge and valley structures in fingerprint images, a number of techniques have been used to enhance gray-level images and by using the extension of the considered 25 features set with new image quality measures it can be applicable to palm prints, hand geometry and vein. We can also use the enhancement algorithm, which applies a bank of band pass Gabor filters on the normalized fingerprint image using estimated orientation and frequency information. So we will focus on the extraction of a valley mask, not a ridge mask as many methods have used for fingerprint recognition. And it is also used for the systems working with face videos by using enhanced algorithms and filter techniques.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 55
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
REFERENCES
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 56
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
REFERENCES [1] S. Prabhakar, S. Pankanti, and A. K. Jain, Biometric recognition: Security and privacy concerns, IEEE Security Privacy, vol. 1, no. 2, pp. 33–42, Mar./Apr. 2003. [2] T. Matsumoto, Artificial irises: Importance of vulnerability analysis, in Proc. AWB, 2004. [3] J. Galbally, C. McCool, J. Fierrez, S. Marcel, and J. Ortega-Garcia, On the vulnerability of face verification systems to hill-climbing attacks, Pattern Recognit., vol. 43, no. 3, pp. 1027– 1038, 2010 [4] A. K. Jain, K. Nandakumar, and A. Nagar, Biometric template security,EURASIP J. Adv. Signal Process., vol. 2008, pp. 113–129, Jan. 2008. [5] J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia, A high performance fingerprint liveness detection method based on quality related features,Future Generat. Comput. Syst., vol. 28, no. 1, pp. 311–321, 2012. [6] K. A. Nixon, V. Aimale, and R. K. Rowe, Spoof detection schemes, Handbook of Biometrics. New York, NY, USA: Springer-Verlag, 2008, pp. 403–423. [7] ISO/IEC 19792:2009, Information Technology—Security Techniques—Security Evaluation of Biometrics, ISO/IEC Standard 19792, 2009. [8] Biometric Evaluation Methodology. v1.0, Common Criteria, 2002. [9] K. Bowyer, T. Boult, A. Kumar, and P. Flynn, Proceedings of the IEEE Int. Joint Conf. on Biometrics. Piscataway, NJ, USA: IEEE Press, 2011. [10] G. L. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, et al., First international fingerprint liveness detection competition LivDet 2009, in Proc. IAPR ICIAP, Springer LNCS-5716. 2009, pp. 12–23. [11] M. M. Chakka, A. Anjos, S. Marcel, R. Tronci, B. Muntoni, G. Fadda, et al., Competition on countermeasures to 2D facial spoofing attacks, in Proc. IEEE IJCB, Oct. 2011, pp. 1–6. [12] J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M. Martinez-Diaz, Evaluation of direct attacks to fingerprint verification systems, J. Telecommun. Syst., vol. 47, nos. 3–4, pp. 243–254, 2011. [13] A. Anjos and S. Marcel, Counter-measures to photo attacks in face recognition: A public database and a baseline, in Proc. IEEE IJCB, Oct. 2011, pp. 1–7. [14] Biometrics Institute, London, U.K. (2011). Biometric VulnerabilityAssessment Expert Group [Online]. Available:
BEAT: Biometrices Evaluation and Testing
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 57
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
[Online]. Available: http://www.beat-eu.org/ [16] (2010). Trusted Biometrics Under Spoofing Attacks (TABULA RASA) [Online]. Available: http://www.tabularasa-euproject.org/ [17] J. Galbally, R. Cappelli, A. Lumini, G. G. de Rivera, D. Maltoni, J. Fierrez, et al., An evaluation of direct and indirect attacks using fake fingers generated from ISO templates, Pattern Recognit. Lett., vol. 31,no. 8, pp. 725–732, 2010. [18] J. Hennebert, R. Loeffel, A. Humm, and R. Ingold, A new forgery scenario based on regaining dynamics of signature, in Proc. IAPR ICB, vol. Springer LNCS4642. 2007, pp. 366– 375. [19] A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietikainen, J. Bustard, and M. Nixon, Can gait biometrics be spoofed? in Proc. IAPR ICPR, 2012, pp. 3280–3283. [20] Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli, Evaluation of serial and parallel multibiometric systems under spoofing attacks, in Proc. IEEE 5th Int. Conf. BTAS, Sep. 2012, pp. 283–288. [21] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York, NY, USA: Springer Verlag, 2009. [22] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, Fingerprint image reconstruction from standard templates, IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 9, pp. 1489–1503, Sep. 2007. [23] S. Shah and A. Ross, Generating synthetic irises by feature agglomeration,‖in Proc. IEEE ICIP, Oct. 2006, pp. 317–320. [24] S. Bayram, I. Avcibas, B. Sankur, and N. Memon, Image manipulation detection, J. Electron. Imag., vol. 15, no. 4, pp. 041102-1–041102-17, 2006. [25] M. C. Stamm and K. J. R. Liu, Forensic detection of image manipulation using statistical intrinsic fingerprints, IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 492–496, Sep. 2010. [26] I. Avcibas, N. Memon, and B. Sankur, Steganalysis using image quality metrics, IEEE Trans. Image Process., vol. 12, no. 2, pp. 221–229, Feb. 2003. [27] S. Lyu and H. Farid, Steganalysis using higher-order image statistics, IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 111–119, Mar. 2006.
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 58
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
BIBLIOGRAPHY
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 59
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
BIBLIOGRAPHY 1. Digital image processing , S.jayaraman,S.Esakkirajan, Mc Graw hill Publications. 2.Digital image processing, Rafael C.Gonzalez and Richard E.Woods, Pearson education. 3.S.Sridhar, Digital image processing Oxford publishers. 4.Digital image processing and analysis , B.Chanda and D.Dutta Majumder, Prentice Hall of India. 5.Digital signal processing ,P.ramesh Babu, Scitech Publications. 6.www.scirp.org/journal/wsn 7.jwcn.eurasipjournals.com
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 60
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
APPENDIX
APPENDIX SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 61
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
SOURCE CODE function varargout = DeskGUI(varargin) % DESKGUI MATLAB code for DeskGUI.fig %
DESKGUI, by itself, creates a new DESKGUI or raises the existing
%
singleton*.
%
H = DESKGUI returns the handle to a new DESKGUI or the handle to
%
the existing singleton*.
%
DESKGUI('CALLBACK',hObject,eventData,handles,...) calls the local
% %
function named CALLBACK in DESKGUI.M with the given input arguments. DESKGUI('Property','Value',...) creates a new DESKGUI or raises the
%
existing singleton*. Starting from the left, property value pairs are
%
applied to the GUI before DeskGUI_OpeningFcn gets called. An
%
unrecognized property name or invalid value makes property application
%
stop. All inputs are passed to DeskGUI_OpeningFcn via varargin.
%
*See GUI Options on GUIDE's Tools menu. Choose "GUI allows only one
%
instance to run (singleton)".
% See also: GUIDE, GUIDATA, GUIHANDLES % Edit the above text to modify the response to help DeskGUi % Last Modified by GUIDE v2.5 31-May-2014 10:32:02 % Begin initialization code - DO NOT EDIT gui_Singleton = 1; gui_State = struct('gui_Name',
mfilename, ...
'gui_Singleton', gui_Singleton, ... 'gui_OpeningFcn', @DeskGUI_OpeningFcn, ... 'gui_OutputFcn', @DeskGUI_OutputFcn, ... 'gui_LayoutFcn', [] , ... 'gui_Callback', []); if nargin && ischar(varargin{1}) gui_State.gui_Callback = str2func(varargin{1});
end if nargout [varargout{1:nargout}] = gui_mainfcn(gui_State, varargin{:}); else
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 62
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
gui_mainfcn(gui_State, varargin{:}); end % End initialization code - DO NOT EDIT % --- Executes just before DeskGUI is made visible. function DeskGUI_OpeningFcn(hObject, eventdata, handles, varargin) % This function has no output args, see OutputFcn. % hObject handle to figure % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) % varargin command line arguments to DeskGUI (see VARARGIN) % Choose default command line output for DeskGUI handles.output = hObject; % Update
handles
structure
guidata(hObject, handles);
% UIWAIT makes DeskGUI wait for user response (see UIRESUME) % uiwait(handles.figure1); % --- Outputs from this function are returned to the command line. function varargout = DeskGUI_OutputFcn(hObject, eventdata, handles) % varargout cell array for returning output args (see VARARGOUT); % hObject handle to figure % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) % a = imread('icon\a.jpg'); % b=imresize(a,0.4); % set(handles.input, 'CData', b); % a = imread('icon\e.jpg'); % b=imresize(a,0.4); % set(handles.exit, 'CData', b); % a = imread('icon\h.jpg'); % b=imresize(a,0.4); % set(handles.help, 'CData', b); % a = imread('icon\p.jpg'); % b=imresize(a,0.2); SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 63
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
% set(handles.Process, 'CData', b); % Get default command line output from handles structure varargout{1} = handles.output; % --- Executes on button press in input. function input_Callback(hObject, eventdata, handles) % hObject handle to input (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) AboutProject % --- Executes on button press in Process. function Process_Callback(hObject, eventdata, handles) % hObject handle to Process (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) close() InputProcess % --- Executes on button press in help. function help_Callback(hObject, eventdata, handles) % hObject handle to help (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) help % --- Executes on button press in exit. function exit_Callback(hObject, eventdata, handles) % hObject handle to exit (see GCBO) % eventdata reserved - to be defined in a future version of MATLAB % handles structure with handles and user data (see GUIDATA) close() function x=quafeature(img1,img2) clc [m n]=size(img1); a=double(img1); b=double(img2); c=a^2; d=b^2; e=(a-b)^2;
MSE=sum(sum((e)/(m*n))) PSNR= 10*log(max(max((c)/ MSE)))+3; SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 64
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
SNR=log(sum(sum((c)/(n*m*MSE)))); SC=sum(sum((c)/(d))); MD=max(mad(a-b)); AD=sum(sum((a-b)/(n*m))); NAE=(mad(ab))/(mad(a)); NXC=sum(sum((a*b)/c)); ed1=edge(img1,'sobel'); ed2=edge(img2,'sobel'); Ted=mad(ed1-ed2) TED=sum(Ted); C1=corner(img1); D1=round(mean(C1)); CD1=D1(1); C2=corner(img2); D2=round(mean(C2)); CD2=D2(1); TCD=(CD1-CD2)/(max(CD1,CD2)); SSI=ssim(img1,img2); psnval=psnr(img1,img2,vv) warndlg(psnval) x=[MSE PSNR SNR SC MD AD NAE NXC TED TCD SSI];
LIST OF ACRONYMS
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 65
FAKE BIOMETRIC DETECTION USING SOFTWARE BASED LIVENESS DETECTION TECHNIQUE
PSNR
Peak Signal to Noise Ratio
DWT
Discrete Wavelet Transform
CWT
Complex Wavelet Transform
DTCWT
Dual Tree Complex Wavelet Transform
KPCA
Kernel Principle Component Analysis
KFDA
Kernel Fischer Discriminate Analysis
IQA
Image Quality Assessment
IQM
Image Quality Measures
FRIQM
Full Reference Image Quality Measure
NR IQM
No Reference Image Quality Measure
NIQE
Natural Image Quality Evaluator
SWARNANDHRA INSTITUTE OF ENGINEERING & TECHNOLOGY
Page 66
View more...
Comments