The Department of Electrical and Electronic Engineering of the University of Cagliari is proud to announce the eighth edition of the Fingerprint Liveness Detection Competition.
Spoofing – The widespread use of personal verification systems based on fingerprints has shown some weaknesses related to the problem of security. Among the others, it is well-known that a fingerprint verification system can be deceived by submitting artificial reproductions of fingerprints made up of silicon or gelatine to the electronic capture device (optical, capacitive, etc…). These images are then processed as “true” fingerprints.
Liveness Detection – Therefore, a recent issue in the field of security in fingerprint verification (unsupervised especially) is known as “liveness detection”. The standard verification system is coupled with additional hardware or software modules aimed to certify the authenticity of the submitted fingerprints. Whilst hardware-based solutions are the most expensive, software-based ones attempt to measure liveness from characteristics of images themselves by simply applying image processing algorithms.
Software Liveness Classification – The problem of vitality detection is treated as a two-class classification problem (live or fake). An appropriate classifier is designed in order to extract the probability of the image vitality given the extracted set of features. LivDet2023 competition is open to all academic and industrial institutions which have a solution for software-based fingerprint recognition and liveness detection.
LivDet 2023 results will be presented during the 2023 International Joint Conference on Biometrics (IJCB 2023).
The special guest of this edition is prof. Julian Fierrez. The team from the Universidad Autonoma de Madrid cooperated to make fingerprint artificial replicas.
LivDet 2023 Competition Overview – This edition of LivDet 2021 has three challenges.
- Challenge 1. Liveness Detection in Action(1): Fingerprint Liveness Detection systems are not designed to operate stand-alone, but as a part of a recognition system. Competitors are invited to submit a complete algorithm able not only to output the probability of the image vitality (the so-called “liveness score”) given the extracted set of features but also an integrated match score (“integrated score”) which includes the probability above with the probability of belonging to the declared user. For this challenge, participants can decide whether to exploit the additional information coming from the enrolled user (“user-speciﬁc effect”(2)). During the design phase of the integrated system, they have at their disposal the new tool “Bio-WISE: Biometric recognition with integrated pad: simulation environment”. BIO-WISE is born to test the performance of fingerprint PAD and matchers combined sequentially(3).
- Challenge 2. Fingerprint representation: In modern biometric systems, the compactness and the discriminability of feature vectors are fundamental to guarantee high performance in terms of accuracy and speed. Competitors are invited to submit a liveness detection algorithm which returns in addition to the probability of liveness, the feature vector corresponding to the input image. The algorithms will be assessed on the basis of system accuracy, feature compactness and system speed on PC with specified characteristics (see the page related to the challenge 2).
- Hidden challenge. Unknown sensors: Creating fake fingerprints to train PAD systems is a non-trivial task highly influenced by the skills of the operator who creates the spoofs. In both LivDet2023 challenges two sensors are known, therefore the name, brand and technical details are declared and examples of fakes will be provided to competitors; two other sensors are unknown, the name and brand of the sensor is not declared, and only live fingerprint samples will be provided.
Competitors can choose whether to participate in the first or second challenge or both. All competitors will participate in the hidden challenge.
Each participant is invited to submit its algorithm in a Windows or Linux console application. The performance will be evaluated by utilizing a very large data set of “fake” and “live” fingerprint images captured by four devices. The performance rank will be compiled and published in this site.
The goal of the competition is to compare different methodologies for software-based fingerprint liveness detection with a common experimental protocol and data set. The ambition of the competition is to become the reference event for academic and industrial research. The competition is not defined as an official system for quality certification of the proposed solutions, but may impact state-of-art in this crucial field, with reference to the general problem of security in biometric systems.
LivDet 2021 results were presented at IJCB 2021, for more information go to: LivDet 2021 results
- Registration Opening: February 21, 2022.
- Registration Closing: July 15, 2022.
- Algorithms Submission: January 13, 2023 January 20, 2023.
- Registration Opening: January 20, 2023.
- Registration Closing and Algorithms Submission: April 14, 2023.
The training-set will be made available after registration.
(1) The “Liveness Detection in Action” name is inspired by “Anti-spoofing in Action: Joint Operation with a Verification System, I. Chingovska, A. Anjos and S. Marcel, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, Portland, OR, 2013, pp. 98-104. doi: 10.1109/CVPRW.2013.22″
(2) Ghiani, L., Marcialis, G.L., Roli, F., Tuveri, P.: User-specific effects in fingerprint presentation attacks detection: insights for future research. In: 2016 ICB, Halmstad, pp. 1–6 (2016). doi: 10.1109/ICB.2016.7550081
(3) Micheletto, M., Marcialis, G. L., Orrù, G., & Roli, F. (2021), Fingerprint recognition with embedded presentation attacks detection: are we ready?, IEEE Transactions on Information Forensics and Security, 16, 5338-5351, doi: 10.1109/TIFS.2021.3121201.
IEEE Copyright Notice:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.