Spoof Detection Schemes

  • Kristin Adair Nixon
  • Valerio Aimale
  • Robert K. Rowe

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    J. Wayman, A. Jain, D. Maltoni, and D. Maio. Biometric Systems: Technology, Design and Performance Evaluation Springer. 2005.Google Scholar
  2. 2.
    I. R. Buhan, P. H. Hartel. The state of the art in abuse of biometrics: Centre for Telematics and Information Technology, University of Twente, Enschede. 2005.Google Scholar
  3. 3.
    International Biometric Group. Spoof 2007 -High-Level Test Plan. New York, NY. 2006.Google Scholar
  4. 4.
    M. Sandström. Liveness Detection in Fingerprint Recognition systems. Linköpings Universitet: Linköping, Sweden. 2004.Google Scholar
  5. 5.
    S. A. Cole. Suspect Identities -A History of Fingerprinting and Criminal Identification. Cambridge, MA: Harvard University Press. 2001.Google Scholar
  6. 6.
    T. Van der Putte, J. Keuning. Biometrical fingerprint recognition: don’t get your fingers burned. IFIP TC8/WG88 Fourth Working Conference on Smart Card Research and Advanced Applications: Kluwer Academic; 2000. p. 289-303.Google Scholar
  7. 7.
    T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. Proc SPIE, 4677:275-89, 2002.Google Scholar
  8. 8.
    S. T. V. Parthasaradhi. Comparison of Classification methods for perspiration based liveness algorithm. West Virginia University: Morgantown, West Virginia. 2003.Google Scholar
  9. 9.
    S. Schuckers, R. Derakhshani, S. Parthasardhi, L. Hornak. Liveness Detection in Biometric Devices. Electrical Engineering Handbook. 3rd ed. CRC Press. 2005.Google Scholar
  10. 10.
    S. T. V. Parthasaradhi, R. Derakhshani, L. A. Hornak, S. A. C. Schuckers. Time-series detection of perspiration as a liveness test in fingerprint devices. Systems, Man and Cybernetics, Part C, IEEE Transactions on, 35(3):335-43, 2005.CrossRefGoogle Scholar
  11. 11.
    A. Wehde, J. N. Befiel. Finger-Prints can be forged. Chicago: Tremonia Publish Co. 1924.Google Scholar
  12. 12.
    D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar. Handbook of Fingerprint Recognition: Springer. 2003.Google Scholar
  13. 13.
    S. Schuckers. Spoofing and Anti-Spoofing Measures. Information Security Technical Report, 7(4):56-62, 2002.CrossRefGoogle Scholar
  14. 14.
    L. Thalheim, J. Krissler, P.-M. Ziegler. Body Check: Biometric Access Protection Devices and their Programs Put to the Test. Heise Online. November 2002.Google Scholar
  15. 15.
    Lumidigm. J-Series Multispectral Fingerprint Sensors. Albuquerque, NM. 2006.Google Scholar
  16. 16.
    M. Lewis, P. Statham. CESG Biometric Security Capabilities Programme: Method, Results and Research Challenges. Biometrics Consortium Conference. Arlington, Virginia. 2004.Google Scholar
  17. 17.
    A. Wiehe, T. Søndrol, O. K. Olsen, F. Skarderud. Attacking Fingerprint Sensors. Gjøvik University College. 2004.Google Scholar
  18. 18.
    PhysOrg.com. Biometric expert shows an easy way to spoof fingerprint scanning devices. 2005.Google Scholar
  19. 19.
    J. Leyden. Biometric sensors beaten senseless in tests. The Register. May 23, 2002.Google Scholar
  20. 20.
    V. A. Grønland, H. Hasli, J. F. Pettersen. Challenging fingerprint scanner: NISLAB Authentication Laboratory, Gjøvik University College. 2005.Google Scholar
  21. 21.
    D. Rutter. Thinking Putty defeats Biometric Fingerprint Scanners! www. dansdata.com. 2007.Google Scholar
  22. 22.
    B. Schneier. Biometrics: Truths and Fictions. Crypto-Gram Newsletter. 1998.Google Scholar
  23. 23.
    A. Kaseva, A. Stén. Fooling Fingerprint Scanners: Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner. Helsinki University of Technology. 2003.Google Scholar
  24. 24.
    J. Leyden. Gummi bears defeat fingerprint sensors. The Register. May 16, 2002.Google Scholar
  25. 25.
    D. Rutter. Review: DigitalPersona U.are.U Personal fingerprint scanner. www.dansdata.com. 2002.Google Scholar
  26. 26.
    D. Willis, M. Lee. Six Biometric Devices Point The Finger At Security. Network Computing. 1998.Google Scholar
  27. 27.
    A. Ligon. An Investigation into the Vulnerability of the Siemens ID Mouse Professional Version 4. 2002.Google Scholar
  28. 28.
    R. Derakhshani, S. Schuckers, L. Hornak, L. O. Gorman. Determination of Vitality from A Non-Invasive Biomedical Measurement for Use in Fingerprint Scanners. Pattern Recognition Journal, 36(2):383-96, 2003.CrossRefGoogle Scholar
  29. 29.
    FIDIS Consortium. Forensic Implications of Identity Management Systems. 2006.Google Scholar
  30. 30.
    H. Gravnås. Biometric Authentication: Is it a threat to take the end-users for grantedfi Gjøvik University College. 2005.Google Scholar
  31. 31.
    J. Blommé. Evaluation of biometric security systems against artificial fingers. Linköpings Universitet: Linköping, Sweden. 2003.Google Scholar
  32. 32.
    H. Kang, B. Lee, H. Kim, D. Shin, J. Kim. A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor Modules. Lecture Notes in Computer Science, Volume 2774/2003:1245-53, 2003.Google Scholar
  33. 33.
    Chaos Computer Club. How to fake fingerprintsfi www.ccc.de. 2004.Google Scholar
  34. 34.
    T. Matsumoto. Gummy Fingers and Paper Iris: An Update. The 2004 Workshop on Information Security Research: Yokohama National University. 2004.Google Scholar
  35. 35.
    D. C. Hitchcock. Evaluation and Combination of Biometric Authentication Systems. University of Florida. 2003.Google Scholar
  36. 36.
    InterNational Committee for Information Technology Standards. Study Report on Biometrics in E-Authentication. Washington, DC: Information Technology Industry Council. 2006.Google Scholar
  37. 37.
    A. S. Abhyankar, S. C. Schuckers. A wavelet-based approach to detecting liveness in fingerprint scanners. A. K. Jain, N. K. Ratha, editors. SPIE. p. 278-86.Google Scholar
  38. 38.
    R. K. Rowe. Multispectral Fingerprint Sensors. Biometric Consortium Conference. Arlington, Virginia USA. 2005.Google Scholar
  39. 39.
    P. Lapsley, J. Less, J. DF Pare, N. Hofiman, inventors; SmartTouch, LLC, assignee. Anti-Fraud Biometric Sensor that Accurately Detects Blood Flow. 1998.Google Scholar
  40. 40.
    J. Daugman, inventor Biometric Personal Identification System Based on Iris Analysis. US patent 5,291,560. 1994.Google Scholar
  41. 41.
    J. Daugman. How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology, 14(1):21-30, 2004.CrossRefGoogle Scholar
  42. 42.
    U. C. von Seelen. Countermeasures Against Iris Spoofing with Contact Lenses. Biometrics Consortium Conference. Arlington, VA. 2005.Google Scholar
  43. 43.
    A. Lefohn, B. Budge, P. Shirley, R. Caruso, E. Reinhard. An ocularist’s approach to human iris synthesis. Computer Graphics and Applications, IEEE, 23(6):70-5, 2003.CrossRefGoogle Scholar
  44. 44.
    A. K. Jain, R. Bolle and S. Pankanti (Eds.), BIOMETRICS: Personal Identification in Networked society, Kluwer Academic Publishers, 1999.Google Scholar
  45. 45.
    findBiometrics.com. Interview with Dr. John Daugman, Cambridge University. 2004.Google Scholar
  46. 46.
    J. Daugman. Liveness Detection Countermeasures. University of Cambridge. 2005.Google Scholar
  47. 47.
    A. A. Ross, K. Nandakumar, A. K. Jain. Handbook of Multibiometrics Springer. 2006.Google Scholar
  48. 48.
    D. Sarkar. Identix integrating state-of-the-art skin and facial recognition technology. Federal Computer Week. 2004.Google Scholar
  49. 49.
    F. J. Prokoski, R. B. Riedel. Infrared identification of faces and body parts. A. K. Jain, R. Bolle, S. Pankanti, editors. Biometrics: Personal Identification in Networked Society, International Series in Engineering and Computer Science. Kluwer. 1999. p. 191-212.Google Scholar
  50. 50.
    J. Li, Y. Wang, T. Tan, A. K. Jain. Biometric Technology for Human Identification. In: A. K. Jain, N. K. Ratha, editors. SPIE; 2004. p. 296-303.Google Scholar
  51. 51.
    T. Fladsrud. Face Recognition in a Border Control Environment. Gjøvik University College. 2005.Google Scholar
  52. 52.
    European Commission BioSecure Project. Biometrics for Secure Authentication. 2005.Google Scholar
  53. 53.
    G. Parziale, J. Dittmann, M. Tistarelli. Analysis and evaluation of alternatives and advanced solutions for system elements: BioSecure. 2005.Google Scholar
  54. 54.
    H. Cummins, C. Midlo. Fingerprints, Palms and Soles: An Introduction to Dermatoglyphics. New York: Dover Publications Inc. 1961.Google Scholar
  55. 55.
    S. Sangiorgi, A. Manelli, T. Congiu, A. Bini, G. Pilato, M. Reguzzoni, et al. Microvascularization of the human digit as studied by corrosion casting. Journal of Anatomy, 204 (2):123-31, 2004.CrossRefGoogle Scholar
  56. 56.
    S. Sangiorgi. Personal Communication with Matthew Ennis, PhD, Lumidigm. 2005.Google Scholar
  57. 57.
    A. Shiratsuki, E. Sano, M. Shikai, T. Nakashima, T. Takashima, M. Ohmi, et al. Novel optical fingerprint sensor utilizing optical characteristics of skin tissue under fingerprints. International Society for Optical Engineering, Proceedings of SPIE, 5686:80-7, 2005.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Kristin Adair Nixon
    • 1
  • Valerio Aimale
    • 1
  • Robert K. Rowe
    • 1
  1. 1.Lumidigm, Inc.AlbuquerqueUSA

Personalised recommendations