GeoDNN: Geometry-Aware Deep Neural Networks for Cross-Domain Fingerprint Spoof Detection
Keywords:
Anomaly Detection, Behavioral Representation, Biometric Authentication, Deep Learning, Fraud Detection, Neural NetworksAbstract
Fingerprint-based biometric authentication remains a cornerstone of modern security. Cross-domain fingerprint spoof detection remains a critical challenge in sophisticated biometric authentication systems due to variations introduced by heterogeneous sensors, acquisition conditions, and spoof fabrication materials. Conventional spoof detection methods often rely on texture-based or sensor-specific handcrafted features, which exhibit limited generalization when deployed across unseen domains. To address this limitation, this paper proposes GeoDNN, a Geometry-Aware Deep Neural Network framework designed to learn intrinsic spatial and structural representations of fingerprint patterns for robust cross-domain spoof detection. GeoDNN explicitly models geometric ridge-valley structures and spatial consistency cues through deep hierarchical feature learning, reducing dependence on domain-specific artifacts. The framework integrates deep neural architectures and anomaly-aware discrimination to enhance robustness against class imbalance and previously unseen spoof types. Extensive evaluation across multiple large-scale fingerprint spoof datasets demonstrates that GeoDNN achieves an average detection accuracy of 96.2%, a true detection rate of 93.8%, and a precision of 91.5%, outperforming state-of-the-art methods by up to 2.8% in accuracy and 4.2% in detection rate. False acceptance rates remain below 5.2% across domains, confirming strong generalization capability. The results validate that geometry-aware deep representations significantly enhance cross-domain fingerprint spoof detection and provide a scalable solution for secure biometric authentication systems.
Downloads
References
J. A.-I. Identity Forum and U. 2016, “Digital identity: The essential guide,” [Online]. Available: https://www.id4africa.com/main/files/Digital_Identity_The_Essential_Guide.pdf
K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4–20, 2004.
V. M. Patel, B. Bhattarai, and A. Ross, “Secure face recognition using deep learning,” in Proc. IEEE Int. Joint Conf. Biometrics, 2016.
E. Yuan and S. Malek, “Mining software component interactions to detect security threats at the architectural level,” in Proc. 13th Working IEEE/IFIP Conf. Software Architecture (WICSA), 2016, pp. 211–220, doi: 10.1109/WICSA.2016.12.
Ross and A. K. Jain, “Information fusion in biometrics,” Pattern Recognit. Lett., vol. 24, no. 13, pp. 2115–2125, 2003.
N. K. Ratha, J. H. Connell, and R. M. Bolle, “Cancelable biometrics,” in Proc. Int. Conf. Pattern Recognit., 2001.
D. J. Cook and N. C. Krishnan, Activity Learning: Discovering, Recognizing, and Predicting Human Behavior from Sensor Data. 2015. doi: 10.1002/9781119010258.
V. Štruc and N. Pavešić, “The complete Gabor-Fisher classifier for robust face recognition,” EURASIP J. Adv. Signal Process., 2010.
O. Batarfi et al., “Large-scale graph processing systems: Survey and an experimental evaluation,” Cluster Comput., vol. 18, no. 3, pp. 1189–1213, Sep. 2015.
J. West and M. Bhattacharya, “Intelligent financial fraud detection: A comprehensive review,” 2016. doi: 10.1016/j.cose.2015.09.005.
P. Malhotra et al., “Multi-sensor prognostics using an unsupervised health index based on LSTM encoder-decoder,” 2016. [Online]. Available: https://cir.nii.ac.jp/crid/1370865815491062790
Desmet and M. Delore, “Leak detection in compressed air systems using unsupervised anomaly detection techniques,” in Proc. Annual Conf. Prognostics Health Management Soc., 2017, pp. 211–220.
Correa Bahnsen, D. Aouada, A. Stojanovic, and B. Ottersten, “Feature engineering strategies for credit card fraud detection,” Expert Syst. Appl., vol. 51, pp. 134–142, 2016.
S. Sorournejad, Z. Zojaji, R. E. Atani, and A. H. Monadjemi, “A survey of credit card fraud detection techniques: Data and technique oriented perspective,” 2016. [Online]. Available: https://arxiv.org/pdf/1611.06439
X. Chen et al., “Variational lossy autoencoder,” in Proc. Int. Conf. Learning Representations (ICLR), 2017.
Amaya De La Peña, “Fraud detection in online payments using Spark ML,” Master’s thesis, 2017. [Online]. Available: https://www.diva-portal.org/smash/record.jsf?pid=diva2:1165925
R. Saia and S. Carta, “Evaluating credit card transactions in the frequency domain for a proactive fraud detection approach,” in Proc. 14th Int. Joint Conf. e-Business Telecommun., 2017, pp. 335–342.
Y. J. Kim, “Building financial misstatement detection models using multiclass cost-sensitive learning and feature generation from CFO survey,” 2016. [Online]. Available: https://s-space.snu.ac.kr/handle/10371/119971
S. Wang, C. Liu, X. Gao, H. Qu, and W. Xu, “Session-based fraud detection in online e-commerce transactions using recurrent neural networks,” in Lecture Notes in Computer Science, Springer, 2017, pp. 241–252.
M. Awad and R. Khanna, Efficient Learning Machines: Theories, Concepts, and Applications for Engineers and System Designers. 2015.
O. Awoyemi, A. O. Adetunmbi, and S. A. Oluwadare, “Credit card fraud detection using machine learning techniques: A comparative analysis,” in Proc. IEEE Int. Conf. Computing, Networking Informatics (ICCNI), 2017, pp. 1–9.
D. Hassan, “The impact of false negative cost on the performance of cost-sensitive learning based on Bayes minimum risk: A case study in detecting fraudulent transactions,” Int. J. Intell. Syst. Appl., vol. 9, no. 2, pp. 18–24, 2017.
Z. Wan, Y. Zhang, and H. He, “Variational autoencoder based synthetic data generation for imbalanced learning,” in Proc. IEEE Symp. Series Comput. Intell. (SSCI), 2017, pp. 1–7.
G. A. Susto, A. Beghi, and S. McLoone, “Anomaly detection through online isolation forest: An application to plasma etching,” in Proc. MIPRO, 2017, pp. 89–94.
R. F. Nogueira, R. de A. Lotufo, and R. C. Machado, “Fingerprint liveness detection using convolutional neural networks,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, 2016.
R. F. Nogueira, R. de A. Lotufo, and R. C. Machado, “Evaluating software-based fingerprint liveness detection using convolutional networks and local binary patterns,” arXiv, 2015.
T. Chugh, K. Cao, and A. K. Jain, “Fingerprint spoof detection using minutiae-based local patches,” in Proc. IEEE Int. Joint Conf. Biometrics (IJCB), 2017.
T. Chugh, K. Cao, and A. K. Jain, “Fingerprint Spoof Buster: Use of Minutiae-Centered Patches,” IEEE Trans. Inf. Forensics Security, 2018. Extended from 2017 work. A highly cited study showing reliable intra-sensor and cross-dataset spoof detection.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


