Abstract
Several issues related to the vulnerability of fingerprint recognition systems to attacks have been highlighted in the biometrics literature. One such vulnerability involves the use of artificial fingers, where materials such as Play-Doh, silicone, and gelatin are inscribed with fingerprint ridges. Researchers have demonstrated that some commercial fingerprint recognition systems can be deceived when these artificial fingers are placed on the sensor; that is, the system successfully processes the ensuing fingerprint images, thereby allowing an adversary to spoof the fingerprints of another individual. However, at the same time, several countermeasures that discriminate between live fingerprints and spoof artifacts have been proposed. While some of these antispoofing schemes are hardware based, several software-based approaches have been proposed as well. In this article, we review the literature and present the state of the art in fingerprint antispoofing.
- A. Abhyankar. 2004. A wavelet-based approach to detecting liveness in fingerprint scanners. 278--286.Google Scholar
- A. Abhyankar and S. Schuckers. 2006. Fingerprint liveness detection using local ridge frequencies and multiresolution texture analysis techniques. In Proceedings of the IEEE International Conference on Image Processing (ICIP'06). 321--324.Google Scholar
- A. Abhyankar and S. Schuckers. 2009. Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recognition 42 (2009), 452--464. Google ScholarDigital Library
- A. Abhyankar and S. Schuckers. 2010. Modular decomposition of fingerprint time series captures for the liveness check. International Journal of Computer and Electrical Engineering 2, 3 (2010), 1793--8163.Google Scholar
- A. Adler and S. Schuckers. 2009. Security and liveness: Overview. In Encyclopedia of Biometrics.Google Scholar
- Z. Akhtar, B. Biggio, G. Fumera, and G. Marcialis. 2011a. Robustness of multimodal biometric systems under spoof attacks. In Proceedings of the International Conference on Image Analysis and Processing (ICIAP'11). Springer, 159--168. Google ScholarDigital Library
- Z. Akhtar, G. Fumera, G. Marcialis, and F. Roli. 2011b. Robustness evaluation of biometric systems under spoof attacks. In Proceedings of the International Conference on Image Analysis and Processing (ICIAP'11). Springer, 159--168. Google ScholarDigital Library
- A. Al-Ajlan. 2013. Survey on fingerprint liveness detection. In Proceedings of the IEEE International Workshop on Biometrics and Forensics (IWBF'13). 1--5.Google ScholarCross Ref
- A. Antonelli, R. Cappelli, D. Maio, and D. Maltoni. 2006. Fake finger detection by skin distortion analysis. IEEE Transactions on Information Forensics and Security 1, 3 (2006), 360--373. Google ScholarDigital Library
- D. Baldisserra, A. Franco, D. Maio, and D. Maltoni. 2005. Fake fingerprint detection by odor analysis. Advances in Biometrics 3832, (2005), 265--272. Google ScholarDigital Library
- C. Barral and A. Tria. 2009. Fake fingers in fingerprint recognition: Glycerin supersedes gelatin. Formal to Practical Security. Springer Berlin Heidelberg, 5458 (2009), 57--69. Google ScholarDigital Library
- B. Biggio, Z. Akhtar, G. Fumera, G. Marcialis, and F. Roli. 2012. Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics 1, 1 (2012), 11--24.Google ScholarCross Ref
- J. Blommé. 2003. Evaluation of Biometric Security Systems against Artificial Fingers. Ph.D. Thesis, Linköping University.Google Scholar
- A. Bossen, R. Lehmann, and C. Meier. 2010. Internal fingerprint identification with optical coherence tomography. IEEE Photonics Technology Letters 22, 7 (2010), 507--509.Google ScholarCross Ref
- E. Bowden-Peters, R. Phan, J. Whitley, and D. Parish. 2012. Fooling a liveness-detecting capacitive fingerprint scanner. In Cryptography and Security: From Theory to Applications. Springer, 484--490. Google ScholarDigital Library
- C. Brislawn, J. Bradley, R. Onyshczak, and T. Hopper. 1996. FBI compression standard for digitized fingerprint images. In Proceedings of the International Symposium on Optical Science, Engineering, and Instrumentation. 344--355.Google Scholar
- BSI. 2010. Fingerprint spoof detection protection profile FSDPP v1.8. (2010). Available at https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/ReportePP/pp0063b_pdf.pdf?_blob=publicationFile.Google Scholar
- R. Cappelli, D. Maio, and D. Maltoni. 2001. Modelling plastic distortion in fingerprint images. In Advances in Pattern Recognition -(ICAPR'01). Springer, 371--378. Google ScholarDigital Library
- S. Chang, Y. Cheng, Kirill V. Larin, Y. Mao, S. Sherif, and C. Flueraru. 2008. Optical coherence tomography used for security and fingerprint-sensing applications. IET Image Processing 2, 1 (2008), 48--58.Google ScholarCross Ref
- J. Chen, S. Shan, C. He, G. Zhao, M. Pietikainen, X. Chen, and W. Gao. 2010. WLD: A robust local image descriptor. IEEE Transactions on Pattern Analysis and Machine Intelligence 32, 9 (2010), 1705--1720. Google ScholarDigital Library
- J. Chen, S. Shan, G. Zhao, X. Chen, W. Gao, and M. Pietikainen. 2008. A robust descriptor based on Webers law. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR'08). 1--7.Google Scholar
- Y. Cheng and K. Larin. 2006. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis. Applied Optics 45, 36 (2006), 9238--9245.Google ScholarCross Ref
- H. Choi, R. Kang, K. Choi, and J. Kim. 2007. Aliveness detection of fingerprints using multiple static features. World Academy of Science, Engineering and Technology 2, 3 (2007).Google Scholar
- K. Choi, H. Choi, R. Kang, and J. Kim. 2007. Aliveness detection of fingerprint using multiple static features. World Academy of Science, Engineering and Technology 28 (2007), 157--162.Google Scholar
- P. Coli, G. Marcialis, and F. Roli. 2007a. Power spectrum-based fingerprint vitality detection. In Proceedings of the IEEE International Workshop on Automatic Identification Advanced Technologies (AutoID'07).Google Scholar
- P. Coli, G. Marcialis, and F. Roli. 2007b. Vitality detection from fingerprint images: A critical survey. Lecture Notes in Computer Science 4642 (2007), 722--731. Google ScholarDigital Library
- B. DeCann, B. Tan, and S. Schuckers. 2009. A novel region based liveness detection approach for fingerprint scanners. In Proceedings of the IAPR/IEEE International Conference on Biometrics (ICB'09). Springer, 627--636. Google ScholarDigital Library
- R. Derakhshani, S. Schuckers, L. Hornak, and L. OGorman. 2001. Neural network-based approach for detection of liveness in fingerprint scanners. In Proceedings of the International Conference on Artificial Intelligence. 1099--1105.Google Scholar
- R. Derakhshani, S. Schuckers, L. Hornak, and L. OGorman. 2003a. Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanner. Pattern Recognition 36, 2 (2003), 383--396.Google ScholarCross Ref
- R. Derakhshani, S. Schuckers, L. Hornak, and L. O'Gorman. 2003b. Determination of vitality from non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recognition 36 (2003), 383--396.Google ScholarCross Ref
- S. Dubey, A. Tulsi, S. Chandra, and M. Singh. 2007. Fingerprint detection using full-field swept-source optical coherence tomography. Applied Physics Letters 91, 18 (2007), 181106--181106.Google ScholarCross Ref
- S. Elliott, S. Modi, L. Maccarone, M. Young, C. Jin, and H. Kim. 2007. Image quality and minutiae count comparison for genuine and artificial fingerprints. In Proceedings of the 41st Annual IEEE International Carnahan Conference on Security Technology. 30--36.Google Scholar
- Y. Endo, M. Hirabayashi, and T. Matsumoto. 2003. Can we make artificial fingers that fool fingerprint systems? (Part V). Joho Shori Gakkai Kenkyu Hokoku 18 (2003), 251--256.Google Scholar
- M. Espinoza and C. Champod. 2011a. Risk evaluation for spoofing against a sensor supplied with liveness detection. Forensic Science International 204, 1 (2011), 162--168.Google ScholarCross Ref
- M. Espinoza and C. Champod. 2011b. Using the number of pores on fingerprint images to detect spoofing attacks. In Proceedings of the IEEE International Conference on Hand-Based Biometrics (ICHB'11). 1--5.Google Scholar
- M. Espinoza, C. Champod, and P. Margot. 2011. Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic Science International 204 (January 2011), 41--49.Google Scholar
- J. Feng, A. Jain, and A. Ross. 2009. Fingerprint Alteration. MSU Technical Report, MSU-CSE-09-30.Google Scholar
- T. Fladsrud and R. Sollie. 2004. Circumvention of fingerprint scanners. (December 2004). NISlab-Norwegian Information Security of Gjøvik University College, Norway. Available at http://master.fladsrud.com/dokumenter/Circumvention%20of%20fingerprint%20scanners.pdf.Google Scholar
- A. Franco and D. Maltoni. 2008. Fingerprint synthesis and spoof detection. Advances in Biometrics (2008), 385--406.Google Scholar
- J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia. 2009. Fingerprint liveness detection based on quality measures. In Biometrics, Identity and Security (BIds). 1--8.Google Scholar
- J. Galbally, F. Alonso-Fernandez, J. Fiérrez, and J. Ortega-Garcia. 2012. A high performance fingerprint liveness detection method based on quality related features. Future Generation of Computer Systems (2012), 311--321. Google ScholarDigital Library
- J. Galbally, R. Cappelli, A. Lumini, D. Maltoni, and J. Fierrez. 2008. Fake fingertip generation from a minutiae template. In Proceedings of the 19th International Conference on Pattern Recognition (ICPR'08). 1--4.Google Scholar
- J. Galbally, J. Fierrez, and J. Ortega-Garcia. 2007. Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection. In Proc. Spanish Workshop on Biometrics (June 2007).Google Scholar
- J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M. Martinez-Diaz. 2011. Evaluation of direct attacks to fingerprint verification systems. Telecommunication Systems 47, 3--4 (2011), 243--254.Google ScholarDigital Library
- M. Garris and R. McCabe. 2000. NIST special database 27: Fingerprint minutiae from latent and matching tenprint images. Available at http://www. itl. nist. gov/iaui/894.03/databases.Google Scholar
- B. Geller, J. Almog, and P. Margot. 2001. Fingerprint forgery: A survey. Journal of Forensic Sciences 46, 3 (2001), 731.Google ScholarCross Ref
- B. Geller, J. Almog, P. Margot, and E. Springer. 1999. A chronological review of fingerprint forgery. Journal of Forensic Sciences 44 (1999), 963--968.Google ScholarCross Ref
- L. Ghiani, A. Hadid, G. Marcialis, and F. Roli. 2013. Fingerprint liveness detection using binarized statistical image features. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS'13).Google Scholar
- L. Ghiani, G. Marcialis, and F. Roli. 2012a. Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms. In Proceedings of the ACM Workshop on Multimedia and Security. Google ScholarDigital Library
- L. Ghiani, G. Marcialis, and F. Roli. 2012b. Fingerprint liveness detection by local phase quantization. In Proceedings of the 21st International Conference on Pattern Recognition (ICPR'12). 1--4.Google Scholar
- L. Ghiani, D. Yambay, V. Mura, S. Tocco, G. Marcialis, F. Roli, and S. Schuckers. 2013. LivDet fingerprint liveness detection competition 2013. In Proceedings of the IEEE International Conference on Biometrics (ICB'13). 1--6.Google Scholar
- C. Gottschlich, E. Marasco, A. Yang, and B. Cukic. 2014. Fingerprint liveness detection based on histograms of invariant gradients. In Proceedings of the IEEE International Conference on Biometrics (IJCB'14). 1--7.Google Scholar
- D. Gragnaniello, G. Poggi, C. Sansone, and L. Verdoliva. 2013. Fingerprint liveness detection based on Weber local image descriptor. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs'13). 1--5.Google Scholar
- J. Han, T. Kadowaki, K. Sato, and M. Shikida. 1999. Thermal analysis of fingerprint sensor having a microheater array. IEEE Micromechatronics and Human Science (MHS) (1999), 199--205.Google Scholar
- J. Han, Z. Tan, K. Sato, and M. Shikida. 2005. Thermal characterization of micro heater arrays on a polyimide film substrate for fingerprint sensing applications. Journal of Micromechanics and Microengineering 15, 2 (2005), 282.Google ScholarCross Ref
- S. Harrison, J. Beasley, B. Carroll, and R. Baraniuk. 2004. Classification of images. OpenStax-CNX.Google Scholar
- C. Hill. 2001. Risk of Masquerade Arising from the Storage of Biometrics. Bachelor of Science thesis, the Department of Computer Science, Australian National University (2001).Google Scholar
- A. Holland-Minkley. 2006. Biometric devices and fingerprint spoofing Retrieved from http://www2.washjeff. edu/users/ahollandminkley/biometric/index.html.Google Scholar
- A. Hyvärinen, J. Hurri, and P. Hoyer. 2009. Natural image statistics. In Natural Image Statistics: A Probabilistic Approach to Early Computational Vision, Computational Imaging and Vision. 39.Google Scholar
- Y. Imamverdiev, L. Kerimova, and V. Mussaev. 2009. Method of detection of real fingerprints on the basis of the radon transform. Automatic Control and Computer Sciences 43, 5 (2009), 270--275.Google ScholarCross Ref
- A. Jain, Y. Chen, and M. Demirkus. 2007. Pores and ridges: Fingerprint matching using level 3 features. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 1 (2007), 15--27. Google ScholarDigital Library
- A. Jain, L. Hong, S. Pankanti, and R. Bolle. 1997. An identity-authentication system using fingerprints. Proceeding of the IEEE 85, 9 (1997), 1365--1388.Google ScholarCross Ref
- A. Jain, A. Ross, and K. Nandakumar. 2011. An Introduction to Biometrics. Springer. Google ScholarDigital Library
- J. Jia and L. Cai. 2007. A new approach to fake finger detection based on skin elasticity analysis. In Proceedings of the International Conference on Biometrics (ICB'07). Google ScholarDigital Library
- C. Jin, H. Kim, and S. Elliott. 2007. Liveness detection of fingerprint based on band-selective Fourier spectrum. Information Security and Cryptology 4817 (2007), 168--179. Google ScholarDigital Library
- C. Jin, S. Li, H. Kim, and E. Park. 2011. Fingerprint liveness detection based on multiple image quality features. Information Security Applications (2011), 281--291. Google ScholarDigital Library
- P. Johnson, R. Lazarick, E. Marasco, E. Newton, A. Ross, and S. Schuckers. 2012. Biometric liveness detection: Framework and metrics. In Proceedings of the NIST International Biometric Performance Testing Conference (IBPC'12).Google Scholar
- P. Johnson, B. Tan, and S. Schuckers. 2010. Multimodal fusion vulnerability to non-zero effort (spoof) imposters. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'10).Google Scholar
- J. Kannala and E. Rahtu. 2012. BSIF: Binarized statistical image features. In Proceedings of the IEEE 21st International Conference on Pattern Recognition (ICPR'12). 1363--1366.Google Scholar
- M. Kluz. 2005. Liveness Testing in Biometric Systems. Master's thesis, Brno, Masaryk University, Faculty of Informatics. 57.Google Scholar
- M. Lane and L. Lordan. 2005. Practical Techniques for Defeating Biometric Devices. Technical Report, Diss. Master's thesis, Dublin City University, 2005.Google Scholar
- H. Lee, H. Maeng, and Y. Bae. 2009. Fake finger detection using the fractional fourier transform. Image and Vision Computing 27, 3 (2009), 233--244.Google Scholar
- T. Mäenpää. 2003. The Local Binary Pattern Approach to Texture Analysis: Extensions and Applications. Oulun yliopisto.Google Scholar
- D. Maltoni, D. Maio, A. Jain, and S. Prabhakar. 2003. Handbook of Fingerprint Recognition. Springer. Google ScholarDigital Library
- N. Manivanan, S. Memon, and W. Balachandran. 2010a. Automatic detection of active sweat pores of fingerprint using highpass and correlation filtering. Electronics Letters 46, 18 (2010), 1268--1269.Google ScholarCross Ref
- N. Manivanan, S. Memon, and W. Balachandran. 2010b. Security breaks a sweat. Electronics Letters 46, 18 (2010), 1241--1242.Google ScholarCross Ref
- E. Marasco. 2010. Secure Multibiometric Systems. Ph.D. Dissertation. Università degli Studi di Napoli Federico II.Google Scholar
- E. Marasco, Y. Ding, and A. Ross. 2012. Combining match scores with liveness values in a fingerprint verification system. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS'12). 418--425.Google Scholar
- E. Marasco, P. Johnson, C. Sansone, and S. Schuckers. 2011. Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism. In Proceedings of the 10th International Workshop on Multiple Classifier Systems (MCS'11). Springer. Google ScholarDigital Library
- E. Marasco and C. Sansone. 2010. An anti-spoofing technique using multiple textural features in fingerprint scanners. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs'10). 8--14.Google Scholar
- E. Marasco and C. Sansone. 2011a. On the robustness of fingerprint liveness detection algorithms against new materials used for spoofing. In Proceedings of the Biosignals 2011 International Conference on Bio-Inspired Systems and Signal Processing. 1--9.Google Scholar
- E. Marasco and C. Sansone. 2011b. On the security evaluation of a multibiometric system based on a voting strategy involving likelihood ratio statistic tests. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS'11). 1--5.Google Scholar
- E. Marasco and C. Sansone. 2012. Combining perspiration- and morphology-based static features for fingerprint liveness detection. Pattern Recognition Letters 33 (2012), 1148--1156. Google ScholarDigital Library
- G. Marcialis, L. Ghiani, K. Vetter, D. Morgeneier, and F. Roli. 2012b. Large scale experiments on fingerprint liveness detection. In Structural, Syntactic, and Statistical Pattern Recognition. Springer, Berlin, 501--509. Google ScholarDigital Library
- G. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, and S. Schuckers. 2009. First international fingerprint liveness detection competition - LivDet 2009. In Proceedings of the 15th International Conference on Image Analysis and Processing (ICIAP'09). 12--23. Google ScholarDigital Library
- G. Marcialis, F. Roli, and A. Tidu. 2010. Analysis of fingerprint pores for vitality detection. In Proceedings of the 20th IAPR International Conference on Pattern Recognition (ICPR'10). 1289--1292. Google ScholarDigital Library
- G. L. Marcialis, P. Coli, and F. Roli. 2012a. Fingerprint liveness detection based on fake finger characteristics. International Journal of Digital Crime and Forensics (IJDCF) 4, 3 (2012), 1--19.Google ScholarCross Ref
- L. Marfella, E. Marasco, and C. Sansone. 2012. Liveness-based fusion approaches in multibiometrics. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications. 1--7.Google Scholar
- J. Martins, L. Oliveira, and R. Sabourin. 2012. Combining textural descriptors for forest species recognition. In Proceedings of the 38th Annual Conference on IEEE Industrial Electronics Society. 1483--1488.Google Scholar
- T. Matsumoto. 2002. Gummy and conductive silicone rubber fingers importance of vulnerability analysis. In Proceedings of Advances in Cryptology (ASIACRYPT'02). Springer, 574--575. Google ScholarDigital Library
- T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. 2002. Impact of artificial gummy fingers on fingerprint systems. Proceedings of SPIE 4677 (2002), 275--289.Google Scholar
- S. Memon. 2012. Novel Active Sweat Pores based Liveness Detection Techniques for Fingerprint Biometrics. Ph.D. Dissertation. Brunel University School of Engineering and Design.Google Scholar
- S. Memon, N. Manivannan, and W. Balachandran. 2011. Active pore detection for liveness in fingerprint identification systems. Telecommunications Forum (TELFOR), IEEE (2011), 619--622.Google Scholar
- S. Memon, N. Manivannan, A. Noor, W. Balachadran, and N. Boulgouris. 2012. Fingerprint sensors: Liveness detection issue and hardware based solutions. Sensors & Transducers 136, 1 (2012), 35--49.Google Scholar
- B. Miller. 1994. Vital signs of identity {biometrics}. IEEE Spectrum 31, 2 (1994), 22--30. Google ScholarDigital Library
- Y. Moon, J. Chen, K. Chan, K. So., and K. So. Woo. 2005. Wavelet based fingerprint liveness detection. Electronic Letters 41, 20 (2005), 1112--1113.Google ScholarCross Ref
- M. Nasiri-Avanaki, A. Meadway, and A. Bradu. 2011. Anti-spoof reliable biometry of fingerprints using en-face optical coherence tomography. Optics and Photonics Journal 1 (2011), 91--96.Google ScholarCross Ref
- S. Nikam. 2009. Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection. Inderscience.Google Scholar
- S. Nikam and S. Agarwal. 2008a. Fingerprint liveness detection using curvelet energy and co-occurrence signatures. In Proceedings of the IEEE 5th International Conference on Computer Graphics, Imaging and Visualisation (CGIV'08). 217--222. Google ScholarDigital Library
- S. Nikam and S. Agarwal. 2008b. Local binary pattern and wavelet-based spoof fingerprint detection. International Journal of Biometrics 1, 2 (2008), 141--159. Google ScholarDigital Library
- S. Nikam and S. Agarwal. 2009a. Co-occurrence probabilities and wavelet-based spoof fingerprint detection. International Journal of Image and Graphics 9, 2 (2009), 171--199.Google ScholarCross Ref
- S. Nikam and S. Agarwal. 2009b. Curvelet-based fingerprint anti-spoofing. Signal, Image and Video Processing 4, 1 (January 2009), 75--87.Google Scholar
- S. Nikam and S. Agarwal. 2009c. Ridgelet-based fake fingerprint detection. Neurocomputing 72, 10--12 (2009), 2491--2506. Google ScholarDigital Library
- NIST. 2012. Need and perspectives to realize liveness detection. In IBPC.Google Scholar
- K. A. Nixon, V. Aimale, and R. Rowe. 2007. Spoof detection schemes. Handbook of biometrics. Springer US, 2008, 403--423.Google Scholar
- K. Nixon and R. Rowe. 2005. Multispectral fingerprint imaging for spoof detection. In Defense and Security, International Society for Optics and Photonics. 214--225.Google Scholar
- K. Nixon, R. Rowe, J. Allen, S. Corcoran, L. Fang, D. Gabel, D. Gonzales, R. Harbour, S. Love, and R. McCaskill. 2004. Novel spectroscopy-based technology for biometric and liveness verification. In Defense and Security. 287--295.Google Scholar
- T. Ojala, M. Pietikainen, and T. Maenpaa. 2002. Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 7 (2002), 971--987. Google ScholarDigital Library
- V. Ojansivu and J. Heikkilä. 2008. Blur insensitive texture classification using local phase quantization. In Image and Signal Processing. 236--243. Google ScholarDigital Library
- V. Ojansivu, E. Rahtu, and J. Heikkila. 2008. Rotation invariant local phase quantization for blur insensitive texture analysis. In Proceedings of the IEEE 19th International Conference on Pattern Recognition (ICPR'08). 1--4.Google Scholar
- S. Parthasaradhi, R. Derakhshani, L. Hornak, and S. Schuckers. 2004. Improvement of an algorithm for recognition of liveness using perspiration in fingerprint devices. Defense and Security 270--277.Google Scholar
- S. Parthasaradhi, R. Derakhshani, L. Hornak, and S. Schuckers. 2005. Time-series detection of perspiration as a liveness test in fingerprint devices. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 35, 3 (2005), 335--343. Google ScholarDigital Library
- N. Ratha, J. Connell, and R. Bolle. 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 3 (2001), 614--634. Google ScholarDigital Library
- A. Rattani and N. Poh. 2013. Biometric system design under zero and non-zero effort attacks. In Proceedings of the IEEE International Conference on Biometrics (ICB'13).Google Scholar
- A. Rattani, N. Poh, and A. Ross. 2013. A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'13). 37--42.Google Scholar
- A. Rattani and A. Ross. 2014a. Automatic adaptation of fingerprint liveness detector to new spoof materials. In Proceedings of the IEEE International Conference on Biometrics (IJCB'14). 1--6.Google Scholar
- A. Rattani and A. Ross. 2014b. Minimizing the impact of spoof fabrication material on fingerprint liveness detector. In Proceedings of the 21st IEEE International Conference on Image Processing (ICIP'14).Google Scholar
- P. Reddy, A. Kumar, S. Rahman, and T. Mundra. 2007. A new method for fingerprint antispoofing using pulse oximetry. In Proceedings of the IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS'07). 1--6.Google Scholar
- P. Reddy, A. Kumar, S. Rahman, and T. Mundra. 2008. A new antispoofing approach for biometric devices. IEEE Transactions on Biomedical Circuits and Systems 2, 4 (2008), 328--337.Google ScholarCross Ref
- C. Roberts. 2007. Biometric attack vectors and defences. Computers and Security 26, 1 (2007), 14--25. Google ScholarDigital Library
- R. Rodrigues, N. Kamat, and V. Govindaraju. 2010. Evaluation of biometric spoofing in a multimodal system. In Proceedings of the IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS'10).Google Scholar
- R. Rodrigues, L. Ling, and V. Govindaraju. 2009. Robustness of multimodal biometric fusion methods against spoof attacks. Journal of Visual Languages and Computing 20, 3 (2009), 169--179. Google ScholarDigital Library
- A. Ross, J. Shah, and A. Jain. 2007. From template to image: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 4 (2007), 544--560. Google ScholarDigital Library
- M. Sandstrom. 2004. Liveness Detection in Fingerprint Recognition Systems. Ph.D. Thesis, Linköping.Google Scholar
- S. Schuckers. 2002. Spoofing and anti-spoofing measures. Information Security Technical Report 7, 4 (2002), 56--62.Google Scholar
- S. Schuckers, R. Derakhshani, S. Parthasaradhi, and L. Hornak. 2006. Liveness detection in biometric devices. Circuits, Signals, and Speech and Image Processing 35, 3 (2006), 335--343.Google Scholar
- S. Schuckers, L. Hornak, T. Norman, R. Derakhshani, and S. Parthasaradhi. 2002. Issues for liveness detection in biometrics. In Proceedings of the Biometric Consortium Conference.Google Scholar
- S. Schuckers, S. Parthasaradhi, R. Derakshani, and L. Hornak. 2004. Comparison of classification methods for time-series detection of perspiration as a liveness test in fingerprint devices. In Biometric Authentication. Springer, 256--263.Google Scholar
- S. Schuckers and B. Tan. 2006. Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing. In Proceedings of the Computer Vision and Pattern Recognition Workshop (CVPR'06). 26. Google ScholarDigital Library
- M. Sébastien, M. Nixon, and S. Li. Handbook of Biometric Anti-Spoofing. Springer, 2014.Google Scholar
- M. Sepasian, C. Mares, and W. Balachandran. 2010. Vitality detection in fingerprint identification. Information Science and Applications 4 (2010). Google ScholarDigital Library
- Y. Shin, I. Jun, H. Kim, and W. Shin. 2009. Performance assessment method for a forged fingerprint detection algorithm. In Advances in Information Security and Its Application.Google Scholar
- K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E. Newton, and B. Preneel. 2012. Criteria towards metrics for benchmarking template protection algorithms. In Proceedings of the 5th IAPR International Conference on Biometrics (ICB) (2012), 498--505.Google ScholarCross Ref
- Y. Singh and S. Singh. 2013. A taxonomy of biometric system vulnerabilities and defences. International Journal of Biometrics 5, 2 (2013), 137--159. Google ScholarDigital Library
- C. Sousedik and C. Busch. 2014. Presentation attack detection methods for fingerprint recognition systems: A survey. IET Biometrics (2014), 1--15.Google Scholar
- J. Staymates, M. Staymates, and G. Gillen. 2013. Evaluation of a drop-on-demand micro-dispensing system for development of artificial fingerprints. Analysis Methods, RSC 5, 1 (2013), 180--186.Google Scholar
- A. Stén, A. Kaseva, and T. Virtanen. 2003a. Fooling fingerprint scanners - biometric vulnerabilities of the precise biometrics 100 SC scanner. In Proceedings of the 4th Australian Information Warfare and IT Security Conference. 1--8.Google Scholar
- A. Stén, A. Kaseva, and T. Virtanen. 2003b. Fooling fingerprint scanners-biometric vulnerabilities of the precise biometrics 100 SC scanner. In Proceedings of 4th Australian Information Warfare and IT Security Conference, Vol. 2003 (2003), 333--340.Google Scholar
- B. Tan, A. Lewicke, D. Yambay, and S. Schuckers. 2010. The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'10). 1--6.Google Scholar
- B. Tan and S. Schuckers. 2005. Liveness detection using an intensity based approach in fingerprint scanner. In Proceedings of Biometrics Symposium (BSYM'05).Google Scholar
- B. Tan and S. Schuckers. 2010. Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise. Pattern Recognition 43, 8 (2010), 2845--2857. Google ScholarDigital Library
- L. Thalheim, J. Krissler, and P.-M. Ziegler. 2002. Body check: Biometric access protection devices and their programs put to the test. ct magazine 11 (November 2002). Available at http://www.pcmag.com/article2/0,2817,13919,00.asp.Google Scholar
- A. Tidu. 2010. Fingerprint Vitality Assessment by Pores Detection. Master of Science Thesis, University of Cagliari.Google Scholar
- B. Toth. 2005. Biometric liveness detection. Information Security Bulletin 10 (October 2005), 291--297.Google Scholar
- U. Uludag and A. Jain. 2004. Attacks on biometric systems: A case study in fingerprints. In Proceedings of SPIE-EI, Security, Seganography and Watermarking of Multimedia Contents VI.Google Scholar
- V. Valencia and C. Horn. 2003. Biometric liveness testing. In Biometrics. Osborne McGraw Hill, New York, 139--149.Google Scholar
- T. van der Putte and J. Keuning. 2001. Biometrical fingerprint recognition: Don't get your fingers burned. Smart Card Research and Advanced Applications. Springer US (2000), 289--303. Google ScholarDigital Library
- A. Wiehe, T. Søndrol, O. Olsen, and F. Skarderud. 2004. Attacking Fingerprint Sensors. Master thesis, Gjøvik University College.Google Scholar
- D. Willis and M. Lee. 1998. Six biometric devices point the finger at security. Computers and Security, Elsevier 17, 5 (1998), 410--411. Google ScholarDigital Library
- K. Yamada, H. Matsumoto, and T. Matsumoto. 2000. Can we make artificial fingers that fool fingerprint systems? Technical Report of IEICE and IPSJ (Part II). 12 (2000), 109--114.Google Scholar
- D. Yambay, L. Ghiani, P. Denti, G. Marcialis, F. Roli, and S. Schuckers. 2012. LivDet 2011—fingerprint liveness detection competition 2011. In Proceedings of the 15th International Conference on Image Analysis and Processing (ICIAP'11). 208--215.Google Scholar
- S. Yang, C. Wang, and S. Chen. 2011. A release-induced response for the rapid recognition of latent fingerprints and formation of inkjet-printed patterns. Angewandte Chemie 123, 16 (2011), 3790--3793.Google ScholarCross Ref
- W. Yau, H. Tran, and E. Teoh. 2008. Fake finger detection using an electrotactile display system. In Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision (ICARCV'08). 962--966.Google Scholar
- W. Yau, H. Tran, E. Teoh, and J. Wang. 2009. Fake finger detection by finger color change analysis. Advances in Biometrics 4642 (2009), 888--896. Google ScholarDigital Library
- S. Yoon, J. Feng, and A. Jain. 2010. Fingerprint alteration. In Proceedings of the 95th International Educational Conference of the International Association for Identification (IAI'10). 11--17.Google Scholar
- S. Yoon, J. Feng, and A. Jain. 2012. Altered fingerprints: Analysis and detection. IEEE Transactions on Pattern Analysis and Machine Intelligence 34, 3 (2012), 451--464. Google ScholarDigital Library
- Y. Zhang, J. Tian, X. Chen, X. Yang, and P. Shi. 2007. Fake finger detection based on thin-plate spline distortion model. In Proceedings of the International Conference on Biometrics (ICB'07). 742--749. Google ScholarDigital Library
Index Terms
- A Survey on Antispoofing Schemes for Fingerprint Recognition Systems
Recommendations
Fingerprint image: pre- and post-processing
Automatic Fingerprint Identification Systems (AFIS) are widely used for personal identification due to uniqueness of fingerprints. Minutiae-based fingerprint matching techniques are normally used for fingerprint matching. Fingerprint matching results ...
Detecting liveness of fingerprint biometrics
Biometrics refer to automated recognition of individuals based on their biological and behavioral characteristics. Biometric systems are widely used for security. But biometric systems are vulnerable to a certain type of attack. The type 1 attack or ...
A survey of attacks on iris biometric systems
Biometric recognition has several applications that provide reliable solutions to the user authentication problem. Its widespread use and popularity is itself making it prone to several vulnerabilities. Iris is emerging as one of the most popular and ...
Comments