A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems

A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems

Christian Schwarzl, Edgar Weippl
Copyright: © 2011 |Volume: 2 |Issue: 1 |Pages: 44
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781613508954|DOI: 10.4018/jsse.2011010103
Cite Article Cite Article

MLA

Schwarzl, Christian, and Edgar Weippl. "A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems." IJSSE vol.2, no.1 2011: pp.40-83. http://doi.org/10.4018/jsse.2011010103

APA

Schwarzl, C. & Weippl, E. (2011). A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. International Journal of Secure Software Engineering (IJSSE), 2(1), 40-83. http://doi.org/10.4018/jsse.2011010103

Chicago

Schwarzl, Christian, and Edgar Weippl. "A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems," International Journal of Secure Software Engineering (IJSSE) 2, no.1: 40-83. http://doi.org/10.4018/jsse.2011010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper serves to systematically describe the attempts made to forge fingerprints to fool biometric systems and to review all relevant publications on forging fingerprints to fool sensors. The research finds that many of the related works fail in this aspect and that past successes could not be repeated. First, the basics of biometrics are explained in order to define the meaning of the term security in this special context. Next, the state of the art of biometric systems is presented, followed by to the topic of security of fingerprint scanners. For this, a series of more than 30,000 experiments were conducted to fool scanners. The authors were able to reproduce and keep records of each single step in the test and to show which methods lead to the desired results. Most studies on this topic exclude a number of steps in producing a fake finger and fooling a fingerprint scanner are not explained, which means that some of the studies cannot be replicated. In addition, the authors’ own ideas and slight variations of existing experiment set-ups are presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.