GeoDNN: Geometry-Aware Deep Neural Networks for Cross-Domain Fingerprint Spoof Detection

Authors

  • Suman Kumar Sanjeev Prasanna, Xiaojun Ruan

Keywords:

Anomaly Detection, Behavioral Representation, Biometric Authentication, Deep Learning, Fraud Detection, Neural Networks

Abstract

Fingerprint-based biometric authentication remains a cornerstone of modern security. Cross-domain fingerprint spoof detection remains a critical challenge in sophisticated biometric authentication systems due to variations introduced by heterogeneous sensors, acquisition conditions, and spoof fabrication materials. Conventional spoof detection methods often rely on texture-based or sensor-specific handcrafted features, which exhibit limited generalization when deployed across unseen domains. To address this limitation, this paper proposes GeoDNN, a Geometry-Aware Deep Neural Network framework designed to learn intrinsic spatial and structural representations of fingerprint patterns for robust cross-domain spoof detection. GeoDNN explicitly models geometric ridge-valley structures and spatial consistency cues through deep hierarchical feature learning, reducing dependence on domain-specific artifacts. The framework integrates deep neural architectures and anomaly-aware discrimination to enhance robustness against class imbalance and previously unseen spoof types. Extensive evaluation across multiple large-scale fingerprint spoof datasets demonstrates that GeoDNN achieves an average detection accuracy of 96.2%, a true detection rate of 93.8%, and a precision of 91.5%, outperforming state-of-the-art methods by up to 2.8% in accuracy and 4.2% in detection rate. False acceptance rates remain below 5.2% across domains, confirming strong generalization capability. The results validate that geometry-aware deep representations significantly enhance cross-domain fingerprint spoof detection and provide a scalable solution for secure biometric authentication systems.

Downloads

Download data is not yet available.

References

J. A.-I. Identity Forum and U. 2016, “Digital identity: The essential guide,” [Online]. Available: https://www.id4africa.com/main/files/Digital_Identity_The_Essential_Guide.pdf

K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4–20, 2004.

V. M. Patel, B. Bhattarai, and A. Ross, “Secure face recognition using deep learning,” in Proc. IEEE Int. Joint Conf. Biometrics, 2016.

E. Yuan and S. Malek, “Mining software component interactions to detect security threats at the architectural level,” in Proc. 13th Working IEEE/IFIP Conf. Software Architecture (WICSA), 2016, pp. 211–220, doi: 10.1109/WICSA.2016.12.

Ross and A. K. Jain, “Information fusion in biometrics,” Pattern Recognit. Lett., vol. 24, no. 13, pp. 2115–2125, 2003.

N. K. Ratha, J. H. Connell, and R. M. Bolle, “Cancelable biometrics,” in Proc. Int. Conf. Pattern Recognit., 2001.

D. J. Cook and N. C. Krishnan, Activity Learning: Discovering, Recognizing, and Predicting Human Behavior from Sensor Data. 2015. doi: 10.1002/9781119010258.

V. Štruc and N. Pavešić, “The complete Gabor-Fisher classifier for robust face recognition,” EURASIP J. Adv. Signal Process., 2010.

O. Batarfi et al., “Large-scale graph processing systems: Survey and an experimental evaluation,” Cluster Comput., vol. 18, no. 3, pp. 1189–1213, Sep. 2015.

J. West and M. Bhattacharya, “Intelligent financial fraud detection: A comprehensive review,” 2016. doi: 10.1016/j.cose.2015.09.005.

P. Malhotra et al., “Multi-sensor prognostics using an unsupervised health index based on LSTM encoder-decoder,” 2016. [Online]. Available: https://cir.nii.ac.jp/crid/1370865815491062790

Desmet and M. Delore, “Leak detection in compressed air systems using unsupervised anomaly detection techniques,” in Proc. Annual Conf. Prognostics Health Management Soc., 2017, pp. 211–220.

Correa Bahnsen, D. Aouada, A. Stojanovic, and B. Ottersten, “Feature engineering strategies for credit card fraud detection,” Expert Syst. Appl., vol. 51, pp. 134–142, 2016.

S. Sorournejad, Z. Zojaji, R. E. Atani, and A. H. Monadjemi, “A survey of credit card fraud detection techniques: Data and technique oriented perspective,” 2016. [Online]. Available: https://arxiv.org/pdf/1611.06439

X. Chen et al., “Variational lossy autoencoder,” in Proc. Int. Conf. Learning Representations (ICLR), 2017.

Amaya De La Peña, “Fraud detection in online payments using Spark ML,” Master’s thesis, 2017. [Online]. Available: https://www.diva-portal.org/smash/record.jsf?pid=diva2:1165925

R. Saia and S. Carta, “Evaluating credit card transactions in the frequency domain for a proactive fraud detection approach,” in Proc. 14th Int. Joint Conf. e-Business Telecommun., 2017, pp. 335–342.

Y. J. Kim, “Building financial misstatement detection models using multiclass cost-sensitive learning and feature generation from CFO survey,” 2016. [Online]. Available: https://s-space.snu.ac.kr/handle/10371/119971

S. Wang, C. Liu, X. Gao, H. Qu, and W. Xu, “Session-based fraud detection in online e-commerce transactions using recurrent neural networks,” in Lecture Notes in Computer Science, Springer, 2017, pp. 241–252.

M. Awad and R. Khanna, Efficient Learning Machines: Theories, Concepts, and Applications for Engineers and System Designers. 2015.

O. Awoyemi, A. O. Adetunmbi, and S. A. Oluwadare, “Credit card fraud detection using machine learning techniques: A comparative analysis,” in Proc. IEEE Int. Conf. Computing, Networking Informatics (ICCNI), 2017, pp. 1–9.

D. Hassan, “The impact of false negative cost on the performance of cost-sensitive learning based on Bayes minimum risk: A case study in detecting fraudulent transactions,” Int. J. Intell. Syst. Appl., vol. 9, no. 2, pp. 18–24, 2017.

Z. Wan, Y. Zhang, and H. He, “Variational autoencoder based synthetic data generation for imbalanced learning,” in Proc. IEEE Symp. Series Comput. Intell. (SSCI), 2017, pp. 1–7.

G. A. Susto, A. Beghi, and S. McLoone, “Anomaly detection through online isolation forest: An application to plasma etching,” in Proc. MIPRO, 2017, pp. 89–94.

R. F. Nogueira, R. de A. Lotufo, and R. C. Machado, “Fingerprint liveness detection using convolutional neural networks,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, 2016.

R. F. Nogueira, R. de A. Lotufo, and R. C. Machado, “Evaluating software-based fingerprint liveness detection using convolutional networks and local binary patterns,” arXiv, 2015.

T. Chugh, K. Cao, and A. K. Jain, “Fingerprint spoof detection using minutiae-based local patches,” in Proc. IEEE Int. Joint Conf. Biometrics (IJCB), 2017.

T. Chugh, K. Cao, and A. K. Jain, “Fingerprint Spoof Buster: Use of Minutiae-Centered Patches,” IEEE Trans. Inf. Forensics Security, 2018. Extended from 2017 work. A highly cited study showing reliable intra-sensor and cross-dataset spoof detection.

Downloads

Published

29.03.2018

How to Cite

Suman Kumar Sanjeev Prasanna. (2018). GeoDNN: Geometry-Aware Deep Neural Networks for Cross-Domain Fingerprint Spoof Detection. International Journal of Intelligent Systems and Applications in Engineering, 6(1), 97–107. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/8100

Issue

Section

Research Article