skip to main content
research-article

A Survey on Antispoofing Schemes for Fingerprint Recognition Systems

Published: 12 November 2014 Publication History

Abstract

Several issues related to the vulnerability of fingerprint recognition systems to attacks have been highlighted in the biometrics literature. One such vulnerability involves the use of artificial fingers, where materials such as Play-Doh, silicone, and gelatin are inscribed with fingerprint ridges. Researchers have demonstrated that some commercial fingerprint recognition systems can be deceived when these artificial fingers are placed on the sensor; that is, the system successfully processes the ensuing fingerprint images, thereby allowing an adversary to spoof the fingerprints of another individual. However, at the same time, several countermeasures that discriminate between live fingerprints and spoof artifacts have been proposed. While some of these antispoofing schemes are hardware based, several software-based approaches have been proposed as well. In this article, we review the literature and present the state of the art in fingerprint antispoofing.

References

[1]
A. Abhyankar. 2004. A wavelet-based approach to detecting liveness in fingerprint scanners. 278--286.
[2]
A. Abhyankar and S. Schuckers. 2006. Fingerprint liveness detection using local ridge frequencies and multiresolution texture analysis techniques. In Proceedings of the IEEE International Conference on Image Processing (ICIP'06). 321--324.
[3]
A. Abhyankar and S. Schuckers. 2009. Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recognition 42 (2009), 452--464.
[4]
A. Abhyankar and S. Schuckers. 2010. Modular decomposition of fingerprint time series captures for the liveness check. International Journal of Computer and Electrical Engineering 2, 3 (2010), 1793--8163.
[5]
A. Adler and S. Schuckers. 2009. Security and liveness: Overview. In Encyclopedia of Biometrics.
[6]
Z. Akhtar, B. Biggio, G. Fumera, and G. Marcialis. 2011a. Robustness of multimodal biometric systems under spoof attacks. In Proceedings of the International Conference on Image Analysis and Processing (ICIAP'11). Springer, 159--168.
[7]
Z. Akhtar, G. Fumera, G. Marcialis, and F. Roli. 2011b. Robustness evaluation of biometric systems under spoof attacks. In Proceedings of the International Conference on Image Analysis and Processing (ICIAP'11). Springer, 159--168.
[8]
A. Al-Ajlan. 2013. Survey on fingerprint liveness detection. In Proceedings of the IEEE International Workshop on Biometrics and Forensics (IWBF'13). 1--5.
[9]
A. Antonelli, R. Cappelli, D. Maio, and D. Maltoni. 2006. Fake finger detection by skin distortion analysis. IEEE Transactions on Information Forensics and Security 1, 3 (2006), 360--373.
[10]
D. Baldisserra, A. Franco, D. Maio, and D. Maltoni. 2005. Fake fingerprint detection by odor analysis. Advances in Biometrics 3832, (2005), 265--272.
[11]
C. Barral and A. Tria. 2009. Fake fingers in fingerprint recognition: Glycerin supersedes gelatin. Formal to Practical Security. Springer Berlin Heidelberg, 5458 (2009), 57--69.
[12]
B. Biggio, Z. Akhtar, G. Fumera, G. Marcialis, and F. Roli. 2012. Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics 1, 1 (2012), 11--24.
[13]
J. Blommé. 2003. Evaluation of Biometric Security Systems against Artificial Fingers. Ph.D. Thesis, Linköping University.
[14]
A. Bossen, R. Lehmann, and C. Meier. 2010. Internal fingerprint identification with optical coherence tomography. IEEE Photonics Technology Letters 22, 7 (2010), 507--509.
[15]
E. Bowden-Peters, R. Phan, J. Whitley, and D. Parish. 2012. Fooling a liveness-detecting capacitive fingerprint scanner. In Cryptography and Security: From Theory to Applications. Springer, 484--490.
[16]
C. Brislawn, J. Bradley, R. Onyshczak, and T. Hopper. 1996. FBI compression standard for digitized fingerprint images. In Proceedings of the International Symposium on Optical Science, Engineering, and Instrumentation. 344--355.
[17]
BSI. 2010. Fingerprint spoof detection protection profile FSDPP v1.8. (2010). Available at https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/ReportePP/pp0063b_pdf.pdf?_blob=publicationFile.
[18]
R. Cappelli, D. Maio, and D. Maltoni. 2001. Modelling plastic distortion in fingerprint images. In Advances in Pattern Recognition -(ICAPR'01). Springer, 371--378.
[19]
S. Chang, Y. Cheng, Kirill V. Larin, Y. Mao, S. Sherif, and C. Flueraru. 2008. Optical coherence tomography used for security and fingerprint-sensing applications. IET Image Processing 2, 1 (2008), 48--58.
[20]
J. Chen, S. Shan, C. He, G. Zhao, M. Pietikainen, X. Chen, and W. Gao. 2010. WLD: A robust local image descriptor. IEEE Transactions on Pattern Analysis and Machine Intelligence 32, 9 (2010), 1705--1720.
[21]
J. Chen, S. Shan, G. Zhao, X. Chen, W. Gao, and M. Pietikainen. 2008. A robust descriptor based on Webers law. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR'08). 1--7.
[22]
Y. Cheng and K. Larin. 2006. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis. Applied Optics 45, 36 (2006), 9238--9245.
[23]
H. Choi, R. Kang, K. Choi, and J. Kim. 2007. Aliveness detection of fingerprints using multiple static features. World Academy of Science, Engineering and Technology 2, 3 (2007).
[24]
K. Choi, H. Choi, R. Kang, and J. Kim. 2007. Aliveness detection of fingerprint using multiple static features. World Academy of Science, Engineering and Technology 28 (2007), 157--162.
[25]
P. Coli, G. Marcialis, and F. Roli. 2007a. Power spectrum-based fingerprint vitality detection. In Proceedings of the IEEE International Workshop on Automatic Identification Advanced Technologies (AutoID'07).
[26]
P. Coli, G. Marcialis, and F. Roli. 2007b. Vitality detection from fingerprint images: A critical survey. Lecture Notes in Computer Science 4642 (2007), 722--731.
[27]
B. DeCann, B. Tan, and S. Schuckers. 2009. A novel region based liveness detection approach for fingerprint scanners. In Proceedings of the IAPR/IEEE International Conference on Biometrics (ICB'09). Springer, 627--636.
[28]
R. Derakhshani, S. Schuckers, L. Hornak, and L. OGorman. 2001. Neural network-based approach for detection of liveness in fingerprint scanners. In Proceedings of the International Conference on Artificial Intelligence. 1099--1105.
[29]
R. Derakhshani, S. Schuckers, L. Hornak, and L. OGorman. 2003a. Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanner. Pattern Recognition 36, 2 (2003), 383--396.
[30]
R. Derakhshani, S. Schuckers, L. Hornak, and L. O'Gorman. 2003b. Determination of vitality from non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recognition 36 (2003), 383--396.
[31]
S. Dubey, A. Tulsi, S. Chandra, and M. Singh. 2007. Fingerprint detection using full-field swept-source optical coherence tomography. Applied Physics Letters 91, 18 (2007), 181106--181106.
[32]
S. Elliott, S. Modi, L. Maccarone, M. Young, C. Jin, and H. Kim. 2007. Image quality and minutiae count comparison for genuine and artificial fingerprints. In Proceedings of the 41st Annual IEEE International Carnahan Conference on Security Technology. 30--36.
[33]
Y. Endo, M. Hirabayashi, and T. Matsumoto. 2003. Can we make artificial fingers that fool fingerprint systems? (Part V). Joho Shori Gakkai Kenkyu Hokoku 18 (2003), 251--256.
[34]
M. Espinoza and C. Champod. 2011a. Risk evaluation for spoofing against a sensor supplied with liveness detection. Forensic Science International 204, 1 (2011), 162--168.
[35]
M. Espinoza and C. Champod. 2011b. Using the number of pores on fingerprint images to detect spoofing attacks. In Proceedings of the IEEE International Conference on Hand-Based Biometrics (ICHB'11). 1--5.
[36]
M. Espinoza, C. Champod, and P. Margot. 2011. Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic Science International 204 (January 2011), 41--49.
[37]
J. Feng, A. Jain, and A. Ross. 2009. Fingerprint Alteration. MSU Technical Report, MSU-CSE-09-30.
[38]
T. Fladsrud and R. Sollie. 2004. Circumvention of fingerprint scanners. (December 2004). NISlab-Norwegian Information Security of Gjøvik University College, Norway. Available at http://master.fladsrud.com/dokumenter/Circumvention%20of%20fingerprint%20scanners.pdf.
[39]
A. Franco and D. Maltoni. 2008. Fingerprint synthesis and spoof detection. Advances in Biometrics (2008), 385--406.
[40]
J. Galbally, F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia. 2009. Fingerprint liveness detection based on quality measures. In Biometrics, Identity and Security (BIds). 1--8.
[41]
J. Galbally, F. Alonso-Fernandez, J. Fiérrez, and J. Ortega-Garcia. 2012. A high performance fingerprint liveness detection method based on quality related features. Future Generation of Computer Systems (2012), 311--321.
[42]
J. Galbally, R. Cappelli, A. Lumini, D. Maltoni, and J. Fierrez. 2008. Fake fingertip generation from a minutiae template. In Proceedings of the 19th International Conference on Pattern Recognition (ICPR'08). 1--4.
[43]
J. Galbally, J. Fierrez, and J. Ortega-Garcia. 2007. Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection. In Proc. Spanish Workshop on Biometrics (June 2007).
[44]
J. Galbally, J. Fierrez, F. Alonso-Fernandez, and M. Martinez-Diaz. 2011. Evaluation of direct attacks to fingerprint verification systems. Telecommunication Systems 47, 3--4 (2011), 243--254.
[45]
M. Garris and R. McCabe. 2000. NIST special database 27: Fingerprint minutiae from latent and matching tenprint images. Available at http://www. itl. nist. gov/iaui/894.03/databases.
[46]
B. Geller, J. Almog, and P. Margot. 2001. Fingerprint forgery: A survey. Journal of Forensic Sciences 46, 3 (2001), 731.
[47]
B. Geller, J. Almog, P. Margot, and E. Springer. 1999. A chronological review of fingerprint forgery. Journal of Forensic Sciences 44 (1999), 963--968.
[48]
L. Ghiani, A. Hadid, G. Marcialis, and F. Roli. 2013. Fingerprint liveness detection using binarized statistical image features. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications, and Systems (BTAS'13).
[49]
L. Ghiani, G. Marcialis, and F. Roli. 2012a. Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms. In Proceedings of the ACM Workshop on Multimedia and Security.
[50]
L. Ghiani, G. Marcialis, and F. Roli. 2012b. Fingerprint liveness detection by local phase quantization. In Proceedings of the 21st International Conference on Pattern Recognition (ICPR'12). 1--4.
[51]
L. Ghiani, D. Yambay, V. Mura, S. Tocco, G. Marcialis, F. Roli, and S. Schuckers. 2013. LivDet fingerprint liveness detection competition 2013. In Proceedings of the IEEE International Conference on Biometrics (ICB'13). 1--6.
[52]
C. Gottschlich, E. Marasco, A. Yang, and B. Cukic. 2014. Fingerprint liveness detection based on histograms of invariant gradients. In Proceedings of the IEEE International Conference on Biometrics (IJCB'14). 1--7.
[53]
D. Gragnaniello, G. Poggi, C. Sansone, and L. Verdoliva. 2013. Fingerprint liveness detection based on Weber local image descriptor. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs'13). 1--5.
[54]
J. Han, T. Kadowaki, K. Sato, and M. Shikida. 1999. Thermal analysis of fingerprint sensor having a microheater array. IEEE Micromechatronics and Human Science (MHS) (1999), 199--205.
[55]
J. Han, Z. Tan, K. Sato, and M. Shikida. 2005. Thermal characterization of micro heater arrays on a polyimide film substrate for fingerprint sensing applications. Journal of Micromechanics and Microengineering 15, 2 (2005), 282.
[56]
S. Harrison, J. Beasley, B. Carroll, and R. Baraniuk. 2004. Classification of images. OpenStax-CNX.
[57]
C. Hill. 2001. Risk of Masquerade Arising from the Storage of Biometrics. Bachelor of Science thesis, the Department of Computer Science, Australian National University (2001).
[58]
A. Holland-Minkley. 2006. Biometric devices and fingerprint spoofing Retrieved from http://www2.washjeff. edu/users/ahollandminkley/biometric/index.html.
[59]
A. Hyvärinen, J. Hurri, and P. Hoyer. 2009. Natural image statistics. In Natural Image Statistics: A Probabilistic Approach to Early Computational Vision, Computational Imaging and Vision. 39.
[60]
Y. Imamverdiev, L. Kerimova, and V. Mussaev. 2009. Method of detection of real fingerprints on the basis of the radon transform. Automatic Control and Computer Sciences 43, 5 (2009), 270--275.
[61]
A. Jain, Y. Chen, and M. Demirkus. 2007. Pores and ridges: Fingerprint matching using level 3 features. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 1 (2007), 15--27.
[62]
A. Jain, L. Hong, S. Pankanti, and R. Bolle. 1997. An identity-authentication system using fingerprints. Proceeding of the IEEE 85, 9 (1997), 1365--1388.
[63]
A. Jain, A. Ross, and K. Nandakumar. 2011. An Introduction to Biometrics. Springer.
[64]
J. Jia and L. Cai. 2007. A new approach to fake finger detection based on skin elasticity analysis. In Proceedings of the International Conference on Biometrics (ICB'07).
[65]
C. Jin, H. Kim, and S. Elliott. 2007. Liveness detection of fingerprint based on band-selective Fourier spectrum. Information Security and Cryptology 4817 (2007), 168--179.
[66]
C. Jin, S. Li, H. Kim, and E. Park. 2011. Fingerprint liveness detection based on multiple image quality features. Information Security Applications (2011), 281--291.
[67]
P. Johnson, R. Lazarick, E. Marasco, E. Newton, A. Ross, and S. Schuckers. 2012. Biometric liveness detection: Framework and metrics. In Proceedings of the NIST International Biometric Performance Testing Conference (IBPC'12).
[68]
P. Johnson, B. Tan, and S. Schuckers. 2010. Multimodal fusion vulnerability to non-zero effort (spoof) imposters. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'10).
[69]
J. Kannala and E. Rahtu. 2012. BSIF: Binarized statistical image features. In Proceedings of the IEEE 21st International Conference on Pattern Recognition (ICPR'12). 1363--1366.
[70]
M. Kluz. 2005. Liveness Testing in Biometric Systems. Master's thesis, Brno, Masaryk University, Faculty of Informatics. 57.
[71]
M. Lane and L. Lordan. 2005. Practical Techniques for Defeating Biometric Devices. Technical Report, Diss. Master's thesis, Dublin City University, 2005.
[72]
H. Lee, H. Maeng, and Y. Bae. 2009. Fake finger detection using the fractional fourier transform. Image and Vision Computing 27, 3 (2009), 233--244.
[73]
T. Mäenpää. 2003. The Local Binary Pattern Approach to Texture Analysis: Extensions and Applications. Oulun yliopisto.
[74]
D. Maltoni, D. Maio, A. Jain, and S. Prabhakar. 2003. Handbook of Fingerprint Recognition. Springer.
[75]
N. Manivanan, S. Memon, and W. Balachandran. 2010a. Automatic detection of active sweat pores of fingerprint using highpass and correlation filtering. Electronics Letters 46, 18 (2010), 1268--1269.
[76]
N. Manivanan, S. Memon, and W. Balachandran. 2010b. Security breaks a sweat. Electronics Letters 46, 18 (2010), 1241--1242.
[77]
E. Marasco. 2010. Secure Multibiometric Systems. Ph.D. Dissertation. Università degli Studi di Napoli Federico II.
[78]
E. Marasco, Y. Ding, and A. Ross. 2012. Combining match scores with liveness values in a fingerprint verification system. In Proceedings of the IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS'12). 418--425.
[79]
E. Marasco, P. Johnson, C. Sansone, and S. Schuckers. 2011. Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism. In Proceedings of the 10th International Workshop on Multiple Classifier Systems (MCS'11). Springer.
[80]
E. Marasco and C. Sansone. 2010. An anti-spoofing technique using multiple textural features in fingerprint scanners. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMs'10). 8--14.
[81]
E. Marasco and C. Sansone. 2011a. On the robustness of fingerprint liveness detection algorithms against new materials used for spoofing. In Proceedings of the Biosignals 2011 International Conference on Bio-Inspired Systems and Signal Processing. 1--9.
[82]
E. Marasco and C. Sansone. 2011b. On the security evaluation of a multibiometric system based on a voting strategy involving likelihood ratio statistic tests. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS'11). 1--5.
[83]
E. Marasco and C. Sansone. 2012. Combining perspiration- and morphology-based static features for fingerprint liveness detection. Pattern Recognition Letters 33 (2012), 1148--1156.
[84]
G. Marcialis, L. Ghiani, K. Vetter, D. Morgeneier, and F. Roli. 2012b. Large scale experiments on fingerprint liveness detection. In Structural, Syntactic, and Statistical Pattern Recognition. Springer, Berlin, 501--509.
[85]
G. Marcialis, A. Lewicke, B. Tan, P. Coli, D. Grimberg, A. Congiu, A. Tidu, F. Roli, and S. Schuckers. 2009. First international fingerprint liveness detection competition - LivDet 2009. In Proceedings of the 15th International Conference on Image Analysis and Processing (ICIAP'09). 12--23.
[86]
G. Marcialis, F. Roli, and A. Tidu. 2010. Analysis of fingerprint pores for vitality detection. In Proceedings of the 20th IAPR International Conference on Pattern Recognition (ICPR'10). 1289--1292.
[87]
G. L. Marcialis, P. Coli, and F. Roli. 2012a. Fingerprint liveness detection based on fake finger characteristics. International Journal of Digital Crime and Forensics (IJDCF) 4, 3 (2012), 1--19.
[88]
L. Marfella, E. Marasco, and C. Sansone. 2012. Liveness-based fusion approaches in multibiometrics. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications. 1--7.
[89]
J. Martins, L. Oliveira, and R. Sabourin. 2012. Combining textural descriptors for forest species recognition. In Proceedings of the 38th Annual Conference on IEEE Industrial Electronics Society. 1483--1488.
[90]
T. Matsumoto. 2002. Gummy and conductive silicone rubber fingers importance of vulnerability analysis. In Proceedings of Advances in Cryptology (ASIACRYPT'02). Springer, 574--575.
[91]
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. 2002. Impact of artificial gummy fingers on fingerprint systems. Proceedings of SPIE 4677 (2002), 275--289.
[92]
S. Memon. 2012. Novel Active Sweat Pores based Liveness Detection Techniques for Fingerprint Biometrics. Ph.D. Dissertation. Brunel University School of Engineering and Design.
[93]
S. Memon, N. Manivannan, and W. Balachandran. 2011. Active pore detection for liveness in fingerprint identification systems. Telecommunications Forum (TELFOR), IEEE (2011), 619--622.
[94]
S. Memon, N. Manivannan, A. Noor, W. Balachadran, and N. Boulgouris. 2012. Fingerprint sensors: Liveness detection issue and hardware based solutions. Sensors & Transducers 136, 1 (2012), 35--49.
[95]
B. Miller. 1994. Vital signs of identity {biometrics}. IEEE Spectrum 31, 2 (1994), 22--30.
[96]
Y. Moon, J. Chen, K. Chan, K. So., and K. So. Woo. 2005. Wavelet based fingerprint liveness detection. Electronic Letters 41, 20 (2005), 1112--1113.
[97]
M. Nasiri-Avanaki, A. Meadway, and A. Bradu. 2011. Anti-spoof reliable biometry of fingerprints using en-face optical coherence tomography. Optics and Photonics Journal 1 (2011), 91--96.
[98]
S. Nikam. 2009. Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection. Inderscience.
[99]
S. Nikam and S. Agarwal. 2008a. Fingerprint liveness detection using curvelet energy and co-occurrence signatures. In Proceedings of the IEEE 5th International Conference on Computer Graphics, Imaging and Visualisation (CGIV'08). 217--222.
[100]
S. Nikam and S. Agarwal. 2008b. Local binary pattern and wavelet-based spoof fingerprint detection. International Journal of Biometrics 1, 2 (2008), 141--159.
[101]
S. Nikam and S. Agarwal. 2009a. Co-occurrence probabilities and wavelet-based spoof fingerprint detection. International Journal of Image and Graphics 9, 2 (2009), 171--199.
[102]
S. Nikam and S. Agarwal. 2009b. Curvelet-based fingerprint anti-spoofing. Signal, Image and Video Processing 4, 1 (January 2009), 75--87.
[103]
S. Nikam and S. Agarwal. 2009c. Ridgelet-based fake fingerprint detection. Neurocomputing 72, 10--12 (2009), 2491--2506.
[104]
NIST. 2012. Need and perspectives to realize liveness detection. In IBPC.
[105]
K. A. Nixon, V. Aimale, and R. Rowe. 2007. Spoof detection schemes. Handbook of biometrics. Springer US, 2008, 403--423.
[106]
K. Nixon and R. Rowe. 2005. Multispectral fingerprint imaging for spoof detection. In Defense and Security, International Society for Optics and Photonics. 214--225.
[107]
K. Nixon, R. Rowe, J. Allen, S. Corcoran, L. Fang, D. Gabel, D. Gonzales, R. Harbour, S. Love, and R. McCaskill. 2004. Novel spectroscopy-based technology for biometric and liveness verification. In Defense and Security. 287--295.
[108]
T. Ojala, M. Pietikainen, and T. Maenpaa. 2002. Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 7 (2002), 971--987.
[109]
V. Ojansivu and J. Heikkilä. 2008. Blur insensitive texture classification using local phase quantization. In Image and Signal Processing. 236--243.
[110]
V. Ojansivu, E. Rahtu, and J. Heikkila. 2008. Rotation invariant local phase quantization for blur insensitive texture analysis. In Proceedings of the IEEE 19th International Conference on Pattern Recognition (ICPR'08). 1--4.
[111]
S. Parthasaradhi, R. Derakhshani, L. Hornak, and S. Schuckers. 2004. Improvement of an algorithm for recognition of liveness using perspiration in fingerprint devices. Defense and Security 270--277.
[112]
S. Parthasaradhi, R. Derakhshani, L. Hornak, and S. Schuckers. 2005. Time-series detection of perspiration as a liveness test in fingerprint devices. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 35, 3 (2005), 335--343.
[113]
N. Ratha, J. Connell, and R. Bolle. 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 3 (2001), 614--634.
[114]
A. Rattani and N. Poh. 2013. Biometric system design under zero and non-zero effort attacks. In Proceedings of the IEEE International Conference on Biometrics (ICB'13).
[115]
A. Rattani, N. Poh, and A. Ross. 2013. A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'13). 37--42.
[116]
A. Rattani and A. Ross. 2014a. Automatic adaptation of fingerprint liveness detector to new spoof materials. In Proceedings of the IEEE International Conference on Biometrics (IJCB'14). 1--6.
[117]
A. Rattani and A. Ross. 2014b. Minimizing the impact of spoof fabrication material on fingerprint liveness detector. In Proceedings of the 21st IEEE International Conference on Image Processing (ICIP'14).
[118]
P. Reddy, A. Kumar, S. Rahman, and T. Mundra. 2007. A new method for fingerprint antispoofing using pulse oximetry. In Proceedings of the IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS'07). 1--6.
[119]
P. Reddy, A. Kumar, S. Rahman, and T. Mundra. 2008. A new antispoofing approach for biometric devices. IEEE Transactions on Biomedical Circuits and Systems 2, 4 (2008), 328--337.
[120]
C. Roberts. 2007. Biometric attack vectors and defences. Computers and Security 26, 1 (2007), 14--25.
[121]
R. Rodrigues, N. Kamat, and V. Govindaraju. 2010. Evaluation of biometric spoofing in a multimodal system. In Proceedings of the IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS'10).
[122]
R. Rodrigues, L. Ling, and V. Govindaraju. 2009. Robustness of multimodal biometric fusion methods against spoof attacks. Journal of Visual Languages and Computing 20, 3 (2009), 169--179.
[123]
A. Ross, J. Shah, and A. Jain. 2007. From template to image: Reconstructing fingerprints from minutiae points. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 4 (2007), 544--560.
[124]
M. Sandstrom. 2004. Liveness Detection in Fingerprint Recognition Systems. Ph.D. Thesis, Linköping.
[125]
S. Schuckers. 2002. Spoofing and anti-spoofing measures. Information Security Technical Report 7, 4 (2002), 56--62.
[126]
S. Schuckers, R. Derakhshani, S. Parthasaradhi, and L. Hornak. 2006. Liveness detection in biometric devices. Circuits, Signals, and Speech and Image Processing 35, 3 (2006), 335--343.
[127]
S. Schuckers, L. Hornak, T. Norman, R. Derakhshani, and S. Parthasaradhi. 2002. Issues for liveness detection in biometrics. In Proceedings of the Biometric Consortium Conference.
[128]
S. Schuckers, S. Parthasaradhi, R. Derakshani, and L. Hornak. 2004. Comparison of classification methods for time-series detection of perspiration as a liveness test in fingerprint devices. In Biometric Authentication. Springer, 256--263.
[129]
S. Schuckers and B. Tan. 2006. Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing. In Proceedings of the Computer Vision and Pattern Recognition Workshop (CVPR'06). 26.
[130]
M. Sébastien, M. Nixon, and S. Li. Handbook of Biometric Anti-Spoofing. Springer, 2014.
[131]
M. Sepasian, C. Mares, and W. Balachandran. 2010. Vitality detection in fingerprint identification. Information Science and Applications 4 (2010).
[132]
Y. Shin, I. Jun, H. Kim, and W. Shin. 2009. Performance assessment method for a forged fingerprint detection algorithm. In Advances in Information Security and Its Application.
[133]
K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E. Newton, and B. Preneel. 2012. Criteria towards metrics for benchmarking template protection algorithms. In Proceedings of the 5th IAPR International Conference on Biometrics (ICB) (2012), 498--505.
[134]
Y. Singh and S. Singh. 2013. A taxonomy of biometric system vulnerabilities and defences. International Journal of Biometrics 5, 2 (2013), 137--159.
[135]
C. Sousedik and C. Busch. 2014. Presentation attack detection methods for fingerprint recognition systems: A survey. IET Biometrics (2014), 1--15.
[136]
J. Staymates, M. Staymates, and G. Gillen. 2013. Evaluation of a drop-on-demand micro-dispensing system for development of artificial fingerprints. Analysis Methods, RSC 5, 1 (2013), 180--186.
[137]
A. Stén, A. Kaseva, and T. Virtanen. 2003a. Fooling fingerprint scanners - biometric vulnerabilities of the precise biometrics 100 SC scanner. In Proceedings of the 4th Australian Information Warfare and IT Security Conference. 1--8.
[138]
A. Stén, A. Kaseva, and T. Virtanen. 2003b. Fooling fingerprint scanners-biometric vulnerabilities of the precise biometrics 100 SC scanner. In Proceedings of 4th Australian Information Warfare and IT Security Conference, Vol. 2003 (2003), 333--340.
[139]
B. Tan, A. Lewicke, D. Yambay, and S. Schuckers. 2010. The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS'10). 1--6.
[140]
B. Tan and S. Schuckers. 2005. Liveness detection using an intensity based approach in fingerprint scanner. In Proceedings of Biometrics Symposium (BSYM'05).
[141]
B. Tan and S. Schuckers. 2010. Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise. Pattern Recognition 43, 8 (2010), 2845--2857.
[142]
L. Thalheim, J. Krissler, and P.-M. Ziegler. 2002. Body check: Biometric access protection devices and their programs put to the test. ct magazine 11 (November 2002). Available at http://www.pcmag.com/article2/0,2817,13919,00.asp.
[143]
A. Tidu. 2010. Fingerprint Vitality Assessment by Pores Detection. Master of Science Thesis, University of Cagliari.
[144]
B. Toth. 2005. Biometric liveness detection. Information Security Bulletin 10 (October 2005), 291--297.
[145]
U. Uludag and A. Jain. 2004. Attacks on biometric systems: A case study in fingerprints. In Proceedings of SPIE-EI, Security, Seganography and Watermarking of Multimedia Contents VI.
[146]
V. Valencia and C. Horn. 2003. Biometric liveness testing. In Biometrics. Osborne McGraw Hill, New York, 139--149.
[147]
T. van der Putte and J. Keuning. 2001. Biometrical fingerprint recognition: Don't get your fingers burned. Smart Card Research and Advanced Applications. Springer US (2000), 289--303.
[148]
A. Wiehe, T. Søndrol, O. Olsen, and F. Skarderud. 2004. Attacking Fingerprint Sensors. Master thesis, Gjøvik University College.
[149]
D. Willis and M. Lee. 1998. Six biometric devices point the finger at security. Computers and Security, Elsevier 17, 5 (1998), 410--411.
[150]
K. Yamada, H. Matsumoto, and T. Matsumoto. 2000. Can we make artificial fingers that fool fingerprint systems? Technical Report of IEICE and IPSJ (Part II). 12 (2000), 109--114.
[151]
D. Yambay, L. Ghiani, P. Denti, G. Marcialis, F. Roli, and S. Schuckers. 2012. LivDet 2011—fingerprint liveness detection competition 2011. In Proceedings of the 15th International Conference on Image Analysis and Processing (ICIAP'11). 208--215.
[152]
S. Yang, C. Wang, and S. Chen. 2011. A release-induced response for the rapid recognition of latent fingerprints and formation of inkjet-printed patterns. Angewandte Chemie 123, 16 (2011), 3790--3793.
[153]
W. Yau, H. Tran, and E. Teoh. 2008. Fake finger detection using an electrotactile display system. In Proceedings of the 10th International Conference on Control, Automation, Robotics and Vision (ICARCV'08). 962--966.
[154]
W. Yau, H. Tran, E. Teoh, and J. Wang. 2009. Fake finger detection by finger color change analysis. Advances in Biometrics 4642 (2009), 888--896.
[155]
S. Yoon, J. Feng, and A. Jain. 2010. Fingerprint alteration. In Proceedings of the 95th International Educational Conference of the International Association for Identification (IAI'10). 11--17.
[156]
S. Yoon, J. Feng, and A. Jain. 2012. Altered fingerprints: Analysis and detection. IEEE Transactions on Pattern Analysis and Machine Intelligence 34, 3 (2012), 451--464.
[157]
Y. Zhang, J. Tian, X. Chen, X. Yang, and P. Shi. 2007. Fake finger detection based on thin-plate spline distortion model. In Proceedings of the International Conference on Biometrics (ICB'07). 742--749.

Cited By

View all
  • (2025)FingerprintEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_740(910-916)Online publication date: 8-Jan-2025
  • (2024)An Efficient OCT Fingerprint Antispoofing Method Based on ResMambaSymmetry10.3390/sym1612160316:12(1603)Online publication date: 1-Dec-2024
  • (2024)Influence of Standalone and Ensemble Classifiers in Face Spoofing Detection using LBP and CNN ModelsEuropean Journal of Electrical Engineering and Computer Science10.24018/ejece.2024.8.2.6048:2(17-30)Online publication date: 25-Mar-2024
  • Show More Cited By

Index Terms

  1. A Survey on Antispoofing Schemes for Fingerprint Recognition Systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Computing Surveys
    ACM Computing Surveys  Volume 47, Issue 2
    January 2015
    827 pages
    ISSN:0360-0300
    EISSN:1557-7341
    DOI:10.1145/2658850
    • Editor:
    • Sartaj Sahni
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 November 2014
    Accepted: 01 May 2014
    Revised: 01 February 2014
    Received: 01 October 2013
    Published in CSUR Volume 47, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Biometrics
    2. antispoofing
    3. fingerprints
    4. liveness detection
    5. person verification

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)96
    • Downloads (Last 6 weeks)19
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)FingerprintEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_740(910-916)Online publication date: 8-Jan-2025
    • (2024)An Efficient OCT Fingerprint Antispoofing Method Based on ResMambaSymmetry10.3390/sym1612160316:12(1603)Online publication date: 1-Dec-2024
    • (2024)Influence of Standalone and Ensemble Classifiers in Face Spoofing Detection using LBP and CNN ModelsEuropean Journal of Electrical Engineering and Computer Science10.24018/ejece.2024.8.2.6048:2(17-30)Online publication date: 25-Mar-2024
    • (2024)Dissecting zero trust: research landscape and its implementation in IoTCybersecurity10.1186/s42400-024-00212-07:1Online publication date: 3-May-2024
    • (2024)Dynamic group fuzzy extractorCybersecurity10.1186/s42400-024-00210-27:1Online publication date: 1-Sep-2024
    • (2024)EarSlideProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435158:1(1-29)Online publication date: 6-Mar-2024
    • (2024)ZJUT-EIFD: A Synchronously Collected External and Internal Fingerprint DatabaseIEEE Transactions on Pattern Analysis and Machine Intelligence10.1109/TPAMI.2023.333476046:4(2267-2284)Online publication date: 1-Apr-2024
    • (2024)Fingerprint Presentation Attack Detection by Region DecompositionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337281319(3974-3985)Online publication date: 4-Mar-2024
    • (2024)Balancing Accuracy and Error Rates in Fingerprint Verification Systems Under Presentation Attacks With Sequential FusionIEEE Transactions on Biometrics, Behavior, and Identity Science10.1109/TBIOM.2024.34055546:3(409-419)Online publication date: Jul-2024
    • (2024)From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00231(2366-2384)Online publication date: 19-May-2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media