Advertisement

Biometrical Fingerprint Recognition: Don’t get your Fingers Burned

  • Ton van der Putte
  • Jeroen Keuning
Chapter
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 52)

Abstract

One of the most critical issues to solve when building multi-accessible systems, such as computer applications, cars or physical buildings, is to determine the identity of a person. A system protecting confidential information, or items of value, puts strong security demands on the identification. Biometry provides us with a userfriendly method for this identification and is becoming a competitor for current identification mechanisms, especially for electronic transactions. However, there are ways to compromise a system based on biometric verification. This article focuses on the drawbacks and risks of biometric verification, specifically verification based on fingerprints. It shows how all currently available fingerprint scanners can be fooled by dummies that are created with very limited means and skills.

This article should be read as a warning to those thinking of using new methods of identification without first examining the technical opportunities for compromising the identification mechanism and the associated legal consequences. This is especially true for people working with smart cards since it is quite common to store fingerprints on smart cards and due to the developments in solid state fingerprint scanners, integration of a fingerprint scanner on a smart card is possible.

Keywords

Biometry Identification Verification Fingerprints Fraud Compromise 

References

  1. [1]
    Kingston, C.R. and P.L. Kirk, “Historical Development and Evaluation of the ‘12 Point Rule’ in Fingerprint Identification,” International Criminal Police Review, 1965.Google Scholar
  2. [2]
    Lee, H.C. and R.E. Gaensslen, “Advances in Fingerprint Technology,” Elsevier, New York, 1991.Google Scholar
  3. [3]
    Zeelenberg, A.J., “Het identificatieproces van dactyloscopische Sporen,” VUGA, ‘s-Gravenhage, 1993 (in Dutch).Google Scholar
  4. [4]
  5. [5]

Copyright information

© IFIP International Federation for Information Processing 2000

Authors and Affiliations

  • Ton van der Putte
    • 1
  • Jeroen Keuning
    • 1
  1. 1.Esire, an Origin Extended EnterpriseBaarnThe Netherlands

Personalised recommendations