Skip to main content
Log in

Advancements and challenges in fingerprint presentation attack detection: a systematic literature review

  • Review
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

In the rapidly evolving domain of biometric security, the significance of Fingerprint Presentation Attack Detection (FPAD) has become increasingly paramount, given the susceptibility of Automatic Fingerprint Identification System (AFIS) to advanced spoofing techniques. This systematic literature review (SLR), spanning from 2022 to the second quarter of 2024, delves into the intricate challenges and burgeoning opportunities within FPAD. It focuses on innovative methodologies for detecting presentation attacks, the prevalent challenges posed by spoof fabrications (including materials like silicone, gelatine, and latex), and the exploration of potential advancements in FPAD effectiveness. The comprehensive analysis, based on a rigorous review protocol, scrutinizes 40 seminal peer-reviewed articles from the IEEE Xplore and ScienceDirect databases. This exploration uncovers a diverse range of strategies in FPAD, including software-centric and hardware-assisted approaches, each bearing unique implications for security enhancement and user privacy considerations. A pivotal finding of this review is the identification of critical research gaps, particularly in the development of algorithms capable of universal detection, the system’s adaptability to novel spoofing materials, and the ethical management of biometric data. This review provides a contemporary assessment of the current state of FPAD and establishes a foundation for future research directions. It highlights the need for continuous innovation in response to the evolving sophistication of spoofing techniques and the imperative of maintaining a balance between robust security measures and user-centric design in biometric systems. This review underscores the dynamic interplay between technological advancements, the ingenuity of attackers, and the ongoing endeavour to achieve reliable, user-friendly, and ethically responsible biometric security solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Not applicable.

References

  1. Abdulkareem AM, Gordon A (2023) Evaluating the usability and user acceptance of biometric authentication in different applications. Q J Emerg Technol Innov 8(2):1–10

    MATH  Google Scholar 

  2. Agarwal D, Bansal A (2022) Fingerprint liveness detection through fusion of pores perspiration and texture features. J King Saud Univ Comput Inf Sci 34(7):4089–4098. https://doi.org/10.1016/J.JKSUCI.2020.10.003

    Article  MATH  Google Scholar 

  3. Agarwal R, Jalal AS, Arya KV (2020) A review on presentation attack detection system for fake fingerprint. Mod Phys Lett B 34(5):1–26. https://doi.org/10.1142/S021798492030001X

    Article  MATH  Google Scholar 

  4. Agarwal S, Rattani A, Chowdary CR (2022) A-iLearn: an adaptive incremental learning model for spoof fingerprint detection. Mach Learn Appl 7:100210. https://doi.org/10.1016/j.mlwa.2021.100210

    Article  MATH  Google Scholar 

  5. Agrawal, D., Belagal, M., Soudagar, M. A., Pardeshi, P. C., & Pendari, N. T (2022) Fingerprint de-blurring and Liveness Detection using FDeblur-GAN and Deep Learning Techniques. In: Proceedings of 4th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2022, 444–450. https://doi.org/10.1109/ICCCMLA56841.2022.9989223

  6. Ahmad AS, Hassan R, Ahmad MN (2019) Fake fingerprint detection approaches: a systematic review. Int J Innov Technol Explor Eng (IJITEE) 5:1–8

    MATH  Google Scholar 

  7. Akeem A, Titilope E (2022) E-Identity and security: study of the role of identity management in sustainable development. Adv Soc Sci Res J 9(7):45–53

    Google Scholar 

  8. Akhtar Z, Micheloni C, Foresti GL (2015) Biometric liveness detection: challenges and research opportunities. IEEE Comput Reliab Soc 13(5):63–72

    MATH  Google Scholar 

  9. Aliu AA, Ariff NRM, Ametefe DS, John D (2023) Automatic classification and isolation of cracks on masonry surfaces using deep transfer learning and semantic segmentation. J Build Pathol Rehabil. https://doi.org/10.1007/s41024-023-00274-6

    Article  Google Scholar 

  10. Almehmadi A (2022) A behavioral-based fingerprint liveness and willingness detection system. Appl Sci (Switzerland). https://doi.org/10.3390/APP122211460

    Article  MATH  Google Scholar 

  11. Ametefe DS, Sarnin SS, Ali DM, Ametefe GD, John D, Aliu AA, Zoreno Z (2024) Automatic classification and segmentation of blast cells using deep transfer learning and active contours. Int J Lab Hematol. https://doi.org/10.1111/IJLH.14305

    Article  Google Scholar 

  12. Ametefe DS, Sarnin SS, Ali DM, Muhamad WNW, Ametefe GD, John D, Aliu AA (2024) Enhancing fingerprint authentication: a systematic review of liveness detection methods against presentation attacks. J Inst Eng (India) Ser B. https://doi.org/10.1007/S40031-024-01066-3/METRICS

    Article  Google Scholar 

  13. Ametefe DS, Sarnin SS, Ali DM, Muhammad ZZ (2023) Fingerprint pattern classification using deep transfer learning and data augmentation. V Comput 39(4):1703–1716. https://doi.org/10.1007/S00371-022-02437-X/METRICS

    Article  Google Scholar 

  14. Ametefe DS, Sarnin SS, Ali DM, Zaheer MZ (2022) Fingerprint liveness detection schemes: a review on presentation attack. Comput Methods Biomech Biomed Eng: Imaging & Vis 10(2):217–240. https://doi.org/10.1080/21681163.2021.2012826

    Article  Google Scholar 

  15. Bisztray, T., & Gruschka, N (2019) Privacy impact assessment: Comparing methodologies with a focus on practicality. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11875 LNCS, 3–19. https://doi.org/10.1007/978-3-030-35055-0_1

  16. Carpenter D, McLeod A, Hicks C, Maasberg M (2018) Privacy and biometrics: an empirical examination of employee concerns. Inf Syst Front 20(1):91–110. https://doi.org/10.1007/S10796-016-9667-5/METRICS

    Article  MATH  Google Scholar 

  17. Cartwright S, Liu H, Raddats C (2021) Strategic use of social media within business-to-business (B2B) marketing: a systematic literature review. Ind Mark Manage 97:35–58. https://doi.org/10.1016/J.INDMARMAN.2021.06.005

    Article  Google Scholar 

  18. Casula R, Micheletto M, Orrú G, Marcialis GL, Roli F (2023) Towards realistic fingerprint presentation attacks: the screenSpoof method. Pattern Recogn Lett 171:192–200. https://doi.org/10.1016/J.PATREC.2022.09.002

    Article  MATH  Google Scholar 

  19. Casula R, Orru G, Marrone S, Gagliardini U, Marcialis GL, Sansone C (2024) Realistic fingerprint presentation attacks based on an adversarial approach. IEEE Trans Inf Forensics Secur 19:863–877. https://doi.org/10.1109/TIFS.2023.3327663

    Article  Google Scholar 

  20. Cavoukian A, Chibba M, Stoianov A (2012) Advances in biometric encryption: taking privacy by design from academic research to deployment. Rev Policy Res 29(1):37–61. https://doi.org/10.1111/J.1541-1338.2011.00537.X

    Article  Google Scholar 

  21. Chang J-S, Jang E, Choi Y, Song M, Lee S, Kang G-J, Kim J, Song U, Cho C-Y, Ko G, Hwang H, Lee J, Lee H-S, Kwon Y-I, Seo K, Kim T, Lim H-W, Song S, Lee J-Y, Kwak SU (2023) A 1.05-A/m Minimum magnetic field strength single-chip, fully integrated biometric smart card SoC achieving 792.5-ms transaction time with anti-spoofing fingerprint authentication. IEEE J Sol State Circuits 58(1):155–166. https://doi.org/10.1109/JSSC.2022.3220081

    Article  Google Scholar 

  22. Chen J, Yuan C, Cui C, Xia Z, Sun X, Akilan T (2022) A lightweight convolutional neural network with representation self-challenge for fingerprint liveness detection. Comput Mater Continua 73(1):719–733. https://doi.org/10.32604/cmc.2022.027984

    Article  MATH  Google Scholar 

  23. Chen M, Yuan C, Lv Y (2023) Fingerprint liveness detection approaches: a survey. Int J Auton Adapt Commun Syst 16(6):564–583. https://doi.org/10.1504/IJAACS.2023.134830

    Article  MATH  Google Scholar 

  24. Chen, Z.-S., Pulungan, R., Li, Y.-H., Raswa, F. H., Harjoko, A., Wang, J.-C., Kinarta, I. Y., & Lee, C.-T (2023) Fingerprint Liveness Detection Using Handcrafted Feature Descriptors and Neural Network. 619–621. https://doi.org/10.1109/GCCE56475.2022.10014245

  25. Chhabra M, Ravulakollu KK, Kumar M, Sharma A, Nayyar A (2023) Improving automated latent fingerprint detection and segmentation using deep convolutional neural network. Neural Comput Appl 35(9):6471–6497. https://doi.org/10.1007/S00521-022-07894-Y/METRICS

    Article  MATH  Google Scholar 

  26. Chingovska I, Dos Anjos AR (2015) On the use of client identity information for face antispoofing. IEEE Trans Inf Forensics Secur 10(4):787–796. https://doi.org/10.1109/TIFS.2015.2400392

    Article  MATH  Google Scholar 

  27. Chugh T, Jain AK (2021) Fingerprint spoof detector generalization. IEEE Trans Inf Forensics Secur 16:42–55. https://doi.org/10.1109/TIFS.2020.2990789

    Article  MATH  Google Scholar 

  28. Contreras RC, Nonato LG, Boaventura M, Boaventura IAG, Dos Santos FL, Zanin RB, Viana MS (2022) A new multi-filter framework for texture image representation improvement using set of pattern descriptors to fingerprint liveness detection. IEEE Access. https://doi.org/10.1109/access.2022.3218335

    Article  MATH  Google Scholar 

  29. Dah J, Hussin N (2021) A conceptual framework of a streamlined extended technology acceptance model for mobile application adoption. Int J Soc Sci Res. https://doi.org/10.5296/ijssr.v9i2.18649

    Article  MATH  Google Scholar 

  30. Dargan S, Kumar M (2020) A comprehensive survey on the biometric recognition systems based on physiological and behavioral modalities. Expert Syst Appl 143:113114. https://doi.org/10.1016/J.ESWA.2019.113114

    Article  MATH  Google Scholar 

  31. Dixon P (2017) A failure to do no harm india’s aadhaar biometric id program and its inability to protect privacy in relation to measures in Europe and the U.S. Health Technol 7(4):539–567. https://doi.org/10.1007/S12553-017-0202-6/FIGURES/1

    Article  Google Scholar 

  32. Drahanský M, Kanich O, Březinová E (2017) Challenges for fingerprint recognition—Spoofing, skin diseases, and environmental effects: is fingerprint recognition really so reliable and secure. Adv Comput Vis Pattern Recognit. https://doi.org/10.1007/978-3-319-50673-9_4/COVER

    Article  Google Scholar 

  33. Dubey RK, Goh J, Thing VLL (2016) Fingerprint liveness detection from single image using low level features and shape analysis. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2016.2535899

    Article  MATH  Google Scholar 

  34. Engelsma, J. J., & Jain, A. K (2019) Generalizing Fingerprint Spoof Detector: Learning a One-Class Classifier. In: 2019 International Conference on Biometrics, ICB 2019. https://doi.org/10.1109/ICB45273.2019.8987319

  35. Farid F, Elkhodr M, Sabrina F, Ahamed F, Gide E (2021) A smart biometric identity management framework for personalised IoT and cloud computing-based healthcare services. Sensors 21(2):552. https://doi.org/10.3390/S21020552

    Article  Google Scholar 

  36. Fei H, Huang C, Wu S, Wang Z, Jia Z, Feng J (2024) Fingerprint presentation attack detection by region decomposition. IEEE Trans Inf Forensics Secur 19:3974–3985. https://doi.org/10.1109/TIFS.2024.3372813

    Article  MATH  Google Scholar 

  37. Fei J, Xia Z, Yu P, Xiao F (2020) Adversarial attacks on fingerprint liveness detection. Eurasip J Imag Video Process 2020(1):1–11. https://doi.org/10.1186/s13640-020-0490-z

    Article  MATH  Google Scholar 

  38. Ferrari, N. (2019). Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices. https://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36975

  39. Ghiani L, Hadid A, Marcialis GL, Roli F (2017) Fingerprint liveness detection using local texture features. IET Biom 6(3):224–231. https://doi.org/10.1049/iet-bmt.2016.0007

    Article  MATH  Google Scholar 

  40. Gona AK (2022) IoT-based multimodal liveness detection using the fusion of ECG and fingerprint. Int J Pervasive Comput Commun. https://doi.org/10.1108/IJPCC-10-2021-0248

    Article  MATH  Google Scholar 

  41. Grosz SA, Jain AK (2023) SpoofGAN: synthetic fingerprint spoof images. IEEE Trans Inf Forensics Secur 18:730–743. https://doi.org/10.1109/TIFS.2022.3227762

    Article  Google Scholar 

  42. Grünenberg K (2022) Wearing someone else’s face: biometric technologies, anti-spoofing and the fear of the unknown. Ethnos 87(2):223–240. https://doi.org/10.1080/00141844.2019.1705869

    Article  Google Scholar 

  43. Haleem A, Javaid M, Pratap Singh R, Suman R (2022) Medical 4.0 technologies for healthcare: features, capabilities, and applications. Internet of Things Cyber Phys Syst 2:12–30. https://doi.org/10.1016/J.IOTCPS.2022.04.001

    Article  MATH  Google Scholar 

  44. Hammad M, Wang K (2019) Parallel score fusion of ECG and fingerprint for human authentication based on convolution. Comput Secur 81:107–122. https://doi.org/10.1016/j.cose.2018.11.003

    Article  MATH  Google Scholar 

  45. Hemmes J, Fulton S, Dressler J, Kirkman S (2023) Trust and risk assessment in IoT networks. Comput Netw Commun. https://doi.org/10.37256/CNC.1120232667

    Article  Google Scholar 

  46. Jain AK, Deb D, Engelsma JJ (2022) Biometrics: trust, but verify. IEEE Trans Biom, Behav Identity Sci 4(3):303–323. https://doi.org/10.1109/TBIOM.2021.3115465

    Article  Google Scholar 

  47. Jain AK, Nandakumar K, Ross A (2016) 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recogn Lett 79:80–105. https://doi.org/10.1016/J.PATREC.2015.12.013

    Article  MATH  Google Scholar 

  48. John D, Hussin N, Shahibi MS, Ahmad M, Hashim H, Ametefe DS (2023) A systematic review on the factors governing precision agriculture adoption among small-scale farmers. Outlook Agric. https://doi.org/10.1177/00307270231205640

    Article  Google Scholar 

  49. Jomaa RM, Islam MS, Mathkour H, Al-Ahmadi S (2022) A multilayer system to boost the robustness of fingerprint authentication against presentation attacks by fusion with heart-signal. J King Saud Univ Comput Inf Sci 34(8):5132–5143. https://doi.org/10.1016/j.jksuci.2022.01.004

    Article  MATH  Google Scholar 

  50. Joshi M, Mazumdar B, Dey S (2024) A novel minutiae-oriented approach for partial fingerprint-based MasterPrint mitigation. Pattern Recogn 145:109935. https://doi.org/10.1016/J.PATCOG.2023.109935

    Article  MATH  Google Scholar 

  51. Kang T, Oh KI, Lee JJ, Kim SE, Lee W, Oh W, Kim SE (2023) Anti-spoofing for fingerprint recognition using electric body pulse response. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3308654

    Article  MATH  Google Scholar 

  52. Kaur J, Jindal N (2019) A secure image encryption algorithm based on fractional transforms and scrambling in combination with multimodal biometric keys. Multimed Tool and Appl 78(9):11585–11606. https://doi.org/10.1007/S11042-018-6701-2/METRICS

    Article  MATH  Google Scholar 

  53. Khan HU, Malik MZ, Nazir S, Khan F (2023) Utilizing bio metric system for enhancing cyber security in banking sector: a systematic analysis. IEEE Access 11:80181–80198. https://doi.org/10.1109/ACCESS.2023.3298824

    Article  MATH  Google Scholar 

  54. Kim C, Lee KC, Costello FJ (2020) The intention of passengers towards repeat use of biometric security for sustainable airport management. Sustainability 12(11):4528. https://doi.org/10.3390/SU12114528

    Article  MATH  Google Scholar 

  55. Kim W (2017) Fingerprint liveness detection using local coherence patterns. IEEE Signal Process Lett 24(1):51–55. https://doi.org/10.1109/LSP.2016.2636158

    Article  MATH  Google Scholar 

  56. Kindt, E. J (2013) Privacy and data protection issues of biometric applications: A comparative legal analysis. In Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer Netherlands. https://doi.org/10.1007/978-94-007-7522-0/COVER

  57. Kokal S, Vanamala M, Dave R (2023) Deep learning and machine learning, better together than Apart: a review on biometrics mobile authentication. J Cybersecur Priv 3(2):227–258. https://doi.org/10.3390/JCP3020013

    Article  MATH  Google Scholar 

  58. Kugler, M. B (2019) From Identification to Identity Theft: Public Perceptions of Biometric Privacy Harms. UC Irvine Law Review, 10. https://heinonline.org/HOL/Page?handle=hein.journals/ucirvlre10&id=111&div=&collection=

  59. Leaton Gray, S (2021) Biometrics Institute 20th Anniversary Report. Biometrics Institute: London, UK. . https://www.biometricsinstitute.org/sdm_downloads/20th-anniversary-report/

  60. Lee, S. H., Lim, M. Y., Park, S. H., Yoo, H. J., & Lee, Y. K (2022) Towards cross-materials: fingerprint liveness detection based on style transfer. In: International Conference on ICT Convergence, 2022-October, 1332–1334. https://doi.org/10.1109/ICTC55196.2022.9952430

  61. Lee YK, Jeong J, Kang D (2022) An effective orchestration for fingerprint presentation attack detection. Electron (Switzerland). https://doi.org/10.3390/electronics11162515

    Article  MATH  Google Scholar 

  62. Li H, Ramachandra R (2023) Deep learning based fingerprint presentation attack detection: a comprehensive survey. ACM Comput Surv J 1:1–29

    MATH  Google Scholar 

  63. Li J, Chen Y, Zhang E (2022) Comprehensive edge direction descriptor for fingerprint liveness detection. Signal Process: Imag Commun. https://doi.org/10.1016/j.image.2021.116603

    Article  MATH  Google Scholar 

  64. Liang Y, Samtani S, Guo B, Yu Z (2020) Behavioral biometrics for continuous authentication in the Internet-of-Things Era: an artificial intelligence perspective. IEEE Internet Things J 7(9):9128–9143. https://doi.org/10.1109/JIOT.2020.3004077

    Article  MATH  Google Scholar 

  65. Lien CW, Vhaduri S (2023) Challenges and opportunities of biometric user authentication in the age of IoT: a survey. ACM Comput Surv. https://doi.org/10.1145/3603705

    Article  MATH  Google Scholar 

  66. Lim, M. Y., Kim, T. Y., Park, J. E., Hong, P. M., & Lee, Y. K (2022) A central point-based analysis for fingerprint liveness detection. In: International Conference on ICT Convergence, 2022-October, 1307–1309. https://doi.org/10.1109/ICTC55196.2022.9952772

  67. Liu F, Kong Z, Liu H, Zhang W, Shen L (2022) Fingerprint presentation attack detection by channel-wise feature denoising. IEEE Trans Inf Forensics Secur. https://doi.org/10.1109/TIFS.2022.3197058

    Article  MATH  Google Scholar 

  68. Liu YP, Zuo W, Liang R, Sun H, Li Z (2023) Prototype-guided autoencoder for OCT-based fingerprint presentation attack detection. IEEE Trans Inf Forensics Secur 18:3461–3475. https://doi.org/10.1109/TIFS.2023.3282386

    Article  MATH  Google Scholar 

  69. Matthew, P., & Anderson, M (2016) Developing coercion detection solutions for biometrie security. In: Proceedings of 2016 SAI Computing Conference, SAI 2016, 1123–1130. https://doi.org/10.1109/SAI.2016.7556118

  70. McStay A (2020) Emotional AI, soft biometrics and the surveillance of emotional life: an unusual consensus on privacy. Big Data Soc. https://doi.org/10.1177/2053951720904386

    Article  MATH  Google Scholar 

  71. Mehboob R, Dawood H (2022) DEHFF – A hybrid approach based on distinctively encoded fingerprint features for live fingerprint detection. Biomed Signal Process Control 75:103572. https://doi.org/10.1016/J.BSPC.2022.103572

    Article  MATH  Google Scholar 

  72. Mehboob R, Dawood H, Dawood H (2023) An encoded histogram of ridge bifurcations and contours for fingerprint presentation attack detection. Pattern Recogn 143:109782. https://doi.org/10.1016/J.PATCOG.2023.109782

    Article  MATH  Google Scholar 

  73. Melo WS, MacHado RCS, Carmo LFRC (2018) Using physical context-based authentication against external attacks: models and protocols. Secur Commun Netw. https://doi.org/10.1155/2018/6590928

    Article  MATH  Google Scholar 

  74. Moolla Y, Darlow L, Sharma A, Singh A, van der Merwe J (2019) Optical coherence tomography for fingerprint presentation attack detection. Adv Comput Vis Pattern Recognit. https://doi.org/10.1007/978-3-319-92627-8_3/COVER

    Article  Google Scholar 

  75. Noh S, Kim J, Lee S, Kang Y, Park C, Shin Y (2022) Broken heart: privacy leakage analysis on ECG-based authentication schemes. Secur Commun Netw. https://doi.org/10.1155/2022/7997509

    Article  MATH  Google Scholar 

  76. Ozkiper, Z. I., Turgut, Z., Atmaca, T., & Aydin, M. A (2022) Fingerprint Liveness Detection Using Deep Learning. In: Proceedings—2022 International Conference on Future Internet of Things and Cloud, FiCloud 2022, 129–135. https://doi.org/10.1109/FICLOUD57274.2022.00025

  77. Pedraza J, Patricio MA, de Asís A, Molina JM (2013) Privacy-by-design rules in face recognition system. Neurocomputing 109:49–55. https://doi.org/10.1016/J.NEUCOM.2012.03.023

    Article  Google Scholar 

  78. Priesnitz J, Casula R, Kolberg J, Fang M, Madhu A, Rathgeb C, Marcialis GL, Damer N, Busch C (2024) Mobile contactless fingerprint presentation attack detection: generalizability and explainability. IEEE Trans Biom, Behav, Identity Sci. https://doi.org/10.1109/TBIOM.2024.3403770

    Article  Google Scholar 

  79. Rajendra Kumar R (2023) Literature review on improving IoT security using machine and deep learning technique. Tuijin Jishu J Propuls Technol 44(2):735–757. https://doi.org/10.52783/TJJPT.V44.I2.491

    Article  MATH  Google Scholar 

  80. Raswa, F. H., Kinarta, I. Y., Pulungan, R., Harjoko, A., Lee, C., Li, Y. H., & Wang, J. C (2022) Fingerprint Liveness Detection Using Denoised-Bayes Shrink Wavelet and Aggregated Local Spatial and Frequency Features. In: Proceedings—International Conference on Machine Learning and Cybernetics, 2022-September, 103–108. https://doi.org/10.1109/ICMLC56445.2022.9941303

  81. Rebera AP, Bonfanti ME, Venier S (2014) Societal and ethical implications of anti-spoofing technologies in biometrics. Sci Eng Ethics 20(1):155–169. https://doi.org/10.1007/S11948-013-9440-9/METRICS

    Article  Google Scholar 

  82. Reshma G, Prasanna BT, Murthy HSN, Murthy TSN, Parthiban S, Sangeetha M (2023) Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment. Soft Comput. https://doi.org/10.1007/S00500-023-08226-5/METRICS

    Article  Google Scholar 

  83. Rui Z, Yan Z (2019) A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7:5994–6009. https://doi.org/10.1109/ACCESS.2018.2889996

    Article  MATH  Google Scholar 

  84. S. Ametefe, D., S. Seroja, S., & M. Ali, D (2021) Fingerprint presentation attack detection using deep transfer learning and densenet201 network / Divine S. Ametefe, Suzi S. Seroja, and Darmawaty M. Ali. https://jeesr.uitm.edu.my/

  85. Senanu Ametefe D, Seroja Sarnin S, Mohd Ali D, John DB, Aliu AA (2024) Fingerprint multiple-class classifier: performance evaluation on known and unknown fingerprint spoofing materials. Int J Biom 16(2):113–132. https://doi.org/10.1504/IJBM.2024.137088

    Article  Google Scholar 

  86. Sepas-Moghaddam A, Pereira F, Correia PL (2018) Light field-based face presentation attack detection: reviewing, benchmarking and one step further. IEEE Trans Inf Forensics Secur 13(7):1696–1709. https://doi.org/10.1109/TIFS.2018.2799427

    Article  MATH  Google Scholar 

  87. Shaheed K, Mao A, Qureshi I, Abbas Q, Kumar M, Zhang X (2022) Finger-vein presentation attack detection using depthwise separable convolution neural network. Expert Syst Appl 198:116786. https://doi.org/10.1016/J.ESWA.2022.116786

    Article  Google Scholar 

  88. Shaheed K, Szczuko P, Kumar M, Qureshi I, Abbas Q, Ullah I (2024) Deep learning techniques for biometric security: a systematic review of presentation attack detection systems. Eng Appl Artif Intell 129:107569. https://doi.org/10.1016/J.ENGAPPAI.2023.107569

    Article  Google Scholar 

  89. Sharma D, Selwal A (2021) FinPAD: state-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives. Pattern Recogn Lett 152:225–252. https://doi.org/10.1016/J.PATREC.2021.10.013

    Article  MATH  Google Scholar 

  90. Sharma D, Selwal A (2023) SFincBuster: spoofed fingerprint buster via incremental learning using leverage bagging classifier. Image Vis Comput 135:104713. https://doi.org/10.1016/J.IMAVIS.2023.104713

    Article  Google Scholar 

  91. Sharma RP, Dey S (2018) Fingerprint liveness detection using local quality features. Vis Comput. https://doi.org/10.1007/s00371-018-01618-x

    Article  MATH  Google Scholar 

  92. Shekar, B. H., & Kumari, V (2022) Deep Learning with DCT for Liveliness Detection. In: 9th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering, UPCON 2022. https://doi.org/10.1109/UPCON56432.2022.9986380

  93. Singh M, Singh R, Ross A (2019) A comprehensive overview of biometric fusion. Inf Fus 52:187–205. https://doi.org/10.1016/J.INFFUS.2018.12.003

    Article  MATH  Google Scholar 

  94. Sittirit, N., Mongkolwat, P., Thaipisutikul, T., Supratak, A., Chen, Z. S., & Wang, J. C (2022) Fingerprint Liveness Detection with Voting Ensemble Classifier. In: 6th International Conference on Information Technology, InCIT 2022, 105–110. https://doi.org/10.1109/INCIT56086.2022.10067668

  95. Skowron M, Janicki A, Mazurczyk W (2020) Traffic fingerprinting attacks on internet of things using machine learning. IEEE Access 8:20386–20400. https://doi.org/10.1109/ACCESS.2020.2969015

    Article  MATH  Google Scholar 

  96. Sun H, Zhang Y, Chen P, Wang H, Liang R (2023) Internal structure attention network for fingerprint presentation attack detection from optical coherence tomography. IEEE Trans Biom, Behav Identity Sci 5(4):524–537. https://doi.org/10.1109/TBIOM.2023.3293910

    Article  MATH  Google Scholar 

  97. Sun H, Zhang Y, Chen P, Wang H, Liu YP, Liang R (2023) A new approach in automated fingerprint presentation attack detection using optical coherence tomography. IEEE Trans Inf Forensics Secur 18:4243–4257. https://doi.org/10.1109/TIFS.2023.3293414

    Article  MATH  Google Scholar 

  98. Tang, B., Wang, Z., Bin, Y., Dou, Q., Yang, Y., & Shen, H. T (2024) Ensemble Diversity Facilitates Adversarial Transferability. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 24377–24386. https://github.com/tangbwb/SMER

  99. Tanwar S, Tyagi S, Kumar N, Obaidat MS (2018) Ethical, legal, and social implications of biometric technologies. Biom Based Phys Cybersecur Syst. https://doi.org/10.1007/978-3-319-98734-7_21/COVER

    Article  MATH  Google Scholar 

  100. Thakur K, Vyas P (2019) Social impact of biometric technology: myth and implications of biometrics: issues and challenges advances in biometrics: modern methods and implementation. Strategies. https://doi.org/10.1007/978-3-030-30436-2_7/COVER

    Article  MATH  Google Scholar 

  101. Vargas Barona, A. T., Espejel Rivera, M. A., Castro-Ortega, R., Toxqui-Quitl, C., & Padilla-Vivanco, A (2023) Vein pattern classification using convolutional neuronal network and moment invariants 12674, 364–370. https://doi.org/10.1117/12.2677811

  102. Verma A, Garg AK, College E, Gupta A, Akbar M, Yadav AK, Yadav D, Gupta A (2022) Fingerprint presentation attack detection using referential quality metrics and minutiae count. Wirel Pers Commun 4(127):3347–3361. https://doi.org/10.21203/rs.3.rs-792415/v1

    Article  MATH  Google Scholar 

  103. Verma A, Gupta VK, Goel S (2023) Transient liveness factor an attempt towards identification of innate fingerprint under varying spoof sample. Int J Adv Intell Paradigms 26(1):14–27. https://doi.org/10.1504/IJAIP.2023.133253

    Article  MATH  Google Scholar 

  104. Vinoth KM, Venkatachalam K, Prabu P, Almutairi A, Abouhawwash M (2021) Secure biometric authentication with de-duplication on distributed cloud storage. PeerJ Comput Sci 7:e569. https://doi.org/10.7717/PEERJ-CS.569

    Article  Google Scholar 

  105. Wang Z, Yang Y, Li J, Zhu X (2022) Universal adversarial perturbations generative network. World Wide Web 25(4):1725–1746. https://doi.org/10.1007/S11280-022-01058-7/METRICS

    Article  MATH  Google Scholar 

  106. Wu C, He K, Chen J, Zhao Z, Du R (2022) Toward robust detection of puppet attacks via characterizing fingertip-touch behaviors. IEEE Trans Dependable Secure Comput 19(6):4002–4018. https://doi.org/10.1109/TDSC.2021.3116552

    Article  MATH  Google Scholar 

  107. Xia Z, Yuan C, Lv R, Sun X, Xiong NN, Shi YQ (2020) A novel weber local binary descriptor for fingerprint liveness detection. IEEE Trans Syste Man and Cybern: Syst 50(4):1526–1536. https://doi.org/10.1109/TSMC.2018.2874281

    Article  MATH  Google Scholar 

  108. Yu Z, Qin Y, Li X, Zhao C, Lei Z, Zhao G (2023) Deep learning for face anti-spoofing: a survey. IEEE Trans Pattern Anal Mach Intell 45(5):5609–5631. https://doi.org/10.1109/TPAMI.2022.3215850

    Article  MATH  Google Scholar 

  109. Yuan, C., & Cui, B (2022) Adversarial Attack with Adaptive Gradient Variance for Deep Fake Fingerprint Detection. In: 2022 IEEE 24th International Workshop on Multimedia Signal Processing, MMSP 2022. https://doi.org/10.1109/MMSP55362.2022.9949122

  110. Yuan C, Jiao S, Sun X, Jonathan Wu (2022) MFFFLD: a Multimodal-feature-fusion-based fingerprint liveness detection. IEEE Trans Cognit Dev Syst 14(2):648–661. https://doi.org/10.1109/TCDS.2021.3062624

    Article  MATH  Google Scholar 

  111. Yuan C, Sun X, Lv R (2016) Fingerprint liveness detection based on multi-scale LPQ and PCA. Ch Commun 13(7):60–65. https://doi.org/10.1109/CC.2016.7559076

    Article  MATH  Google Scholar 

  112. Yuan C, Yu P, Xia Z, Sun X, Wu QMJ (2022) FLD-SRC: fingerprint liveness detection for AFIS based on spatial ridges continuity. IEEE J Sel Top Sign Proces 16(4):817–827. https://doi.org/10.1109/JSTSP.2022.3174655

    Article  MATH  Google Scholar 

  113. Zaeri N, Qasim R (2023) Thermal image identification against pose and expression variations using deep learning. J Eng Res. https://doi.org/10.1016/J.JER.2023.10.043

    Article  MATH  Google Scholar 

  114. Zhang W, Liu H, Liu F, Ramachandra R (2024) A uniform representation model for OCT-based fingerprint presentation attack detection and reconstruction. Pattern Recogn 145:109981. https://doi.org/10.1016/J.PATCOG.2023.109981

    Article  MATH  Google Scholar 

  115. Zhang Y, Yu S, Pu S, Wang Y, Wang K, Sun H, Wang H (2023) 3D CNN-based fingerprint anti-spoofing through optical coherence tomography. Heliyon 9(9):e20052. https://doi.org/10.1016/J.HELIYON.2023.E20052

    Article  MATH  Google Scholar 

  116. Zhou, S., Möser, M., Yang, Z., Adida, B., Holz, T., Xiang, J., Goldfeder, S., Cao, Y., Plattner, M., Qin, X., Yang, Z., Chator, A., Zhang, Y., Zhang, Y., Wang, G., Wang, X., Zhu, H., King, S. T., Zou, W., & Shi, W. (2020). An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. In arXiv. https://www.usenix.org/conference/usenixsecurity20/technical-sessions

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

D.S.A performed conceptualization, methodology, visualization, writing—original draft preparation, and manuscript revision; S.S.S conducted supervision, methodology, writing—reviewing, proofreading of manuscript, and manuscript revision; D.M.A participated in supervision, methodology, writing—reviewing, editing, and manuscript revision; G.D.A presented curation of literature, analysis and proofreading of manuscript, visualization, validation, and manuscript revision; D.J carried out investigation, curation of literature, proofreading of manuscript, editing, visualization, and manuscript revision; N.H prepared curation of literature, editing, proofreading of manuscript, and manuscript revision.

Corresponding authors

Correspondence to Divine Senanu Ametefe, Suzi Seroja Sarnin or Darmawaty Mohd Ali.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Human or animal rights

Not applicable.

Informed consent

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ametefe, D.S., Sarnin, S.S., Ali, D.M. et al. Advancements and challenges in fingerprint presentation attack detection: a systematic literature review. Neural Comput & Applic 37, 1797–1819 (2025). https://doi.org/10.1007/s00521-024-10423-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-024-10423-8

Keywords