skip to main content
research-article

A Survey on Antispoofing Schemes for Fingerprint Recognition Systems

Published:12 November 2014Publication History
Skip Abstract Section

Abstract

Several issues related to the vulnerability of fingerprint recognition systems to attacks have been highlighted in the biometrics literature. One such vulnerability involves the use of artificial fingers, where materials such as Play-Doh, silicone, and gelatin are inscribed with fingerprint ridges. Researchers have demonstrated that some commercial fingerprint recognition systems can be deceived when these artificial fingers are placed on the sensor; that is, the system successfully processes the ensuing fingerprint images, thereby allowing an adversary to spoof the fingerprints of another individual. However, at the same time, several countermeasures that discriminate between live fingerprints and spoof artifacts have been proposed. While some of these antispoofing schemes are hardware based, several software-based approaches have been proposed as well. In this article, we review the literature and present the state of the art in fingerprint antispoofing.

References

  1. A. Abhyankar. 2004. A wavelet-based approach to detecting liveness in fingerprint scanners. 278--286.Google ScholarGoogle Scholar
  2. A. Abhyankar and S. Schuckers. 2006. Fingerprint liveness detection using local ridge frequencies and multiresolution texture analysis techniques. In Proceedings of the IEEE International Conference on Image Processing (ICIP'06). 321--324.Google ScholarGoogle Scholar
  3. A. Abhyankar and S. Schuckers. 2009. Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recognition 42 (2009), 452--464. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Abhyankar and S. Schuckers. 2010. Modular decomposition of fingerprint time series captures for the liveness check. International Journal of Computer and Electrical Engineering 2, 3 (2010), 1793--8163.Google ScholarGoogle Scholar
  5. A. Adler and S. Schuckers. 2009. Security and liveness: Overview. In Encyclopedia of Biometrics.Google ScholarGoogle Scholar
  6. Z. Akhtar, B. Biggio, G. Fumera, and G. Marcialis. 2011a. Robustness of multimodal biometric systems under spoof attacks. In Proceedings of the International Conference on Image Analysis and Processing (ICIAP'11). Springer, 159--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Z. Akhtar, G. Fumera, G. Marcialis, and F. Roli. 2011b. Robustness evaluation of biometric systems under spoof attacks. In Proceedings of the International Conference on Image Analysis and Processing (ICIAP'11). Springer, 159--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Al-Ajlan. 2013. Survey on fingerprint liveness detection. In Proceedings of the IEEE International Workshop on Biometrics and Forensics (IWBF'13). 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. Antonelli, R. Cappelli, D. Maio, and D. Maltoni. 2006. Fake finger detection by skin distortion analysis. IEEE Transactions on Information Forensics and Security 1, 3 (2006), 360--373. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Baldisserra, A. Franco, D. Maio, and D. Maltoni. 2005. Fake fingerprint detection by odor analysis. Advances in Biometrics 3832, (2005), 265--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Barral and A. Tria. 2009. Fake fingers in fingerprint recognition: Glycerin supersedes gelatin. Formal to Practical Security. Springer Berlin Heidelberg, 5458 (2009), 57--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Biggio, Z. Akhtar, G. Fumera, G. Marcialis, and F. Roli. 2012. Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics 1, 1 (2012), 11--24.Google ScholarGoogle ScholarCross RefCross Ref
  13. J. Blommé. 2003. Evaluation of Biometric Security Systems against Artificial Fingers. Ph.D. Thesis, Linköping University.Google ScholarGoogle Scholar
  14. A. Bossen, R. Lehmann, and C. Meier. 2010. Internal fingerprint identification with optical coherence tomography. IEEE Photonics Technology Letters 22, 7 (2010), 507--509.Google ScholarGoogle ScholarCross RefCross Ref
  15. E. Bowden-Peters, R. Phan, J. Whitley, and D. Parish. 2012. Fooling a liveness-detecting capacitive fingerprint scanner. In Cryptography and Security: From Theory to Applications. Springer, 484--490. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Brislawn, J. Bradley, R. Onyshczak, and T. Hopper. 1996. FBI compression standard for digitized fingerprint images. In Proceedings of the International Symposium on Optical Science, Engineering, and Instrumentation. 344--355.Google ScholarGoogle Scholar
  17. BSI. 2010. Fingerprint spoof detection protection profile FSDPP v1.8. (2010). Available at https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/ReportePP/pp0063b_pdf.pdf?_blob=publicationFile.Google ScholarGoogle Scholar
  18. R. Cappelli, D. Maio, and D. Maltoni. 2001. Modelling plastic distortion in fingerprint images. In Advances in Pattern Recognition -(ICAPR'01). Springer, 371--378. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Chang, Y. Cheng, Kirill V. Larin, Y. Mao, S. Sherif, and C. Flueraru. 2008. Optical coherence tomography used for security and fingerprint-sensing applications. IET Image Processing 2, 1 (2008), 48--58.Google ScholarGoogle ScholarCross RefCross Ref
  20. J. Chen, S. Shan, C. He, G. Zhao, M. Pietikainen, X. Chen, and W. Gao. 2010. WLD: A robust local image descriptor. IEEE Transactions on Pattern Analysis and Machine Intelligence 32, 9 (2010), 1705--1720. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Chen, S. Shan, G. Zhao, X. Chen, W. Gao, and M. Pietikainen. 2008. A robust descriptor based on Webers law. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR'08). 1--7.Google ScholarGoogle Scholar
  22. Y. Cheng and K. Larin. 2006. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis. Applied Optics 45, 36 (2006), 9238--9245.Google ScholarGoogle ScholarCross RefCross Ref
  23. H. Choi, R. Kang, K. Choi, and J. Kim. 2007. Aliveness detection of fingerprints using multiple static features. World Academy of Science, Engineering and Technology 2, 3 (2007).Google ScholarGoogle Scholar
  24. K. Choi, H. Choi, R. Kang, and J. Kim. 2007. Aliveness detection of fingerprint using multiple static features. World Academy of Science, Engineering and Technology 28 (2007), 157--162.Google ScholarGoogle Scholar
  25. P. Coli, G. Marcialis, and F. Roli. 2007a. Power spectrum-based fingerprint vitality detection. In Proceedings of the IEEE International Workshop on Automatic Identification Advanced Technologies (AutoID'07).Google ScholarGoogle Scholar
  26. P. Coli, G. Marcialis, and F. Roli. 2007b. Vitality detection from fingerprint images: A critical survey. Lecture Notes in Computer Science 4642 (2007), 722--731. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. DeCann, B. Tan, and S. Schuckers. 2009. A novel region based liveness detection approach for fingerprint scanners. In Proceedings of the IAPR/IEEE International Conference on Biometrics (ICB'09). Springer, 627--636. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. Derakhshani, S. Schuckers, L. Hornak, and L. OGorman. 2001. Neural network-based approach for detection of liveness in fingerprint scanners. In Proceedings of the International Conference on Artificial Intelligence. 1099--1105.Google ScholarGoogle Scholar
  29. R. Derakhshani, S. Schuckers, L. Hornak, and L. OGorman. 2003a. Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanner. Pattern Recognition 36, 2 (2003), 383--396.Google ScholarGoogle ScholarCross RefCross Ref
  30. R. Derakhshani, S. Schuckers, L. Hornak, and L. O'Gorman. 2003b. Determination of vitality from non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recognition 36 (2003), 383--396.Google ScholarGoogle ScholarCross RefCross Ref
  31. S. Dubey, A. Tulsi, S. Chandra, and M. Singh. 2007. Fingerprint detection using full-field swept-source optical coherence tomography. Applied Physics Letters 91, 18 (2007), 181106--181106.Google ScholarGoogle ScholarCross RefCross Ref
  32. S. Elliott, S. Modi, L. Maccarone, M. Young, C. Jin, and H. Kim. 2007. Image quality and minutiae count comparison for genuine and artificial fingerprints. In Proceedings of the 41st Annual IEEE International Carnahan Conference on Security Technology. 30--36.Google ScholarGoogle Scholar
  33. Y. Endo, M. Hirabayashi, and T. Matsumoto. 2003. Can we make artificial fingers that fool fingerprint systems? (Part V). Joho Shori Gakkai Kenkyu Hokoku 18 (2003), 251--256.Google ScholarGoogle Scholar
  34. M. Espinoza and C. Champod. 2011a. Risk evaluation for spoofing against a sensor supplied with liveness detection. Forensic Science International 204, 1 (2011), 162--168.Google ScholarGoogle ScholarCross RefCross Ref
  35. M. Espinoza and C. Champod. 2011b. Using the number of pores on fingerprint images to detect spoofing attacks. In Proceedings of the IEEE International Conference on Hand-Based Biometrics (ICHB'11). 1--5.Google ScholarGoogle Scholar
  36. M. Espinoza, C. Champod, and P. Margot. 2011. Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic Science International 204 (January 2011), 41--49.Google ScholarGoogle Scholar
  37. J. Feng, A. Jain, and A. Ross. 2009. Fingerprint Alteration. MSU Technical Report, MSU-CSE-09-30.Google ScholarGoogle Scholar
  38. T. Fladsrud and R. Sollie. 2004. Circumvention of fingerprint scanners. (December 2004). NISlab-Norwegian Information Security of Gjøvik University College, Norway. Available at http://master.fladsrud.com/dokumenter/Circumvention%20of%20fingerprint%20scanners.pdf.Google ScholarGoogle Scholar
  39. A. Franco and D. Maltoni. 2008. Fingerprint synthesis and spoof detection. Advances in Biometrics (2008), 385--406.Google ScholarGoogle Scholar
  40. J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia. 2009. Fingerprint liveness detection based on quality measures. In Biometrics, Identity and Security (BIds). 1--8.Google ScholarGoogle Scholar
  41. J. Galbally, F. Alonso-Fernandez, J. Fiérrez, and J. Ortega-Garcia. 2012. A high performance fingerprint liveness detection method based on quality related features. Future Generation of Computer Systems (2012), 311--321. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. J. Galbally, R. Cappelli, A. Lumini, D. Maltoni, and J. Fierrez. 2008. Fake fingertip generation from a minutiae template. In Proceedings of the 19th International Conference on Pattern Recognition (ICPR'08). 1--4.Google ScholarGoogle Scholar
  43. J. Galbally, J. Fierrez, and J. Ortega-Garcia. 2007. Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection. In Proc. Spanish Workshop on Biometrics (June 2007).Google ScholarGoogle Scholar
  44. J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M. Martinez-Diaz. 2011. Evaluation of direct attacks to fingerprint verification systems. Telecommunication Systems 47, 3--4 (2011), 243--254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. M. Garris and R. McCabe. 2000. NIST special database 27: Fingerprint minutiae from latent and matching tenprint images. Available at http://www. itl. nist. gov/iaui/894.03/databases.Google ScholarGoogle Scholar
  46. B. Geller, J. Almog, and P. Margot. 2001. Fingerprint forgery: A survey. Journal of Forensic Sciences 46, 3 (2001), 731.Google ScholarGoogle ScholarCross RefCross Ref
  47. B. Geller, J. Almog, P. Margot, and E. Springer. 1999. A chronological review of fingerprint forgery. Journal of Forensic Sciences 44 (1999), 963--968.Google ScholarGoogle ScholarCross RefCross Ref
  48. L. Ghiani, A. Hadid, G. Marcialis, and F. Roli. 2013. Fingerprint liveness detection using binarized statistical image features. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS'13).Google ScholarGoogle Scholar
  49. L. Ghiani, G. Marcialis, and F. Roli. 2012a. Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms. In Proceedings of the ACM Workshop on Multimedia and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. L. Ghiani, G. Marcialis, and F. Roli. 2012b. Fingerprint liveness detection by local phase quantization. In Proceedings of the 21st International Conference on Pattern Recognition (ICPR'12). 1--4.Google ScholarGoogle Scholar
  51. L. Ghiani, D. Yambay, V. Mura, S. Tocco, G. Marcialis, F. Roli, and S. Schuckers. 2013. LivDet fingerprint liveness detection competition 2013. In Proceedings of the IEEE International Conference on Biometrics (ICB'13). 1--6.Google ScholarGoogle Scholar
  52. C. Gottschlich, E. Marasco, A. Yang, and B. Cukic. 2014. Fingerprint liveness detection based on histograms of invariant gradients. In Proceedings of the IEEE International Conference on Biometrics (IJCB'14). 1--7.Google ScholarGoogle Scholar
  53. D. Gragnaniello, G. Poggi, C. Sansone, and L. Verdoliva. 2013. Fingerprint liveness detection based on Weber local image descriptor. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs'13). 1--5.Google ScholarGoogle Scholar
  54. J. Han, T. Kadowaki, K. Sato, and M. Shikida. 1999. Thermal analysis of fingerprint sensor having a microheater array. IEEE Micromechatronics and Human Science (MHS) (1999), 199--205.Google ScholarGoogle Scholar
  55. J. Han, Z. Tan, K. Sato, and M. Shikida. 2005. Thermal characterization of micro heater arrays on a polyimide film substrate for fingerprint sensing applications. Journal of Micromechanics and Microengineering 15, 2 (2005), 282.Google ScholarGoogle ScholarCross RefCross Ref
  56. S. Harrison, J. Beasley, B. Carroll, and R. Baraniuk. 2004. Classification of images. OpenStax-CNX.Google ScholarGoogle Scholar
  57. C. Hill. 2001. Risk of Masquerade Arising from the Storage of Biometrics. Bachelor of Science thesis, the Department of Computer Science, Australian National University (2001).Google ScholarGoogle Scholar
  58. A. Holland-Minkley. 2006. Biometric devices and fingerprint spoofing Retrieved from http://www2.washjeff. edu/users/ahollandminkley/biometric/index.html.Google ScholarGoogle Scholar
  59. A. Hyvärinen, J. Hurri, and P. Hoyer. 2009. Natural image statistics. In Natural Image Statistics: A Probabilistic Approach to Early Computational Vision, Computational Imaging and Vision. 39.Google ScholarGoogle Scholar
  60. Y. Imamverdiev, L. Kerimova, and V. Mussaev. 2009. Method of detection of real fingerprints on the basis of the radon transform. Automatic Control and Computer Sciences 43, 5 (2009), 270--275.Google ScholarGoogle ScholarCross RefCross Ref
  61. A. Jain, Y. Chen, and M. Demirkus. 2007. Pores and ridges: Fingerprint matching using level 3 features. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 1 (2007), 15--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. A. Jain, L. Hong, S. Pankanti, and R. Bolle. 1997. An identity-authentication system using fingerprints. Proceeding of the IEEE 85, 9 (1997), 1365--1388.Google ScholarGoogle ScholarCross RefCross Ref
  63. A. Jain, A. Ross, and K. Nandakumar. 2011. An Introduction to Biometrics. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. J. Jia and L. Cai. 2007. A new approach to fake finger detection based on skin elasticity analysis. In Proceedings of the International Conference on Biometrics (ICB'07). Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. C. Jin, H. Kim, and S. Elliott. 2007. Liveness detection of fingerprint based on band-selective Fourier spectrum. Information Security and Cryptology 4817 (2007), 168--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. C. Jin, S. Li, H. Kim, and E. Park. 2011. Fingerprint liveness detection based on multiple image quality features. Information Security Applications (2011), 281--291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. P. Johnson, R. Lazarick, E. Marasco, E. Newton, A. Ross, and S. Schuckers. 2012. Biometric liveness detection: Framework and metrics. In Proceedings of the NIST International Biometric Performance Testing Conference (IBPC'12).Google ScholarGoogle Scholar
  68. P. Johnson, B. Tan, and S. Schuckers. 2010. Multimodal fusion vulnerability to non-zero effort (spoof) imposters. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'10).Google ScholarGoogle Scholar
  69. J. Kannala and E. Rahtu. 2012. BSIF: Binarized statistical image features. In Proceedings of the IEEE 21st International Conference on Pattern Recognition (ICPR'12). 1363--1366.Google ScholarGoogle Scholar
  70. M. Kluz. 2005. Liveness Testing in Biometric Systems. Master's thesis, Brno, Masaryk University, Faculty of Informatics. 57.Google ScholarGoogle Scholar
  71. M. Lane and L. Lordan. 2005. Practical Techniques for Defeating Biometric Devices. Technical Report, Diss. Master's thesis, Dublin City University, 2005.Google ScholarGoogle Scholar
  72. H. Lee, H. Maeng, and Y. Bae. 2009. Fake finger detection using the fractional fourier transform. Image and Vision Computing 27, 3 (2009), 233--244.Google ScholarGoogle Scholar
  73. T. Mäenpää. 2003. The Local Binary Pattern Approach to Texture Analysis: Extensions and Applications. Oulun yliopisto.Google ScholarGoogle Scholar
  74. D. Maltoni, D. Maio, A. Jain, and S. Prabhakar. 2003. Handbook of Fingerprint Recognition. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. N. Manivanan, S. Memon, and W. Balachandran. 2010a. Automatic detection of active sweat pores of fingerprint using highpass and correlation filtering. Electronics Letters 46, 18 (2010), 1268--1269.Google ScholarGoogle ScholarCross RefCross Ref
  76. N. Manivanan, S. Memon, and W. Balachandran. 2010b. Security breaks a sweat. Electronics Letters 46, 18 (2010), 1241--1242.Google ScholarGoogle ScholarCross RefCross Ref
  77. E. Marasco. 2010. Secure Multibiometric Systems. Ph.D. Dissertation. Università degli Studi di Napoli Federico II.Google ScholarGoogle Scholar
  78. E. Marasco, Y. Ding, and A. Ross. 2012. Combining match scores with liveness values in a fingerprint verification system. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS'12). 418--425.Google ScholarGoogle Scholar
  79. E. Marasco, P. Johnson, C. Sansone, and S. Schuckers. 2011. Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism. In Proceedings of the 10th International Workshop on Multiple Classifier Systems (MCS'11). Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. E. Marasco and C. Sansone. 2010. An anti-spoofing technique using multiple textural features in fingerprint scanners. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs'10). 8--14.Google ScholarGoogle Scholar
  81. E. Marasco and C. Sansone. 2011a. On the robustness of fingerprint liveness detection algorithms against new materials used for spoofing. In Proceedings of the Biosignals 2011 International Conference on Bio-Inspired Systems and Signal Processing. 1--9.Google ScholarGoogle Scholar
  82. E. Marasco and C. Sansone. 2011b. On the security evaluation of a multibiometric system based on a voting strategy involving likelihood ratio statistic tests. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS'11). 1--5.Google ScholarGoogle Scholar
  83. E. Marasco and C. Sansone. 2012. Combining perspiration- and morphology-based static features for fingerprint liveness detection. Pattern Recognition Letters 33 (2012), 1148--1156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. G. Marcialis, L. Ghiani, K. Vetter, D. Morgeneier, and F. Roli. 2012b. Large scale experiments on fingerprint liveness detection. In Structural, Syntactic, and Statistical Pattern Recognition. Springer, Berlin, 501--509. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. G. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, and S. Schuckers. 2009. First international fingerprint liveness detection competition - LivDet 2009. In Proceedings of the 15th International Conference on Image Analysis and Processing (ICIAP'09). 12--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. G. Marcialis, F. Roli, and A. Tidu. 2010. Analysis of fingerprint pores for vitality detection. In Proceedings of the 20th IAPR International Conference on Pattern Recognition (ICPR'10). 1289--1292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. G. L. Marcialis, P. Coli, and F. Roli. 2012a. Fingerprint liveness detection based on fake finger characteristics. International Journal of Digital Crime and Forensics (IJDCF) 4, 3 (2012), 1--19.Google ScholarGoogle ScholarCross RefCross Ref
  88. L. Marfella, E. Marasco, and C. Sansone. 2012. Liveness-based fusion approaches in multibiometrics. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications. 1--7.Google ScholarGoogle Scholar
  89. J. Martins, L. Oliveira, and R. Sabourin. 2012. Combining textural descriptors for forest species recognition. In Proceedings of the 38th Annual Conference on IEEE Industrial Electronics Society. 1483--1488.Google ScholarGoogle Scholar
  90. T. Matsumoto. 2002. Gummy and conductive silicone rubber fingers importance of vulnerability analysis. In Proceedings of Advances in Cryptology (ASIACRYPT'02). Springer, 574--575. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. 2002. Impact of artificial gummy fingers on fingerprint systems. Proceedings of SPIE 4677 (2002), 275--289.Google ScholarGoogle Scholar
  92. S. Memon. 2012. Novel Active Sweat Pores based Liveness Detection Techniques for Fingerprint Biometrics. Ph.D. Dissertation. Brunel University School of Engineering and Design.Google ScholarGoogle Scholar
  93. S. Memon, N. Manivannan, and W. Balachandran. 2011. Active pore detection for liveness in fingerprint identification systems. Telecommunications Forum (TELFOR), IEEE (2011), 619--622.Google ScholarGoogle Scholar
  94. S. Memon, N. Manivannan, A. Noor, W. Balachadran, and N. Boulgouris. 2012. Fingerprint sensors: Liveness detection issue and hardware based solutions. Sensors & Transducers 136, 1 (2012), 35--49.Google ScholarGoogle Scholar
  95. B. Miller. 1994. Vital signs of identity {biometrics}. IEEE Spectrum 31, 2 (1994), 22--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Y. Moon, J. Chen, K. Chan, K. So., and K. So. Woo. 2005. Wavelet based fingerprint liveness detection. Electronic Letters 41, 20 (2005), 1112--1113.Google ScholarGoogle ScholarCross RefCross Ref
  97. M. Nasiri-Avanaki, A. Meadway, and A. Bradu. 2011. Anti-spoof reliable biometry of fingerprints using en-face optical coherence tomography. Optics and Photonics Journal 1 (2011), 91--96.Google ScholarGoogle ScholarCross RefCross Ref
  98. S. Nikam. 2009. Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection. Inderscience.Google ScholarGoogle Scholar
  99. S. Nikam and S. Agarwal. 2008a. Fingerprint liveness detection using curvelet energy and co-occurrence signatures. In Proceedings of the IEEE 5th International Conference on Computer Graphics, Imaging and Visualisation (CGIV'08). 217--222. Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. S. Nikam and S. Agarwal. 2008b. Local binary pattern and wavelet-based spoof fingerprint detection. International Journal of Biometrics 1, 2 (2008), 141--159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. S. Nikam and S. Agarwal. 2009a. Co-occurrence probabilities and wavelet-based spoof fingerprint detection. International Journal of Image and Graphics 9, 2 (2009), 171--199.Google ScholarGoogle ScholarCross RefCross Ref
  102. S. Nikam and S. Agarwal. 2009b. Curvelet-based fingerprint anti-spoofing. Signal, Image and Video Processing 4, 1 (January 2009), 75--87.Google ScholarGoogle Scholar
  103. S. Nikam and S. Agarwal. 2009c. Ridgelet-based fake fingerprint detection. Neurocomputing 72, 10--12 (2009), 2491--2506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. NIST. 2012. Need and perspectives to realize liveness detection. In IBPC.Google ScholarGoogle Scholar
  105. K. A. Nixon, V. Aimale, and R. Rowe. 2007. Spoof detection schemes. Handbook of biometrics. Springer US, 2008, 403--423.Google ScholarGoogle Scholar
  106. K. Nixon and R. Rowe. 2005. Multispectral fingerprint imaging for spoof detection. In Defense and Security, International Society for Optics and Photonics. 214--225.Google ScholarGoogle Scholar
  107. K. Nixon, R. Rowe, J. Allen, S. Corcoran, L. Fang, D. Gabel, D. Gonzales, R. Harbour, S. Love, and R. McCaskill. 2004. Novel spectroscopy-based technology for biometric and liveness verification. In Defense and Security. 287--295.Google ScholarGoogle Scholar
  108. T. Ojala, M. Pietikainen, and T. Maenpaa. 2002. Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 7 (2002), 971--987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. V. Ojansivu and J. Heikkilä. 2008. Blur insensitive texture classification using local phase quantization. In Image and Signal Processing. 236--243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. V. Ojansivu, E. Rahtu, and J. Heikkila. 2008. Rotation invariant local phase quantization for blur insensitive texture analysis. In Proceedings of the IEEE 19th International Conference on Pattern Recognition (ICPR'08). 1--4.Google ScholarGoogle Scholar
  111. S. Parthasaradhi, R. Derakhshani, L. Hornak, and S. Schuckers. 2004. Improvement of an algorithm for recognition of liveness using perspiration in fingerprint devices. Defense and Security 270--277.Google ScholarGoogle Scholar
  112. S. Parthasaradhi, R. Derakhshani, L. Hornak, and S. Schuckers. 2005. Time-series detection of perspiration as a liveness test in fingerprint devices. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 35, 3 (2005), 335--343. Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. N. Ratha, J. Connell, and R. Bolle. 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 3 (2001), 614--634. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. A. Rattani and N. Poh. 2013. Biometric system design under zero and non-zero effort attacks. In Proceedings of the IEEE International Conference on Biometrics (ICB'13).Google ScholarGoogle Scholar
  115. A. Rattani, N. Poh, and A. Ross. 2013. A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'13). 37--42.Google ScholarGoogle Scholar
  116. A. Rattani and A. Ross. 2014a. Automatic adaptation of fingerprint liveness detector to new spoof materials. In Proceedings of the IEEE International Conference on Biometrics (IJCB'14). 1--6.Google ScholarGoogle Scholar
  117. A. Rattani and A. Ross. 2014b. Minimizing the impact of spoof fabrication material on fingerprint liveness detector. In Proceedings of the 21st IEEE International Conference on Image Processing (ICIP'14).Google ScholarGoogle Scholar
  118. P. Reddy, A. Kumar, S. Rahman, and T. Mundra. 2007. A new method for fingerprint antispoofing using pulse oximetry. In Proceedings of the IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS'07). 1--6.Google ScholarGoogle Scholar
  119. P. Reddy, A. Kumar, S. Rahman, and T. Mundra. 2008. A new antispoofing approach for biometric devices. IEEE Transactions on Biomedical Circuits and Systems 2, 4 (2008), 328--337.Google ScholarGoogle ScholarCross RefCross Ref
  120. C. Roberts. 2007. Biometric attack vectors and defences. Computers and Security 26, 1 (2007), 14--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. R. Rodrigues, N. Kamat, and V. Govindaraju. 2010. Evaluation of biometric spoofing in a multimodal system. In Proceedings of the IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS'10).Google ScholarGoogle Scholar
  122. R. Rodrigues, L. Ling, and V. Govindaraju. 2009. Robustness of multimodal biometric fusion methods against spoof attacks. Journal of Visual Languages and Computing 20, 3 (2009), 169--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. A. Ross, J. Shah, and A. Jain. 2007. From template to image: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 4 (2007), 544--560. Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. M. Sandstrom. 2004. Liveness Detection in Fingerprint Recognition Systems. Ph.D. Thesis, Linköping.Google ScholarGoogle Scholar
  125. S. Schuckers. 2002. Spoofing and anti-spoofing measures. Information Security Technical Report 7, 4 (2002), 56--62.Google ScholarGoogle Scholar
  126. S. Schuckers, R. Derakhshani, S. Parthasaradhi, and L. Hornak. 2006. Liveness detection in biometric devices. Circuits, Signals, and Speech and Image Processing 35, 3 (2006), 335--343.Google ScholarGoogle Scholar
  127. S. Schuckers, L. Hornak, T. Norman, R. Derakhshani, and S. Parthasaradhi. 2002. Issues for liveness detection in biometrics. In Proceedings of the Biometric Consortium Conference.Google ScholarGoogle Scholar
  128. S. Schuckers, S. Parthasaradhi, R. Derakshani, and L. Hornak. 2004. Comparison of classification methods for time-series detection of perspiration as a liveness test in fingerprint devices. In Biometric Authentication. Springer, 256--263.Google ScholarGoogle Scholar
  129. S. Schuckers and B. Tan. 2006. Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing. In Proceedings of the Computer Vision and Pattern Recognition Workshop (CVPR'06). 26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. M. Sébastien, M. Nixon, and S. Li. Handbook of Biometric Anti-Spoofing. Springer, 2014.Google ScholarGoogle Scholar
  131. M. Sepasian, C. Mares, and W. Balachandran. 2010. Vitality detection in fingerprint identification. Information Science and Applications 4 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Y. Shin, I. Jun, H. Kim, and W. Shin. 2009. Performance assessment method for a forged fingerprint detection algorithm. In Advances in Information Security and Its Application.Google ScholarGoogle Scholar
  133. K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E. Newton, and B. Preneel. 2012. Criteria towards metrics for benchmarking template protection algorithms. In Proceedings of the 5th IAPR International Conference on Biometrics (ICB) (2012), 498--505.Google ScholarGoogle ScholarCross RefCross Ref
  134. Y. Singh and S. Singh. 2013. A taxonomy of biometric system vulnerabilities and defences. International Journal of Biometrics 5, 2 (2013), 137--159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. C. Sousedik and C. Busch. 2014. Presentation attack detection methods for fingerprint recognition systems: A survey. IET Biometrics (2014), 1--15.Google ScholarGoogle Scholar
  136. J. Staymates, M. Staymates, and G. Gillen. 2013. Evaluation of a drop-on-demand micro-dispensing system for development of artificial fingerprints. Analysis Methods, RSC 5, 1 (2013), 180--186.Google ScholarGoogle Scholar
  137. A. Stén, A. Kaseva, and T. Virtanen. 2003a. Fooling fingerprint scanners - biometric vulnerabilities of the precise biometrics 100 SC scanner. In Proceedings of the 4th Australian Information Warfare and IT Security Conference. 1--8.Google ScholarGoogle Scholar
  138. A. Stén, A. Kaseva, and T. Virtanen. 2003b. Fooling fingerprint scanners-biometric vulnerabilities of the precise biometrics 100 SC scanner. In Proceedings of 4th Australian Information Warfare and IT Security Conference, Vol. 2003 (2003), 333--340.Google ScholarGoogle Scholar
  139. B. Tan, A. Lewicke, D. Yambay, and S. Schuckers. 2010. The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'10). 1--6.Google ScholarGoogle Scholar
  140. B. Tan and S. Schuckers. 2005. Liveness detection using an intensity based approach in fingerprint scanner. In Proceedings of Biometrics Symposium (BSYM'05).Google ScholarGoogle Scholar
  141. B. Tan and S. Schuckers. 2010. Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise. Pattern Recognition 43, 8 (2010), 2845--2857. Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. L. Thalheim, J. Krissler, and P.-M. Ziegler. 2002. Body check: Biometric access protection devices and their programs put to the test. ct magazine 11 (November 2002). Available at http://www.pcmag.com/article2/0,2817,13919,00.asp.Google ScholarGoogle Scholar
  143. A. Tidu. 2010. Fingerprint Vitality Assessment by Pores Detection. Master of Science Thesis, University of Cagliari.Google ScholarGoogle Scholar
  144. B. Toth. 2005. Biometric liveness detection. Information Security Bulletin 10 (October 2005), 291--297.Google ScholarGoogle Scholar
  145. U. Uludag and A. Jain. 2004. Attacks on biometric systems: A case study in fingerprints. In Proceedings of SPIE-EI, Security, Seganography and Watermarking of Multimedia Contents VI.Google ScholarGoogle Scholar
  146. V. Valencia and C. Horn. 2003. Biometric liveness testing. In Biometrics. Osborne McGraw Hill, New York, 139--149.Google ScholarGoogle Scholar
  147. T. van der Putte and J. Keuning. 2001. Biometrical fingerprint recognition: Don't get your fingers burned. Smart Card Research and Advanced Applications. Springer US (2000), 289--303. Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. A. Wiehe, T. Søndrol, O. Olsen, and F. Skarderud. 2004. Attacking Fingerprint Sensors. Master thesis, Gjøvik University College.Google ScholarGoogle Scholar
  149. D. Willis and M. Lee. 1998. Six biometric devices point the finger at security. Computers and Security, Elsevier 17, 5 (1998), 410--411. Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. K. Yamada, H. Matsumoto, and T. Matsumoto. 2000. Can we make artificial fingers that fool fingerprint systems? Technical Report of IEICE and IPSJ (Part II). 12 (2000), 109--114.Google ScholarGoogle Scholar
  151. D. Yambay, L. Ghiani, P. Denti, G. Marcialis, F. Roli, and S. Schuckers. 2012. LivDet 2011—fingerprint liveness detection competition 2011. In Proceedings of the 15th International Conference on Image Analysis and Processing (ICIAP'11). 208--215.Google ScholarGoogle Scholar
  152. S. Yang, C. Wang, and S. Chen. 2011. A release-induced response for the rapid recognition of latent fingerprints and formation of inkjet-printed patterns. Angewandte Chemie 123, 16 (2011), 3790--3793.Google ScholarGoogle ScholarCross RefCross Ref
  153. W. Yau, H. Tran, and E. Teoh. 2008. Fake finger detection using an electrotactile display system. In Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision (ICARCV'08). 962--966.Google ScholarGoogle Scholar
  154. W. Yau, H. Tran, E. Teoh, and J. Wang. 2009. Fake finger detection by finger color change analysis. Advances in Biometrics 4642 (2009), 888--896. Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. S. Yoon, J. Feng, and A. Jain. 2010. Fingerprint alteration. In Proceedings of the 95th International Educational Conference of the International Association for Identification (IAI'10). 11--17.Google ScholarGoogle Scholar
  156. S. Yoon, J. Feng, and A. Jain. 2012. Altered fingerprints: Analysis and detection. IEEE Transactions on Pattern Analysis and Machine Intelligence 34, 3 (2012), 451--464. Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. Y. Zhang, J. Tian, X. Chen, X. Yang, and P. Shi. 2007. Fake finger detection based on thin-plate spline distortion model. In Proceedings of the International Conference on Biometrics (ICB'07). 742--749. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey on Antispoofing Schemes for Fingerprint Recognition Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 47, Issue 2
      January 2015
      827 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/2658850
      • Editor:
      • Sartaj Sahni
      Issue’s Table of Contents

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 November 2014
      • Accepted: 1 May 2014
      • Revised: 1 February 2014
      • Received: 1 October 2013
      Published in csur Volume 47, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader