Abstract
In the rapidly evolving domain of biometric security, the significance of Fingerprint Presentation Attack Detection (FPAD) has become increasingly paramount, given the susceptibility of Automatic Fingerprint Identification System (AFIS) to advanced spoofing techniques. This systematic literature review (SLR), spanning from 2022 to the second quarter of 2024, delves into the intricate challenges and burgeoning opportunities within FPAD. It focuses on innovative methodologies for detecting presentation attacks, the prevalent challenges posed by spoof fabrications (including materials like silicone, gelatine, and latex), and the exploration of potential advancements in FPAD effectiveness. The comprehensive analysis, based on a rigorous review protocol, scrutinizes 40 seminal peer-reviewed articles from the IEEE Xplore and ScienceDirect databases. This exploration uncovers a diverse range of strategies in FPAD, including software-centric and hardware-assisted approaches, each bearing unique implications for security enhancement and user privacy considerations. A pivotal finding of this review is the identification of critical research gaps, particularly in the development of algorithms capable of universal detection, the system’s adaptability to novel spoofing materials, and the ethical management of biometric data. This review provides a contemporary assessment of the current state of FPAD and establishes a foundation for future research directions. It highlights the need for continuous innovation in response to the evolving sophistication of spoofing techniques and the imperative of maintaining a balance between robust security measures and user-centric design in biometric systems. This review underscores the dynamic interplay between technological advancements, the ingenuity of attackers, and the ongoing endeavour to achieve reliable, user-friendly, and ethically responsible biometric security solutions.





Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Not applicable.
References
Abdulkareem AM, Gordon A (2023) Evaluating the usability and user acceptance of biometric authentication in different applications. Q J Emerg Technol Innov 8(2):1–10
Agarwal D, Bansal A (2022) Fingerprint liveness detection through fusion of pores perspiration and texture features. J King Saud Univ Comput Inf Sci 34(7):4089–4098. https://doi.org/10.1016/J.JKSUCI.2020.10.003
Agarwal R, Jalal AS, Arya KV (2020) A review on presentation attack detection system for fake fingerprint. Mod Phys Lett B 34(5):1–26. https://doi.org/10.1142/S021798492030001X
Agarwal S, Rattani A, Chowdary CR (2022) A-iLearn: an adaptive incremental learning model for spoof fingerprint detection. Mach Learn Appl 7:100210. https://doi.org/10.1016/j.mlwa.2021.100210
Agrawal, D., Belagal, M., Soudagar, M. A., Pardeshi, P. C., & Pendari, N. T (2022) Fingerprint de-blurring and Liveness Detection using FDeblur-GAN and Deep Learning Techniques. In: Proceedings of 4th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2022, 444–450. https://doi.org/10.1109/ICCCMLA56841.2022.9989223
Ahmad AS, Hassan R, Ahmad MN (2019) Fake fingerprint detection approaches: a systematic review. Int J Innov Technol Explor Eng (IJITEE) 5:1–8
Akeem A, Titilope E (2022) E-Identity and security: study of the role of identity management in sustainable development. Adv Soc Sci Res J 9(7):45–53
Akhtar Z, Micheloni C, Foresti GL (2015) Biometric liveness detection: challenges and research opportunities. IEEE Comput Reliab Soc 13(5):63–72
Aliu AA, Ariff NRM, Ametefe DS, John D (2023) Automatic classification and isolation of cracks on masonry surfaces using deep transfer learning and semantic segmentation. J Build Pathol Rehabil. https://doi.org/10.1007/s41024-023-00274-6
Almehmadi A (2022) A behavioral-based fingerprint liveness and willingness detection system. Appl Sci (Switzerland). https://doi.org/10.3390/APP122211460
Ametefe DS, Sarnin SS, Ali DM, Ametefe GD, John D, Aliu AA, Zoreno Z (2024) Automatic classification and segmentation of blast cells using deep transfer learning and active contours. Int J Lab Hematol. https://doi.org/10.1111/IJLH.14305
Ametefe DS, Sarnin SS, Ali DM, Muhamad WNW, Ametefe GD, John D, Aliu AA (2024) Enhancing fingerprint authentication: a systematic review of liveness detection methods against presentation attacks. J Inst Eng (India) Ser B. https://doi.org/10.1007/S40031-024-01066-3/METRICS
Ametefe DS, Sarnin SS, Ali DM, Muhammad ZZ (2023) Fingerprint pattern classification using deep transfer learning and data augmentation. V Comput 39(4):1703–1716. https://doi.org/10.1007/S00371-022-02437-X/METRICS
Ametefe DS, Sarnin SS, Ali DM, Zaheer MZ (2022) Fingerprint liveness detection schemes: a review on presentation attack. Comput Methods Biomech Biomed Eng: Imaging & Vis 10(2):217–240. https://doi.org/10.1080/21681163.2021.2012826
Bisztray, T., & Gruschka, N (2019) Privacy impact assessment: Comparing methodologies with a focus on practicality. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11875 LNCS, 3–19. https://doi.org/10.1007/978-3-030-35055-0_1
Carpenter D, McLeod A, Hicks C, Maasberg M (2018) Privacy and biometrics: an empirical examination of employee concerns. Inf Syst Front 20(1):91–110. https://doi.org/10.1007/S10796-016-9667-5/METRICS
Cartwright S, Liu H, Raddats C (2021) Strategic use of social media within business-to-business (B2B) marketing: a systematic literature review. Ind Mark Manage 97:35–58. https://doi.org/10.1016/J.INDMARMAN.2021.06.005
Casula R, Micheletto M, Orrú G, Marcialis GL, Roli F (2023) Towards realistic fingerprint presentation attacks: the screenSpoof method. Pattern Recogn Lett 171:192–200. https://doi.org/10.1016/J.PATREC.2022.09.002
Casula R, Orru G, Marrone S, Gagliardini U, Marcialis GL, Sansone C (2024) Realistic fingerprint presentation attacks based on an adversarial approach. IEEE Trans Inf Forensics Secur 19:863–877. https://doi.org/10.1109/TIFS.2023.3327663
Cavoukian A, Chibba M, Stoianov A (2012) Advances in biometric encryption: taking privacy by design from academic research to deployment. Rev Policy Res 29(1):37–61. https://doi.org/10.1111/J.1541-1338.2011.00537.X
Chang J-S, Jang E, Choi Y, Song M, Lee S, Kang G-J, Kim J, Song U, Cho C-Y, Ko G, Hwang H, Lee J, Lee H-S, Kwon Y-I, Seo K, Kim T, Lim H-W, Song S, Lee J-Y, Kwak SU (2023) A 1.05-A/m Minimum magnetic field strength single-chip, fully integrated biometric smart card SoC achieving 792.5-ms transaction time with anti-spoofing fingerprint authentication. IEEE J Sol State Circuits 58(1):155–166. https://doi.org/10.1109/JSSC.2022.3220081
Chen J, Yuan C, Cui C, Xia Z, Sun X, Akilan T (2022) A lightweight convolutional neural network with representation self-challenge for fingerprint liveness detection. Comput Mater Continua 73(1):719–733. https://doi.org/10.32604/cmc.2022.027984
Chen M, Yuan C, Lv Y (2023) Fingerprint liveness detection approaches: a survey. Int J Auton Adapt Commun Syst 16(6):564–583. https://doi.org/10.1504/IJAACS.2023.134830
Chen, Z.-S., Pulungan, R., Li, Y.-H., Raswa, F. H., Harjoko, A., Wang, J.-C., Kinarta, I. Y., & Lee, C.-T (2023) Fingerprint Liveness Detection Using Handcrafted Feature Descriptors and Neural Network. 619–621. https://doi.org/10.1109/GCCE56475.2022.10014245
Chhabra M, Ravulakollu KK, Kumar M, Sharma A, Nayyar A (2023) Improving automated latent fingerprint detection and segmentation using deep convolutional neural network. Neural Comput Appl 35(9):6471–6497. https://doi.org/10.1007/S00521-022-07894-Y/METRICS
Chingovska I, Dos Anjos AR (2015) On the use of client identity information for face antispoofing. IEEE Trans Inf Forensics Secur 10(4):787–796. https://doi.org/10.1109/TIFS.2015.2400392
Chugh T, Jain AK (2021) Fingerprint spoof detector generalization. IEEE Trans Inf Forensics Secur 16:42–55. https://doi.org/10.1109/TIFS.2020.2990789
Contreras RC, Nonato LG, Boaventura M, Boaventura IAG, Dos Santos FL, Zanin RB, Viana MS (2022) A new multi-filter framework for texture image representation improvement using set of pattern descriptors to fingerprint liveness detection. IEEE Access. https://doi.org/10.1109/access.2022.3218335
Dah J, Hussin N (2021) A conceptual framework of a streamlined extended technology acceptance model for mobile application adoption. Int J Soc Sci Res. https://doi.org/10.5296/ijssr.v9i2.18649
Dargan S, Kumar M (2020) A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Syst Appl 143:113114. https://doi.org/10.1016/J.ESWA.2019.113114
Dixon P (2017) A failure to do no harm india’s aadhaar biometric id program and its inability to protect privacy in relation to measures in Europe and the U.S. Health Technol 7(4):539–567. https://doi.org/10.1007/S12553-017-0202-6/FIGURES/1
Drahanský M, Kanich O, Březinová E (2017) Challenges for fingerprint recognition—Spoofing, skin diseases, and environmental effects: is fingerprint recognition really so reliable and secure. Adv Comput Vis Pattern Recognit. https://doi.org/10.1007/978-3-319-50673-9_4/COVER
Dubey RK, Goh J, Thing VLL (2016) Fingerprint liveness detection from single image using low level features and shape analysis. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2016.2535899
Engelsma, J. J., & Jain, A. K (2019) Generalizing Fingerprint Spoof Detector: Learning a One-Class Classifier. In: 2019 International Conference on Biometrics, ICB 2019. https://doi.org/10.1109/ICB45273.2019.8987319
Farid F, Elkhodr M, Sabrina F, Ahamed F, Gide E (2021) A smart biometric identity management framework for personalised IoT and cloud computing-based healthcare services. Sensors 21(2):552. https://doi.org/10.3390/S21020552
Fei H, Huang C, Wu S, Wang Z, Jia Z, Feng J (2024) Fingerprint presentation attack detection by region decomposition. IEEE Trans Inf Forensics Secur 19:3974–3985. https://doi.org/10.1109/TIFS.2024.3372813
Fei J, Xia Z, Yu P, Xiao F (2020) Adversarial attacks on fingerprint liveness detection. Eurasip J Imag Video Process 2020(1):1–11. https://doi.org/10.1186/s13640-020-0490-z
Ferrari, N. (2019). Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices. https://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975
Ghiani L, Hadid A, Marcialis GL, Roli F (2017) Fingerprint liveness detection using local texture features. IET Biom 6(3):224–231. https://doi.org/10.1049/iet-bmt.2016.0007
Gona AK (2022) IoT-based multimodal liveness detection using the fusion of ECG and fingerprint. Int J Pervasive Comput Commun. https://doi.org/10.1108/IJPCC-10-2021-0248
Grosz SA, Jain AK (2023) SpoofGAN: synthetic fingerprint spoof images. IEEE Trans Inf Forensics Secur 18:730–743. https://doi.org/10.1109/TIFS.2022.3227762
Grünenberg K (2022) Wearing someone else’s face: biometric technologies, anti-spoofing and the fear of the unknown. Ethnos 87(2):223–240. https://doi.org/10.1080/00141844.2019.1705869
Haleem A, Javaid M, Pratap Singh R, Suman R (2022) Medical 4.0 technologies for healthcare: features, capabilities, and applications. Internet of Things Cyber Phys Syst 2:12–30. https://doi.org/10.1016/J.IOTCPS.2022.04.001
Hammad M, Wang K (2019) Parallel score fusion of ECG and fingerprint for human authentication based on convolution. Comput Secur 81:107–122. https://doi.org/10.1016/j.cose.2018.11.003
Hemmes J, Fulton S, Dressler J, Kirkman S (2023) Trust and risk assessment in IoT networks. Comput Netw Commun. https://doi.org/10.37256/CNC.1120232667
Jain AK, Deb D, Engelsma JJ (2022) Biometrics: trust, but verify. IEEE Trans Biom, Behav Identity Sci 4(3):303–323. https://doi.org/10.1109/TBIOM.2021.3115465
Jain AK, Nandakumar K, Ross A (2016) 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recogn Lett 79:80–105. https://doi.org/10.1016/J.PATREC.2015.12.013
John D, Hussin N, Shahibi MS, Ahmad M, Hashim H, Ametefe DS (2023) A systematic review on the factors governing precision agriculture adoption among small-scale farmers. Outlook Agric. https://doi.org/10.1177/00307270231205640
Jomaa RM, Islam MS, Mathkour H, Al-Ahmadi S (2022) A multilayer system to boost the robustness of fingerprint authentication against presentation attacks by fusion with heart-signal. J King Saud Univ Comput Inf Sci 34(8):5132–5143. https://doi.org/10.1016/j.jksuci.2022.01.004
Joshi M, Mazumdar B, Dey S (2024) A novel minutiae-oriented approach for partial fingerprint-based MasterPrint mitigation. Pattern Recogn 145:109935. https://doi.org/10.1016/J.PATCOG.2023.109935
Kang T, Oh KI, Lee JJ, Kim SE, Lee W, Oh W, Kim SE (2023) Anti-spoofing for fingerprint recognition using electric body pulse response. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3308654
Kaur J, Jindal N (2019) A secure image encryption algorithm based on fractional transforms and scrambling in combination with multimodal biometric keys. Multimed Tool and Appl 78(9):11585–11606. https://doi.org/10.1007/S11042-018-6701-2/METRICS
Khan HU, Malik MZ, Nazir S, Khan F (2023) Utilizing bio metric system for enhancing cyber security in banking sector: a systematic analysis. IEEE Access 11:80181–80198. https://doi.org/10.1109/ACCESS.2023.3298824
Kim C, Lee KC, Costello FJ (2020) The intention of passengers towards repeat use of biometric security for sustainable airport management. Sustainability 12(11):4528. https://doi.org/10.3390/SU12114528
Kim W (2017) Fingerprint liveness detection using local coherence patterns. IEEE Signal Process Lett 24(1):51–55. https://doi.org/10.1109/LSP.2016.2636158
Kindt, E. J (2013) Privacy and data protection issues of biometric applications: A comparative legal analysis. In Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer Netherlands. https://doi.org/10.1007/978-94-007-7522-0/COVER
Kokal S, Vanamala M, Dave R (2023) Deep learning and machine learning, better together than Apart: a review on biometrics mobile authentication. J Cybersecur Priv 3(2):227–258. https://doi.org/10.3390/JCP3020013
Kugler, M. B (2019) From Identification to Identity Theft: Public Perceptions of Biometric Privacy Harms. UC Irvine Law Review, 10. https://heinonline.org/HOL/Page?handle=hein.journals/ucirvlre10&id=111&div=&collection=
Leaton Gray, S (2021) Biometrics Institute 20th Anniversary Report. Biometrics Institute: London, UK. . https://www.biometricsinstitute.org/sdm_downloads/20th-anniversary-report/
Lee, S. H., Lim, M. Y., Park, S. H., Yoo, H. J., & Lee, Y. K (2022) Towards cross-materials: fingerprint liveness detection based on style transfer. In: International Conference on ICT Convergence, 2022-October, 1332–1334. https://doi.org/10.1109/ICTC55196.2022.9952430
Lee YK, Jeong J, Kang D (2022) An effective orchestration for fingerprint presentation attack detection. Electron (Switzerland). https://doi.org/10.3390/electronics11162515
Li H, Ramachandra R (2023) Deep learning based fingerprint presentation attack detection: a comprehensive survey. ACM Comput Surv J 1:1–29
Li J, Chen Y, Zhang E (2022) Comprehensive edge direction descriptor for fingerprint liveness detection. Signal Process: Imag Commun. https://doi.org/10.1016/j.image.2021.116603
Liang Y, Samtani S, Guo B, Yu Z (2020) Behavioral biometrics for continuous authentication in the Internet-of-Things Era: an artificial intelligence perspective. IEEE Internet Things J 7(9):9128–9143. https://doi.org/10.1109/JIOT.2020.3004077
Lien CW, Vhaduri S (2023) Challenges and opportunities of biometric user authentication in the age of IoT: a survey. ACM Comput Surv. https://doi.org/10.1145/3603705
Lim, M. Y., Kim, T. Y., Park, J. E., Hong, P. M., & Lee, Y. K (2022) A central point-based analysis for fingerprint liveness detection. In: International Conference on ICT Convergence, 2022-October, 1307–1309. https://doi.org/10.1109/ICTC55196.2022.9952772
Liu F, Kong Z, Liu H, Zhang W, Shen L (2022) Fingerprint presentation attack detection by channel-wise feature denoising. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2022.3197058
Liu YP, Zuo W, Liang R, Sun H, Li Z (2023) Prototype-guided autoencoder for OCT-based fingerprint presentation attack detection. IEEE Trans Inf Forensics Secur 18:3461–3475. https://doi.org/10.1109/TIFS.2023.3282386
Matthew, P., & Anderson, M (2016) Developing coercion detection solutions for biometrie security. In: Proceedings of 2016 SAI Computing Conference, SAI 2016, 1123–1130. https://doi.org/10.1109/SAI.2016.7556118
McStay A (2020) Emotional AI, soft biometrics and the surveillance of emotional life: an unusual consensus on privacy. Big Data Soc. https://doi.org/10.1177/2053951720904386
Mehboob R, Dawood H (2022) DEHFF – A hybrid approach based on distinctively encoded fingerprint features for live fingerprint detection. Biomed Signal Process Control 75:103572. https://doi.org/10.1016/J.BSPC.2022.103572
Mehboob R, Dawood H, Dawood H (2023) An encoded histogram of ridge bifurcations and contours for fingerprint presentation attack detection. Pattern Recogn 143:109782. https://doi.org/10.1016/J.PATCOG.2023.109782
Melo WS, MacHado RCS, Carmo LFRC (2018) Using physical context-based authentication against external attacks: models and protocols. Secur Commun Netw. https://doi.org/10.1155/2018/6590928
Moolla Y, Darlow L, Sharma A, Singh A, van der Merwe J (2019) Optical coherence tomography for fingerprint presentation attack detection. Adv Comput Vis Pattern Recognit. https://doi.org/10.1007/978-3-319-92627-8_3/COVER
Noh S, Kim J, Lee S, Kang Y, Park C, Shin Y (2022) Broken heart: privacy leakage analysis on ECG-based authentication schemes. Secur Commun Netw. https://doi.org/10.1155/2022/7997509
Ozkiper, Z. I., Turgut, Z., Atmaca, T., & Aydin, M. A (2022) Fingerprint Liveness Detection Using Deep Learning. In: Proceedings—2022 International Conference on Future Internet of Things and Cloud, FiCloud 2022, 129–135. https://doi.org/10.1109/FICLOUD57274.2022.00025
Pedraza J, Patricio MA, de Asís A, Molina JM (2013) Privacy-by-design rules in face recognition system. Neurocomputing 109:49–55. https://doi.org/10.1016/J.NEUCOM.2012.03.023
Priesnitz J, Casula R, Kolberg J, Fang M, Madhu A, Rathgeb C, Marcialis GL, Damer N, Busch C (2024) Mobile contactless fingerprint presentation attack detection: generalizability and explainability. IEEE Trans Biom, Behav, Identity Sci. https://doi.org/10.1109/TBIOM.2024.3403770
Rajendra Kumar R (2023) Literature review on improving IoT security using machine and deep learning technique. Tuijin Jishu J Propuls Technol 44(2):735–757. https://doi.org/10.52783/TJJPT.V44.I2.491
Raswa, F. H., Kinarta, I. Y., Pulungan, R., Harjoko, A., Lee, C., Li, Y. H., & Wang, J. C (2022) Fingerprint Liveness Detection Using Denoised-Bayes Shrink Wavelet and Aggregated Local Spatial and Frequency Features. In: Proceedings—International Conference on Machine Learning and Cybernetics, 2022-September, 103–108. https://doi.org/10.1109/ICMLC56445.2022.9941303
Rebera AP, Bonfanti ME, Venier S (2014) Societal and ethical implications of anti-spoofing technologies in biometrics. Sci Eng Ethics 20(1):155–169. https://doi.org/10.1007/S11948-013-9440-9/METRICS
Reshma G, Prasanna BT, Murthy HSN, Murthy TSN, Parthiban S, Sangeetha M (2023) Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment. Soft Comput. https://doi.org/10.1007/S00500-023-08226-5/METRICS
Rui Z, Yan Z (2019) A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7:5994–6009. https://doi.org/10.1109/ACCESS.2018.2889996
S. Ametefe, D., S. Seroja, S., & M. Ali, D (2021) Fingerprint presentation attack detection using deep transfer learning and densenet201 network / Divine S. Ametefe, Suzi S. Seroja, and Darmawaty M. Ali. https://jeesr.uitm.edu.my/
Senanu Ametefe D, Seroja Sarnin S, Mohd Ali D, John DB, Aliu AA (2024) Fingerprint multiple-class classifier: performance evaluation on known and unknown fingerprint spoofing materials. Int J Biom 16(2):113–132. https://doi.org/10.1504/IJBM.2024.137088
Sepas-Moghaddam A, Pereira F, Correia PL (2018) Light field-based face presentation attack detection: reviewing, benchmarking and one step further. IEEE Trans Inf Forensics Secur 13(7):1696–1709. https://doi.org/10.1109/TIFS.2018.2799427
Shaheed K, Mao A, Qureshi I, Abbas Q, Kumar M, Zhang X (2022) Finger-vein presentation attack detection using depthwise separable convolution neural network. Expert Syst Appl 198:116786. https://doi.org/10.1016/J.ESWA.2022.116786
Shaheed K, Szczuko P, Kumar M, Qureshi I, Abbas Q, Ullah I (2024) Deep learning techniques for biometric security: a systematic review of presentation attack detection systems. Eng Appl Artif Intell 129:107569. https://doi.org/10.1016/J.ENGAPPAI.2023.107569
Sharma D, Selwal A (2021) FinPAD: state-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives. Pattern Recogn Lett 152:225–252. https://doi.org/10.1016/J.PATREC.2021.10.013
Sharma D, Selwal A (2023) SFincBuster: spoofed fingerprint buster via incremental learning using leverage bagging classifier. Image Vis Comput 135:104713. https://doi.org/10.1016/J.IMAVIS.2023.104713
Sharma RP, Dey S (2018) Fingerprint liveness detection using local quality features. Vis Comput. https://doi.org/10.1007/s00371-018-01618-x
Shekar, B. H., & Kumari, V (2022) Deep Learning with DCT for Liveliness Detection. In: 9th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering, UPCON 2022. https://doi.org/10.1109/UPCON56432.2022.9986380
Singh M, Singh R, Ross A (2019) A comprehensive overview of biometric fusion. Inf Fus 52:187–205. https://doi.org/10.1016/J.INFFUS.2018.12.003
Sittirit, N., Mongkolwat, P., Thaipisutikul, T., Supratak, A., Chen, Z. S., & Wang, J. C (2022) Fingerprint Liveness Detection with Voting Ensemble Classifier. In: 6th International Conference on Information Technology, InCIT 2022, 105–110. https://doi.org/10.1109/INCIT56086.2022.10067668
Skowron M, Janicki A, Mazurczyk W (2020) Traffic fingerprinting attacks on internet of things using machine learning. IEEE Access 8:20386–20400. https://doi.org/10.1109/ACCESS.2020.2969015
Sun H, Zhang Y, Chen P, Wang H, Liang R (2023) Internal structure attention network for fingerprint presentation attack detection from optical coherence tomography. IEEE Trans Biom, Behav Identity Sci 5(4):524–537. https://doi.org/10.1109/TBIOM.2023.3293910
Sun H, Zhang Y, Chen P, Wang H, Liu YP, Liang R (2023) A new approach in automated fingerprint presentation attack detection using optical coherence tomography. IEEE Trans Inf Forensics Secur 18:4243–4257. https://doi.org/10.1109/TIFS.2023.3293414
Tang, B., Wang, Z., Bin, Y., Dou, Q., Yang, Y., & Shen, H. T (2024) Ensemble Diversity Facilitates Adversarial Transferability. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 24377–24386. https://github.com/tangbwb/SMER
Tanwar S, Tyagi S, Kumar N, Obaidat MS (2018) Ethical, legal, and social implications of biometric technologies. Biom Based Phys Cybersecur Syst. https://doi.org/10.1007/978-3-319-98734-7_21/COVER
Thakur K, Vyas P (2019) Social impact of biometric technology: myth and implications of biometrics: issues and challenges advances in biometrics: modern methods and implementation. Strategies. https://doi.org/10.1007/978-3-030-30436-2_7/COVER
Vargas Barona, A. T., Espejel Rivera, M. A., Castro-Ortega, R., Toxqui-Quitl, C., & Padilla-Vivanco, A (2023) Vein pattern classification using convolutional neuronal network and moment invariants 12674, 364–370. https://doi.org/10.1117/12.2677811
Verma A, Garg AK, College E, Gupta A, Akbar M, Yadav AK, Yadav D, Gupta A (2022) Fingerprint presentation attack detection using referential quality metrics and minutiae count. Wirel Pers Commun 4(127):3347–3361. https://doi.org/10.21203/rs.3.rs-792415/v1
Verma A, Gupta VK, Goel S (2023) Transient liveness factor an attempt towards identification of innate fingerprint under varying spoof sample. Int J Adv Intell Paradigms 26(1):14–27. https://doi.org/10.1504/IJAIP.2023.133253
Vinoth KM, Venkatachalam K, Prabu P, Almutairi A, Abouhawwash M (2021) Secure biometric authentication with de-duplication on distributed cloud storage. PeerJ Comput Sci 7:e569. https://doi.org/10.7717/PEERJ-CS.569
Wang Z, Yang Y, Li J, Zhu X (2022) Universal adversarial perturbations generative network. World Wide Web 25(4):1725–1746. https://doi.org/10.1007/S11280-022-01058-7/METRICS
Wu C, He K, Chen J, Zhao Z, Du R (2022) Toward robust detection of puppet attacks via characterizing fingertip-touch behaviors. IEEE Trans Dependable Secure Comput 19(6):4002–4018. https://doi.org/10.1109/TDSC.2021.3116552
Xia Z, Yuan C, Lv R, Sun X, Xiong NN, Shi YQ (2020) A novel weber local binary descriptor for fingerprint liveness detection. IEEE Trans Syste Man and Cybern: Syst 50(4):1526–1536. https://doi.org/10.1109/TSMC.2018.2874281
Yu Z, Qin Y, Li X, Zhao C, Lei Z, Zhao G (2023) Deep learning for face anti-spoofing: a survey. IEEE Trans Pattern Anal Mach Intell 45(5):5609–5631. https://doi.org/10.1109/TPAMI.2022.3215850
Yuan, C., & Cui, B (2022) Adversarial Attack with Adaptive Gradient Variance for Deep Fake Fingerprint Detection. In: 2022 IEEE 24th International Workshop on Multimedia Signal Processing, MMSP 2022. https://doi.org/10.1109/MMSP55362.2022.9949122
Yuan C, Jiao S, Sun X, Jonathan Wu (2022) MFFFLD: a Multimodal-feature-fusion-based fingerprint liveness detection. IEEE Trans Cognit Dev Syst 14(2):648–661. https://doi.org/10.1109/TCDS.2021.3062624
Yuan C, Sun X, Lv R (2016) Fingerprint liveness detection based on multi-scale LPQ and PCA. Ch Commun 13(7):60–65. https://doi.org/10.1109/CC.2016.7559076
Yuan C, Yu P, Xia Z, Sun X, Wu QMJ (2022) FLD-SRC: fingerprint liveness detection for AFIS based on spatial ridges continuity. IEEE J Sel Top Sign Proces 16(4):817–827. https://doi.org/10.1109/JSTSP.2022.3174655
Zaeri N, Qasim R (2023) Thermal image identification against pose and expression variations using deep learning. J Eng Res. https://doi.org/10.1016/J.JER.2023.10.043
Zhang W, Liu H, Liu F, Ramachandra R (2024) A uniform representation model for OCT-based fingerprint presentation attack detection and reconstruction. Pattern Recogn 145:109981. https://doi.org/10.1016/J.PATCOG.2023.109981
Zhang Y, Yu S, Pu S, Wang Y, Wang K, Sun H, Wang H (2023) 3D CNN-based fingerprint anti-spoofing through optical coherence tomography. Heliyon 9(9):e20052. https://doi.org/10.1016/J.HELIYON.2023.E20052
Zhou, S., Möser, M., Yang, Z., Adida, B., Holz, T., Xiang, J., Goldfeder, S., Cao, Y., Plattner, M., Qin, X., Yang, Z., Chator, A., Zhang, Y., Zhang, Y., Wang, G., Wang, X., Zhu, H., King, S. T., Zou, W., & Shi, W. (2020). An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. In arXiv. https://www.usenix.org/conference/usenixsecurity20/technical-sessions
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
D.S.A performed conceptualization, methodology, visualization, writing—original draft preparation, and manuscript revision; S.S.S conducted supervision, methodology, writing—reviewing, proofreading of manuscript, and manuscript revision; D.M.A participated in supervision, methodology, writing—reviewing, editing, and manuscript revision; G.D.A presented curation of literature, analysis and proofreading of manuscript, visualization, validation, and manuscript revision; D.J carried out investigation, curation of literature, proofreading of manuscript, editing, visualization, and manuscript revision; N.H prepared curation of literature, editing, proofreading of manuscript, and manuscript revision.
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Human or animal rights
Not applicable.
Informed consent
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ametefe, D.S., Sarnin, S.S., Ali, D.M. et al. Advancements and challenges in fingerprint presentation attack detection: a systematic literature review. Neural Comput & Applic 37, 1797–1819 (2025). https://doi.org/10.1007/s00521-024-10423-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-024-10423-8