International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 2 – March 2015 Fake Multi-biometric Detection for Applications of Fingerprint, Iris and Face Recognition 1 Preethi.V and 2Prof.S.Chidambaram 1 PG Scholar/Communication Systems and 2Assistant Professor,Department of ECE Adhiyamaan College of Engineering,Hosur,India ABSTRACT-Many organizations are using different kinds of machine – driven person’s identifications systems that improve the user’s needs, satisfaction, and Potency to secure essential resource. In this project it gives the information on the recent developments in person’s identification using biometric technique. By using this technique we ensure to identify a person weather he/she is real person or fake person. The target is to extend the safety of biometric reorganization frameworks, by adding liveness assessment in a simple, fast, user friendly and non-intrusive manner. In this project it gives information about different modalities like fingerprint, face recognition, and iris to review against the various types of vulnerabilities attacks. The proposed method presents a very low level of complexity, that makes it suitable for realtime applications, using general image quality features extract from one image (i.e., the same non inheritable for authentication purposes) to differentiate between legitimate and shammer samples. The experimental results obtained on publicly available data sets of fingerprint, iris, and 2D face shows the proposed method which is extremely competitive compared with other state-of-the-art approaches and that the analysis of the overall image quality of real biometric samples reveals highly valuable information that will be very efficiently used to discriminate them from pretend traits. Keywords-Identification, Liveness. Potency, biometric, attacks, I. INTRODUCTION The term “Biometric” comes from the Greek words bios (life) and metric (measure). Biometrics refers to technologies that measure and analyze human body characteristics like fingerprints, irises, hand movements voice and facial patterns, for authentication functions. The field of biometrics examines the distinctive physical or behavioral traits that can be used to determine a person‟s identity. In Recent years, machine-controlled person identification is highly researched because for protected access to computer, buildings, mobile phones and ATM‟S. Person identification is the process of associating an identity to an individual. Person identification techniques are classified into three types such as knowledge based approach, token based approach, and biometric based approach. ISSN: 2231-5381 A knowledge-based approach depends on something an individual knows to make a personal identification, like a password or a PIN.Token-based approaches are based on something an individual have to create a personal identification sort of a passport, driver‟s license, ID card, master card, or keys. Once credit and ATM cards are lost or stolen, an unauthorized user will typically come up with the right personal codes. Although many people still select easily guessed PIN‟s and passwords like birthdays, phone numbers and social security numbers. Biometric based systems use physiological or behavioral features of an individual for identification. Whereas, in Biometric based systems it cannot be forged or purloined data. Knowledge based and Token based approaches have many disadvantages like countersign forgotten, or countersign was stolen by hackers or unauthorized person, Tokens could also forgotten, lost, stolen, or misplaced. Biometric like Face recognition, iris, and fingerprint technology may solve this drawbacks of above mentioned approaches. It gives several advantages over classical security methods such as Password or something we have like keycard, ID,etc. In biometric system there is no need for the user to remember or recollect the difficult PIN codes that could be easily forgotten or to hold a key that could be lost or Stolen. Biometric system conjointly has some of the disadvantages like (i) lack of secrecy, (ii) biometric trait cannot be replaced,(iii)vulnerable to external attacks that may decrease their level of security,(iv)vulnerability points will generally divided into direct & indirect attacks. Biometric recognition is the automatic recognition of a person based on one or more of these traits. The word “biometrics” is also used to denote biometric recognition methods..A biometric recognition system is a pattern recognition system. Throughout biometric recognition, biometric traits are measured and analyzed to determine a person‟s identity. Biometric Authentication or verification is any method that validates the identity of a user who wishes to sign into a system by measuring some intrinsic characteristic of that user. http://www.ijettjournal.org Page 116 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 2 – March 2015 Fig.1 Biometric verification and biometric identification (in case of PC login) Distinctiveness Permanence Collectability Performance Acceptability Circumvention Face Universality Biometric Identifier TABLE I Comparison Table for biometric technologies H L M H L H H Fingerprint M H H M H M M Iris H H H M H L L There are a number of alternative problems that should be considered, including:(i) performance, that refers to the achievable recognition accuracy and speed, the resources needed to achieve the desired recognition accuracy and speed, as well as the operational an environmental factors that have an effect on the accuracy and speed;(ii)acceptability, that indicates the extent to which people are willing to accept the use of a particular biometric identifier (characteristic) in their daily lives;(iii) circumvention, which reflects how easily the system may be fooled using fraudulent method. ISSN: 2231-5381 Fig 2.A graphical representation of FAR and FRR errors, indicating the CER The FRR or False Rejection Rate is the probability that the system incorrectly rejects access to an licensed person, because of failing to match the biometric input with a template or guide. The FRR is often expressed as a percentage of valid inputs which are incorrectly rejected. FAR and FRR are key metrics for biometric solutions, some biometric devices allow to tune them so that the system more quickly matches or rejects. Both are important, but for more applications one of them is considered. False Accept Rate is also known as False Match Rate, and False Reject Rate is usually referred as False Non-Match Rate. CER is the rate where both accept and reject error rates are equal. http://www.ijettjournal.org Page 117 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 2 – March 2015 Image(Face, Iris, Fingerprint ) Attack: Image(Face, Iris, Fingerprint ) Sensor HW-Based LD Feature Extractor Synthetic Samples SW- Based LD Rest of Biometric Recognition System Attack: Spoofing Fig 3. Types of attacks detected by using Hardware and Software based Liveness Detection II.LIVENESS DETECTION III.EXISTING SYSTEM Liveness detection is the ability to determine whether a biometric sample is being provided by a humanbeing rather than from copy created using an artifact. Special attention is paid to the liveness detection techniques ,which use totally different physiological properties to distinguish between real and pretend traits. Liveness assessment methods have to satisfy certain requirements like (i) the technique shouldn‟t harmful to the user ,(ii)people shouldn‟t be reluctant to use it,(iii)result ought to be produces in reduced interval of time, (iv) should be cost effective (v) should have a good fake detection rate. Liveness detection methods are classified into two techniques:(i)Hardware – based techniques, (ii) Software –based techniques. A spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. The above two types of methods as its own advantages and disadvantages over the other and combination of each would be the foremost fascinating protection approach to extend the safety of biometric systems. In hardware based techniques it has good pretend detection rate whereas software based techniques typically more cost-effective and less harmful since the implementations are transparent or clear to user . In the present work we tend to propose a novel software based „multi –biometric and multi –attack‟ protection method which overcomes the limitations through the use of image quality assessment (IQA). Being a software based approach it offers the benefits like fast , user friendly, In hardware based techniques it has good pretend detection rate whereas software based techniques typically more cost-effective and less harmful since the implementations are transparent or clear to user. The drawback of fake biometric detection may be seen as a two –class classification problem where an input biometric sample needs to be assigned to one of two classes: Real or Fake. Expected quality differences between real and fake samples may include: degree of sharpness, luminance level ,color, quantity of information found in both type of images (entropy), structural distortions or natural appearance. Following this “qualitydifference” statement, in the present work we have tendency to explore the potential of general image quality assessment as a protection method against different biometric attacks. The key point of the process is to find a set of discriminant features which permits to build an appropriate classifier which gives the probability of the image “realism” given the extracted set of features. ISSN: 2231-5381 Fig .4General Diagram for Biomertic recognition Once the feature vector has been generated the sample is classified as real or fake by using some classifiers. In existing technique, they used Linear Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) which is used as the classifiers to classify real or fake. http://www.ijettjournal.org Page 118 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 2 – March 2015 IV PROPOSED SYSTEM DATABASE INPUT DATA Template SENSOR FEATURE EXTRACTION MATCHER Features REAL / FAKE Decision Fig. 5 Architecture of Proposed Method First, evaluate the multi – biometric dimension of the protection methodology. That is, its ability to achieve good fake detection rate when compared to other state-ofthe-art approaches, with completely different biometric modalities like Fingerprint, Iris, Face. Second , evaluate the multi attack dimension of the protection methodology i.e., its ability to notice not only spoofing attacks however conjointly fallacious access tries dispensed with synthetic or reconstructed samples. ethod is user friendly, fast and harmless to the user. So it is preferable for the real time applications. V EXPERIMENTS AND RESULTS The performance of the proposed liveness detection scheme is validated on different database such as ATVS ,a dataset captured at the biometric Recognition Group ,Fingerprint Liveness Detection competition 2009 & 2013.The above two comprises datasets of real and fake images. When compared to the existing method we have a tendency to reduce the algorithms used i.e., before they used two algorithms LDA and QDA. Here, we used ANN algorithm in order to that we can load the entire image database into the program at the same time and it‟ll compare with the database and it classifies the given image is real or fake based on database. Images of three biometric is given which is shown in the fig .input is given to the feature extraction which will calculate the features according to the image quality measures and then Matcher is used to classify the image is real or fake. In proposed method we have considered some of the 6 metrics such as Mean Square Error, Signal to Noise ratio, Peak Signal to Noise Ratio, Structural Content, Maximum Difference, Average Difference. After calculating all those metrics ANN Classifier is used with Feed Forward Neural Network Algorithm in the MATLAB 2013 to differentiate the real or fake traits. This proposed ISSN: 2231-5381 http://www.ijettjournal.org Fig. 6 Input of Fingerprint Image Fig. 7 Input Image Feature Vector Page 119 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 2 – March 2015 for different biometric such as Fingerprint, Face and iris.The performance of 6 metrics of fingerprint, face and iris is tabulated below. Table II Features of Fingerprint, Face and Iris Images FEATURES Mean Square Error Peak Signal to Noise Ratio Signal to Noise Ratio Average Difference Structural Content Maximum Difference Fig.8 Filter the Input Image FINGERPRINT 0.2552 FACE 0.0373 IRIS 0.02052 29.9971 38.3510 40.2032 5.9317 14.2705 15.93055 0.4114 0.2958 0.0403 1.0162 1.0047 1.0025 51 51 46 VI CONCLUSION Image quality assessment for liveness detection technique is employed to detect the real and fake biometrics. Due to image quality measurements it is easy to find out real and fake users. As a result of fake identities always have some different features than original it always contain different color, luminance levels, general artifacts, amount of information and amount of sharpness, found in both type of images, structural distortions or natural appearance. Multi-biometric is a challenging system. It is more secure than uni-biometric system. In this project the three biometric systems that are face, iris and fingerprint recognition are taken from publicly available database. It is very competitive performance and to its multi-biometric and multi-attack characteristics. The proposed method has some other attractive features such as: it is simple, fast, non-harmful, user friendly and cheap. In future remaining metrics and performance are yet to be calculated. Further evaluation on other image based modalities e.g., palm print, hand geometry, vein and also for video attacks can be used. Fig. 9 Original and Distorted Image Fig. 10 DFT and IDFT REFERENCES Fig.11 FFT to Magnitude and Phase Among 25 metrics 6 metrics are calculated and the results are evaluated. The same process is carried out ISSN: 2231-5381 [1]Anil K.Jain, Arun Ross, Salil Prabhakar “An Introduction to Biometric Recognition,” IEEE Trans on Circuits and Systems for Video Tech, vol.14,no.1,Jan 2004. [2]J.Galbally,J. Fierrez, F.Alonso-Fernandez, andM.MartinezDiaz,“Evaluation of direct attacks to fingerprint verification systems,”J. Telecommun. Syst. , vol. 47, nos. 3–4, pp. 243–254, 2011. [3]S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric recognition Security and privacy concerns,” IEEE Security Privacy , vol. 1, no. 2, pp. 33–42, Mar./Apr. 2003. [4]G. L. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, et al., “First international fingerprint liveness detection competition— LivDet 2009,” in Proc. IAPR ICIAP, Springer LNCS-5716. 2009, pp. 12– 23. http://www.ijettjournal.org Page 120 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 2 – March 2015 [5]Z. Wang, H. R. Sheikh, and A. C. Bovik, “No- reference perceptual quality assessment of JPEG compressed images,” in Proc. IEEE ICIP,Sep. 2002, pp. 477–480. [6]Z. Akhtar, G. Fumera, G. L. Marcialis, and F. Roli, “Evaluation of serial and parallel multibiometric systems under spoofing attacks,” in Proc.IEEE 5th Int. Conf. BTAS , Sep. 2012, pp. 283–288. [7] H. R. Sheikh and A. C. Bovik, “Image information and visual quality,” IEEE Trans. Image Process., vol. 15, no. 2, pp. 430–444, Feb. 2006. [8]Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: From error visibility to structural similarity,” IEEE Trans. Image Process., vol. 13, no. 4, pp. 600–612, Apr. 2004. [9] http://atvs.ii.uam.es/, It gives Reference papers which is related to the applications and images [10] http://biometrics.idealtest.org , For Database Images [11] https://www.idiap.ch/dataset/replayattack ,For Face Image Attack Details ISSN: 2231-5381 http://www.ijettjournal.org Page 121