An Efficient OCT Fingerprint Antispoofing Method Based on ResMamba
Abstract
:1. Introduction
2. The Proposed Method
2.1. Preliminaries
2.1.1. State Space Models
2.1.2. Discretization
2.1.3. A Selective Scan Mechanism
2.2. The SSM in the Convolution Module
2.3. The ResMamba Block
2.4. ResMamba for OCT Fingerprint Antispoofing
2.5. The Antispoofing Method
3. Experiments and Analysis
3.1. OCT Systems and Data Acquisition
3.2. Experimental Settings
3.2.1. Datasets
3.2.2. Evaluation Metrics
3.2.3. Optimization
3.3. The Antispoofing Performance Experiment
3.4. The Runtime Performance Experiment
3.5. The Ablation Experiment
- First layer only: With an AUC of 0.988 and a TPR@FPR = 0.1 of 0.973, this configuration provided moderate improvements. However, an EER of 0.021 and a of 0.082 suggest the model still struggles in certain scenarios.
- Second layer only: This achieved an AUC of 0.988 and an EER of 0.030, with a TPR@FPR = 0.1 of 0.953 and a of 0.051, indicating strong performance in feature extraction but occasional misclassifications.
- Third layer only: This demonstrated the best performance among the single-layer integrations, with an AUC of 0.994, an EER of 0.023, and a TPR@FPR = 0.1 of 0.982. The of 0.022 highlights its effectiveness in reducing the number of false positives and improving reliability.
- Early stage + first ResMamba layer: Achieved an AUC of 0.992 and an EER of 0.034, with a lower TPR@FPR = 0.1 of 0.869 and a higher of 0.649, indicating limited improvement in error control.
- Early stage + second ResMamba layer: Showed an AUC of 0.994, an EER of 0.014, and a TPR@FPR = 0.1 of 0.971, with a of 0.033, reflecting a balanced trade-off between accuracy and error control.
- Early stage + third ResMamba layer: Demonstrated excellent performance, with an AUC of 0.987, an EER of 0.005, a TPR@FPR = 0.1 of 0.993, and a of 0.009, highlighting this configuration’s robustness.
- Early stage + all ResMamba layers: Produced the best overall results, with an AUC of 0.995, an EER of 0.002, and a TPR@FPR = 0.1 of 0.990. The lowest of 0.004 emphasizes this configuration’s superiority in enhancing the stability and predictive accuracy.
3.6. Visualization
4. Discussion
5. Conclusions
- Enhanced detection accuracy and efficiency: The ResMamba model achieved state-of-the-art performance, with an ERR of 0.2% and an AUC of 99.8%, significantly surpassing that of the traditional methods. Its lightweight architecture ensures an inference time of only 11 ms, making it suitable for real-time applications in resource-constrained environments.
- Robustness against advanced spoofing techniques: By fully exploiting OCT volumetric data, the model effectively distinguishes genuine fingerprints from those created using complex multilayered materials, demonstrating strong generalization capabilities even with a limited training dataset.
- Model limitations: Despite its advantages, the model’s reliance on OCT volume data increases the computational requirements compared to those of 2D-image-based approaches. Additionally, the robustness to rare or highly sophisticated spoofing materials, such as biomimetic polymers, requires further evaluation. The model’s reliance on labeled data also poses challenges for its scalability to diverse fingerprint datasets.
- Future directions: Future work will focus on dataset diversity, architectural optimization, and the integration of multimodal biometric data to further enhance the robustness and scalability of the proposed model.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Das, A.; Galdi, C.; Han, H.; Ramachandra, R.; Dugelay, J.L.; Dantcheva, A. Recent advances in biometric technology for mobile devices. In Proceedings of the 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), Redondo Beach, CA, USA, 22–25 October 2018; IEEE: New York, NY, USA, 2018; pp. 1–11. [Google Scholar]
- Khan, T.M.; Bailey, D.G.; Khan, M.A.; Kong, Y. Efficient hardware implementation for fingerprint image enhancement using anisotropic Gaussian filter. IEEE Trans. Image Process. 2017, 26, 2116–2126. [Google Scholar] [CrossRef] [PubMed]
- Chugh, T.; Jain, A.K. OCT Fingerprints: Resilience to Presentation Attacks. arXiv 2019, arXiv:1908.00102. [Google Scholar] [CrossRef]
- Meissner, S.; Breithaupt, R.; Koch, E. Defense of fake fingerprint attacks using a swept source laser optical coherence tomography setup. In Proceedings of the Frontiers in Ultrafast Optics: Biomedical, Scientific, and Industrial Applications XIII, San Francisco, CA, USA, 2–7 February 2013; SPIE: New York, NY, USA, 2013; Volume 8611, pp. 49–52. [Google Scholar]
- Ametefe, D.S.; Sarnin, S.S.; Ali, D.M.; Zaheer, M. Fingerprint liveness detection schemes: A review on presentation attack. Comput. Methods Biomech. Biomed. Eng. Imaging Vis. 2022, 10, 217–240. [Google Scholar] [CrossRef]
- Zukarnain, Z.A.; Muneer, A.; Ab Aziz, M.K. Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges. Symmetry 2022, 14, 821. [Google Scholar] [CrossRef]
- Gamassi, M.; Lazzaroni, M.; Misino, M.; Piuri, V.; Sana, D.; Scotti, F. Quality assessment of biometric systems: A comprehensive perspective based on accuracy and performance measurement. IEEE Trans. Instrum. Meas. 2005, 54, 1489–1496. [Google Scholar] [CrossRef]
- Xiao, Q. Technology review-biometrics-technology, application, challenge, and computational intelligence solutions. IEEE Comput. Intell. Mag. 2007, 2, 5–25. [Google Scholar] [CrossRef]
- Sousedik, C.; Busch, C. Presentation attack detection methods for fingerprint recognition systems: A survey. Iet Biom. 2014, 3, 219–233. [Google Scholar] [CrossRef]
- Aum, J.; Kim, J.H.; Jeong, J. Live acquisition of internal fingerprint with automated detection of subsurface layers using OCT. IEEE Photonics Technol. Lett. 2015, 28, 163–166. [Google Scholar] [CrossRef]
- Memon, N. How biometric authentication poses new challenges to our security and privacy [in the spotlight]. IEEE Signal Process. Mag. 2017, 34, 196-194. [Google Scholar] [CrossRef]
- Marasco, E.; Ross, A. A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. (CSUR) 2014, 47, 1–36. [Google Scholar] [CrossRef]
- Darlow, L.N.; Webb, L.; Botha, N. Automated spoof-detection for fingerprints using optical coherence tomography. Appl. Opt. 2016, 55, 3387–3396. [Google Scholar] [CrossRef] [PubMed]
- Sedik, A.; El-Latif, A.A.A.; El-Affendi, M.; Mostafa, H. A Cancelable Biometric System Based on Deep Style Transfer and Symmetry Check for Double-Phase User Authentication. Symmetry 2023, 15, 1426. [Google Scholar] [CrossRef]
- Lee, H.S.; Maeng, H.J.; Bae, Y.S. Fake finger detection using the fractional Fourier transform. In Proceedings of the Biometric ID Management and Multimodal Communication: Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, 16–18 September 2009; Proceedings 2. Springer: Berlin/Heidelberg, Germany, 2009; pp. 318–324. [Google Scholar]
- Ding, Y.; Ross, A. An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials. In Proceedings of the 2016 IEEE International Workshop on Information Forensics and Security (WIFS), Abu Dhabi, United Arab Emirates, 4–7 December 2016; IEEE: New York, NY, USA, 2016; pp. 1–6. [Google Scholar]
- Marcialis, G.L.; Roli, F.; Tidu, A. Analysis of fingerprint pores for vitality detection. In Proceedings of the 2010 20th International Conference on Pattern Recognition, Istanbul, Turkey, 23–26 August 2010; IEEE: New York, NY, USA, 2010; pp. 1289–1292. [Google Scholar]
- Galbally, J.; Alonso-Fernandez, F.; Fierrez, J.; Ortega-Garcia, J. A high performance fingerprint liveness detection method based on quality related features. Future Gener. Comput. Syst. 2012, 28, 311–321. [Google Scholar] [CrossRef]
- Park, E.; Kim, W.; Li, Q.; Kim, J.; Kim, H. Fingerprint liveness detection using CNN features of random sample patches. In Proceedings of the 2016 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 21–23 September 2016; IEEE: New York, NY, USA, 2016; pp. 1–4. [Google Scholar]
- Wang, C.; Li, K.; Wu, Z.; Zhao, Q. A DCNN based fingerprint liveness detection algorithm with voting strategy. In Proceedings of the Biometric Recognition: 10th Chinese Conference, CCBR 2015, Tianjin, China, 13–15 November 2015; Proceedings 10. Springer: Berlin/Heidelberg, Germany, 2015; pp. 241–249. [Google Scholar]
- Drahansky, M.; Notzel, R.; Funk, W. Liveness detection based on fine movements of the fingertip surface. In Proceedings of the 2006 IEEE Information Assurance Workshop, West Point, NY, USA, 21–23 June 2006; IEEE: New York, NY, USA, 2006; pp. 42–47. [Google Scholar]
- Reddy, P.V.; Kumar, A.; Rahman, S.; Mundra, T.S. A new antispoofing approach for biometric devices. IEEE Trans. Biomed. Circuits Syst. 2008, 2, 328–337. [Google Scholar] [CrossRef]
- Huang, D.; Swanson, E.A.; Lin, C.P.; Schuman, J.S.; Stinson, W.G.; Chang, W.; Hee, M.R.; Flotte, T.; Gregory, K.; Puliafito, C.A.; et al. Optical coherence tomography. Science 1991, 254, 1178–1181. [Google Scholar] [CrossRef] [PubMed]
- Aumann, S.; Donner, S.; Fischer, J.; Müller, F. Optical Coherence Tomography (OCT): Principle and Technical Realization. In High Resolution Imaging in Microscopy and Ophthalmology: New Frontiers in Biomedical Optics; Bille, J.F., Ed.; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Ding, B.; Wang, H.; Chen, P.; Zhang, Y.; Guo, Z.; Feng, J.; Liang, R. Surface and internal fingerprint reconstruction from optical coherence tomography through convolutional neural network. IEEE Trans. Inf. Forensics Secur. 2020, 16, 685–700. [Google Scholar] [CrossRef]
- Darlow, L.N.; Connan, J. Efficient internal and surface fingerprint extraction and blending using optical coherence tomography. Appl. Opt. 2015, 54, 9258–9268. [Google Scholar] [CrossRef]
- Sun, S.; Guo, Z. Sweat glands extraction in optical coherence tomography fingerprints. In Proceedings of the 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), Shenzhen, China, 15–17 December 2017; IEEE: New York, NY, USA, 2017; pp. 579–584. [Google Scholar]
- Cheng, Y.; Larin, K.V. Artificial Fingerprint Recognition by Using Optical Coherence Tomography with Autocorrelation Analysis. Appl. Opt. 2006, 45, 9238–9245. [Google Scholar] [CrossRef]
- Bossen, A.; Lehmann, R.; Meier, C. Internal Fingerprint Identification With Optical Coherence Tomography. IEEE Photonics Technol. Lett. 2010, 22, 507–509. [Google Scholar] [CrossRef]
- Liu, M.; Buma, T. Biometric Mapping of Fingertip Eccrine Glands With Optical Coherence Tomography. IEEE Photonics Technol. Lett. 2010, 22, 1677–1679. [Google Scholar] [CrossRef]
- Liu, F.; Liu, G.; Wang, X. High-Accurate and Robust Fingerprint Anti-Spoofing System Using Optical Coherence Tomography. Expert Syst. Appl. 2019, 130, 31–44. [Google Scholar] [CrossRef]
- Sun, H.; Zhang, Y.; Chen, P.; Wang, H.; Guo, Z.; He, Y.H.; Liang, R. Synchronous Fingerprint Acquisition System Based on Total Internal Reflection and Optical Coherence Tomography. IEEE Trans. Instrum. Meas. 2020, 69, 8452–8465. [Google Scholar] [CrossRef]
- Liu, F.; Liu, H.; Zhang, W.; Liu, G.; Shen, L. One-Class Fingerprint Presentation Attack Detection Using Auto-Encoder Network. IEEE Trans. Image Process. 2021, 30, 2394–2407. [Google Scholar] [CrossRef] [PubMed]
- Sun, H.; Zhang, Y.; Chen, P.; Wang, H.; Liu, Y.P.; Liang, R. A new approach in automated fingerprint presentation attack detection using optical coherence tomography. IEEE Trans. Inf. Forensics Secur. 2023, 18, 4243–4257. [Google Scholar] [CrossRef]
- Zhang, Y.; Yu, S.; Pu, S.; Wang, Y.; Wang, K.; Sun, H.; Wang, H. 3D CNN-based Fingerprint Anti-Spoofing through Optical Coherence Tomography. Heliyon 2023, 9, e20052. [Google Scholar] [CrossRef]
- Gu, A.; Johnson, I.; Goel, K.; Saab, K.; Dao, T.; Rudra, A.; Ré, C. Combining recurrent, convolutional, and continuous-time models with linear state space layers. Adv. Neural Inf. Process. Syst. 2021, 34, 572–585. [Google Scholar]
- Gupta, A.; Gu, A.; Berant, J. Diagonal state spaces are as effective as structured state spaces. Adv. Neural Inf. Process. Syst. 2022, 35, 22982–22994. [Google Scholar]
- Gu, A.; Dao, T. Mamba: Linear-time sequence modeling with selective state spaces. arXiv 2023, arXiv:2312.00752. [Google Scholar]
- Gu, A.; Goel, K.; Ré, C. Efficiently modeling long sequences with structured state spaces. arXiv 2021, arXiv:2111.00396. [Google Scholar]
- Zhang, Y.; He, X.; Zhan, C.; Li, J. Visual State Space Model for Image Deraining with Symmetrical Scanning. Symmetry 2024, 16, 871. [Google Scholar] [CrossRef]
- Howard, A.G. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv 2017, arXiv:1704.04861. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar]
- Huang, G.; Liu, Z.; Van Der Maaten, L.; Weinberger, K.Q. Densely connected convolutional networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA, 21–26 July 2017; pp. 4700–4708. [Google Scholar]
- Selvaraju, R.R.; Cogswell, M.; Das, A.; Vedantam, R.; Parikh, D.; Batra, D. Grad-cam: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, 22–29 October 2017; pp. 618–626. [Google Scholar]
Study | Approach | OCT Data Types Used |
---|---|---|
Cheng et al., 2006 [28] | Using an A-line autocorrelation analysis | A-line |
Bossen et al., 2010 [29] | Extraction of the internal papillary layer structure of fingerprints | B-scan |
Liu et al., 2010 [30] | Extraction of fingertip sweat gland distribution as an antispoofing feature. | B-scan |
Darlow et al., 2016 [13] | Combining OCT autocorrelation analysis and deep feature extraction | B-scan |
Chugh et al., 2019 [3] | Detecting structural differences with a CNN based on B-scans | B-scan |
Liu et al., 2019 [31] | Utilization of B-scan bimodal and sub-peak characteristics | A-line |
Sun et al., 2020 [32] | Combining TIR and OCT to synchronize the collection of external and internal fingerprint information for comparison | B-scan |
Liu et al., 2021 [33] | Reconstruction errors are detected using a self-encoder network. | B-scan |
Sun et al., 2023 [34] | Extraction of OCT external and internal features based on manual feature detection. | B-scan |
Zhang et al., 2023 [35] | Detection of forgeries based on OCT volumetric data and the 3DCNN method. | Volume data |
Proposed method | Extracting the spatial continuity features of volumetric data using ResMamba, a 3D convolutional network with an integrated state space model (SSM) | Volume data |
Model | AUC | ERR | TPR@FPR = 0.1 | |
---|---|---|---|---|
MobileNet [41] | 0.991 | 0.044 | 0.804 | 0.582 |
ResNet [42] | 0.997 | 0.023 | 0.973 | 0.051 |
DenseNet [43] | 0.997 | 0.016 | 0.975 | 0.091 |
ResMamba | 0.998 | 0.002 | 0.990 | 0.004 |
Model | Param (M) | GFLOPs | Inference Time (ms) |
---|---|---|---|
MobileNet [41] | 3.3 | 1.34 | 2.7 |
ResNet [42] | 33.2 | 43.76 | 24.3 |
DenseNet [43] | 25.38 | 55.3 | 59.9 |
ResMamba | 13.62 | 22.91 | 11 |
Introduction Location | AUC | ERR | TPR@FPR = 0.1 | |
---|---|---|---|---|
No introduction | 0.977 | 0.056 | 0.908 | 0.140 |
Only introduced at the model’s early stage | 0.986 | 0.015 | 0.983 | 0.009 |
Only in the first ResMamba layer | 0.988 | 0.021 | 0.973 | 0.082 |
Only in the second ResMamba layer | 0.988 | 0.030 | 0.953 | 0.051 |
Only in the third ResMamba layer | 0.994 | 0.023 | 0.982 | 0.022 |
Only in all three ResMamba layers | 0.981 | 0.070 | 0.866 | 0.224 |
Model’s early stage + first ResMamba layer | 0.992 | 0.034 | 0.869 | 0.649 |
Model’s early stage + second ResMamba layer | 0.994 | 0.014 | 0.971 | 0.033 |
Model’s early stage + third ResMamba layer | 0.986 | 0.005 | 0.993 | 0.009 |
Model’s early stage + all three ResMamba layers | 0.995 | 0.002 | 0.990 | 0.004 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mai, X.; Chen, M.; Lu, Z.; Yang, S.; Lan, G.; Huang, Y.; Qin, J.; An, L.; Xu, J.; Cai, J. An Efficient OCT Fingerprint Antispoofing Method Based on ResMamba. Symmetry 2024, 16, 1603. https://doi.org/10.3390/sym16121603
Mai X, Chen M, Lu Z, Yang S, Lan G, Huang Y, Qin J, An L, Xu J, Cai J. An Efficient OCT Fingerprint Antispoofing Method Based on ResMamba. Symmetry. 2024; 16(12):1603. https://doi.org/10.3390/sym16121603
Chicago/Turabian StyleMai, Xinyan, Miaohua Chen, Zhaodong Lu, Shengkai Yang, Gongpu Lan, Yanping Huang, Jia Qin, Lin An, Jingjiang Xu, and Jing Cai. 2024. "An Efficient OCT Fingerprint Antispoofing Method Based on ResMamba" Symmetry 16, no. 12: 1603. https://doi.org/10.3390/sym16121603
APA StyleMai, X., Chen, M., Lu, Z., Yang, S., Lan, G., Huang, Y., Qin, J., An, L., Xu, J., & Cai, J. (2024). An Efficient OCT Fingerprint Antispoofing Method Based on ResMamba. Symmetry, 16(12), 1603. https://doi.org/10.3390/sym16121603