fingerprint recognition
Ridgeformer: Mutli-Stage Contrastive Training For Fine-grained Cross-Domain Fingerprint Recognition
Pandey, Shubham, Jawade, Bhavin, Setlur, Srirangaraj
The increasing demand for hygienic and portable biometric systems has underscored the critical need for advancements in contactless fingerprint recognition. Despite its potential, this technology faces notable challenges, including out-of-focus image acquisition, reduced contrast between fingerprint ridges and valleys, variations in finger positioning, and perspective distortion. These factors significantly hinder the accuracy and reliability of contactless fingerprint matching. To address these issues, we propose a novel multi-stage transformer-based contactless fingerprint matching approach that first captures global spatial features and subsequently refines localized feature alignment across fingerprint samples. By employing a hierarchical feature extraction and matching pipeline, our method ensures fine-grained, cross-sample alignment while maintaining the robustness of global feature representation. We perform extensive evaluations on publicly available datasets such as HKPolyU and RidgeBase under different evaluation protocols, such as contactless-to-contact matching and contactless-to-contactless matching and demonstrate that our proposed approach outperforms existing methods, including COTS solutions.
ADT and Yale partner on Z-Wave lock with fingerprint recognition
ADT offers Yale Assure locks with its ADT home security systems, and now the security service provider has partnered with Yale and the Z-Wave Alliance to introduce the Yale Assure Lock 2 Touch with Z-Wave. This is the first Z-Wave lock with fingerprint recognition that is certified to use the Z-Wave User Credential Command Class specification that was released in June 2024. The new lock also features the latest generation Z-Wave 800 chipset, which promises longer battery life and improved range on a Z-Wave mesh network. Thanks to its use of the Z-Wave User Credential Command Class spec, ADT subscribers will be able arm and disarm their security system at the same time they lock or unlock the new deadbolt, all by just touching their previously enrolled finger to the new lock. ADT offers the Yale Assure Lock 2 Touch with Z-Wave with its ADT home security systems, which can be self- or professionally installed.
Performance Evaluation of Image Enhancement Techniques on Transfer Learning for Touchless Fingerprint Recognition
Sreehari, S, D, Dilavar P, Anzar, S M, Panthakkan, Alavikunhu, Amin, Saad Ali
Fingerprint recognition remains one of the most reliable biometric technologies due to its high accuracy and uniqueness. Traditional systems rely on contact-based scanners, which are prone to issues such as image degradation from surface contamination and inconsistent user interaction. To address these limitations, contactless fingerprint recognition has emerged as a promising alternative, providing non-intrusive and hygienic authentication. This study evaluates the impact of image enhancement tech-niques on the performance of pre-trained deep learning models using transfer learning for touchless fingerprint recognition. The IIT-Bombay Touchless and Touch-Based Fingerprint Database, containing data from 200 subjects, was employed to test the per-formance of deep learning architectures such as VGG-16, VGG-19, Inception-V3, and ResNet-50. Experimental results reveal that transfer learning methods with fingerprint image enhance-ment (indirect method) significantly outperform those without enhancement (direct method). Specifically, VGG-16 achieved an accuracy of 98% in training and 93% in testing when using the enhanced images, demonstrating superior performance compared to the direct method. This paper provides a detailed comparison of the effectiveness of image enhancement in improving the accuracy of transfer learning models for touchless fingerprint recognition, offering key insights for developing more efficient biometric systems.
- Asia > Middle East > UAE > Dubai Emirate > Dubai (0.05)
- Asia > India (0.05)
- Information Technology > Artificial Intelligence > Machine Learning > Transfer Learning (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Pattern Recognition > Fingerprint Recognition (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.93)
TipSegNet: Fingertip Segmentation in Contactless Fingerprint Imaging
Ruzicka, Laurenz, Kohn, Bernhard, Heitzinger, Clemens
Contactless fingerprint recognition systems offer a hygienic, user-friendly, and efficient alternative to traditional contact-based methods. However, their accuracy heavily relies on precise fingertip detection and segmentation, particularly under challenging background conditions. This paper introduces TipSegNet, a novel deep learning model that achieves state-of-the-art performance in segmenting fingertips directly from grayscale hand images. TipSegNet leverages a ResNeXt-101 backbone for robust feature extraction, combined with a Feature Pyramid Network (FPN) for multi-scale representation, enabling accurate segmentation across varying finger poses and image qualities. Furthermore, we employ an extensive data augmentation strategy to enhance the model's generalizability and robustness. TipSegNet outperforms existing methods, achieving a mean Intersection over Union (mIoU) of 0.987 and an accuracy of 0.999, representing a significant advancement in contactless fingerprint segmentation. This enhanced accuracy has the potential to substantially improve the reliability and effectiveness of contactless biometric systems in real-world applications.
- Europe > Austria > Vienna (0.04)
- North America > United States > Washington > King County > Seattle (0.04)
- North America > United States > Virginia > Arlington County > Arlington (0.04)
- (5 more...)
Latent fingerprint enhancement for accurate minutiae detection
Wahab, Abdul, Khan, Tariq Mahmood, Iqbal, Shahzaib, AlShammari, Bandar, Alhaqbani, Bandar, Razzak, Imran
Identification of suspects based on partial and smudged fingerprints, commonly referred to as fingermarks or latent fingerprints, presents a significant challenge in the field of fingerprint recognition. Although fixed-length embeddings have shown effectiveness in recognising rolled and slap fingerprints, the methods for matching latent fingerprints have primarily centred around local minutiae-based embeddings, failing to fully exploit global representations for matching purposes. Consequently, enhancing latent fingerprints becomes critical to ensuring robust identification for forensic investigations. Current approaches often prioritise restoring ridge patterns, overlooking the fine-macroeconomic details crucial for accurate fingerprint recognition. To address this, we propose a novel approach that uses generative adversary networks (GANs) to redefine Latent Fingerprint Enhancement (LFE) through a structured approach to fingerprint generation. By directly optimising the minutiae information during the generation process, the model produces enhanced latent fingerprints that exhibit exceptional fidelity to ground-truth instances. This leads to a significant improvement in identification performance. Our framework integrates minutiae locations and orientation fields, ensuring the preservation of both local and structural fingerprint features. Extensive evaluations conducted on two publicly available datasets demonstrate our method's dominance over existing state-of-the-art techniques, highlighting its potential to significantly enhance latent fingerprint recognition accuracy in forensic applications.
- North America > United States (0.68)
- Asia > Pakistan > Islamabad Capital Territory > Islamabad (0.04)
- Asia > Middle East > Saudi Arabia > Riyadh Province > Riyadh (0.04)
- (2 more...)
- Health & Medicine (0.94)
- Law (0.93)
- Information Technology > Security & Privacy (0.68)
- (2 more...)
Automating Detective Work
Every fingerprint is believed to be unique, making it possible to identify an individual by matching a new fingerprint with an image on file, whether to unlock a mobile phone, access a bank account, or solve a murder. Fingerprint examiners, however, do not always agree on whether two print images match and, asked to recheck their work after several months, they sometimes do not even agree with themselves. That is leading to increased use of neural networks, powerhouses for identifying and matching patterns of all sorts, to automate and improve decisions about whether two fingerprints come from the same person. A group of computer scientists decided to use neural networks to test the assumption that no two fingerprints are the same. Using twin neural networks, researchers from Columbia University, Tufts University, and the State University of New York (SUNY) University at Buffalo looked for similarities between different fingerprints in a database from the National Institute of Standards and Technology (NIST).
- North America > United States > New York (0.25)
- North America > United States > Michigan (0.05)
- North America > United States > California > Orange County > Irvine (0.05)
- Europe > Switzerland > Vaud > Lausanne (0.05)
System Fingerprint Recognition for Deepfake Audio: An Initial Dataset and Investigation
Yan, Xinrui, Yi, Jiangyan, Wang, Chenglong, Tao, Jianhua, Zhou, Junzuo, Gu, Hao, Fu, Ruibo
The rapid progress of deep speech synthesis models has posed significant threats to society such as malicious content manipulation. Therefore, many studies have emerged to detect the so-called deepfake audio. However, existing works focus on the binary detection of real audio and fake audio. In real-world scenarios such as model copyright protection and digital evidence forensics, it is needed to know what tool or model generated the deepfake audio to explain the decision. This motivates us to ask: Can we recognize the system fingerprints of deepfake audio? In this paper, we present the first deepfake audio dataset for system fingerprint recognition (SFR) and conduct an initial investigation. We collected the dataset from the speech synthesis systems of seven Chinese vendors that use the latest state-of-the-art deep learning technologies, including both clean and compressed sets. In addition, to facilitate the further development of system fingerprint recognition methods, we provide extensive benchmarks that can be compared and research findings. The dataset will be publicly available. .
- Asia > China > Beijing > Beijing (0.05)
- Asia > China > Jiangsu Province > Nanjing (0.04)
- Asia > China > Zhejiang Province (0.04)
- (2 more...)
Latent Fingerprint Recognition: Fusion of Local and Global Embeddings
Grosz, Steven A., Jain, Anil K.
One of the most challenging problems in fingerprint recognition continues to be establishing the identity of a suspect associated with partial and smudgy fingerprints left at a crime scene (i.e., latent prints or fingermarks). Despite the success of fixed-length embeddings for rolled and slap fingerprint recognition, the features learned for latent fingerprint matching have mostly been limited to local minutiae-based embeddings and have not directly leveraged global representations for matching. In this paper, we combine global embeddings with local embeddings for state-of-the-art latent to rolled matching accuracy with high throughput. The combination of both local and global representations leads to improved recognition accuracy across NIST SD 27, NIST SD 302, MSP, MOLF DB1/DB4, and MOLF DB2/DB4 latent fingerprint datasets for both closed-set (84.11%, 54.36%, 84.35%, 70.43%, 62.86% rank-1 retrieval rate, respectively) and open-set (0.50, 0.74, 0.44, 0.60, 0.68 FNIR at FPIR=0.02, respectively) identification scenarios on a gallery of 100K rolled fingerprints. Not only do we fuse the complimentary representations, we also use the local features to guide the global representations to focus on discriminatory regions in two fingerprint images to be compared. This leads to a multi-stage matching paradigm in which subsets of the retrieved candidate lists for each probe image are passed to subsequent stages for further processing, resulting in a considerable reduction in latency (requiring just 0.068 ms per latent to rolled comparison on a AMD EPYC 7543 32-Core Processor, roughly 15K comparisons per second). Finally, we show the generalizability of the fused representations for improving authentication accuracy across several rolled, plain, and contactless fingerprint datasets.
- North America > United States > Michigan > Ingham County > Lansing (0.14)
- North America > United States > Michigan > Ingham County > East Lansing (0.14)
- North America > United States > West Virginia > Marion County > Fairmont (0.04)
- North America > United States > Maryland > Montgomery County > Gaithersburg (0.04)
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection
Li, Simin, Xu, Huangxinxin, Wang, Jiakai, Liu, Aishan, He, Fazhi, Liu, Xianglong, Tao, Dacheng
Billions of people are sharing their daily life images on social media every day. However, their biometric information (e.g., fingerprint) could be easily stolen from these images. The threat of fingerprint leakage from social media raises a strong desire for anonymizing shared images while maintaining image qualities, since fingerprints act as a lifelong individual biometric password. To guard the fingerprint leakage, adversarial attack emerges as a solution by adding imperceptible perturbations on images. However, existing works are either weak in black-box transferability or appear unnatural. Motivated by visual perception hierarchy (i.e., high-level perception exploits model-shared semantics that transfer well across models while low-level perception extracts primitive stimulus and will cause high visual sensitivities given suspicious stimulus), we propose FingerSafe, a hierarchical perceptual protective noise injection framework to address the mentioned problems. For black-box transferability, we inject protective noises on fingerprint orientation field to perturb the model-shared high-level semantics (i.e., fingerprint ridges). Considering visual naturalness, we suppress the low-level local contrast stimulus by regularizing the response of Lateral Geniculate Nucleus. Our FingerSafe is the first to provide feasible fingerprint protection in both digital (up to 94.12%) and realistic scenarios (Twitter and Facebook, up to 68.75%). Our code can be found at https://github.com/nlsde-safety-team/FingerSafe.
- Asia > China > Hubei Province > Wuhan (0.04)
- Asia > China > Beijing > Beijing (0.04)
- Asia > China > Hong Kong (0.04)
- North America > United States > Michigan (0.04)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.69)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (0.46)
Google pins slow Pixel 6 fingerprint recognition on 'enhanced security'
Ask Pixel 6 owners about their top gripe and they'll likely point to the slow, finicky fingerprint sensor. There may be an explanation for that momentary anguish, though. Google is telling users that the Pixel 6's fingerprint reader is using "enhanced security algorithms" that may either take longer to check your digits or require better sensor contact. We've asked Google for comment. Some users have suggested the sluggish performance might be due to Google's use of an optical under-display fingerprint reader instead of the ultrasonic sensor found in phones like the Galaxy S21. However, Reddit users noted there are phones with optical sensors that perform faster, such as the OnePlus 9. There's a real chance software may play a role in the Pixel 6's quirks.