Fingerprint Synthesis and Spoof Detection

  • Annalisa Franco
  • Davide Maltoni

This chapter addresses two topical issues in the field of fingerprint-based biometric systems: fingerprint template reverse-engineering, that is, the synthesis of fingerprint images starting from minutiae-based templates; and fake fingerprint detection, that is, discriminating between real and fake fingerprint impressions, the latter generated by artificial reproductions of a finger. After a brief review of the current state of the art, two innovative techniques are discussed in detail: a reconstruction approach able to synthesize a valid fingerprint image from an ISO 19794-2 template and a fake fingerprint detection method based on analysis of the finger odor.


Security Level Electronic Nose Biometric System Fingerprint Image Successful Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Anderson, R.J. (1994) Why cryptosystems fail. Communications of the ACM, 37(11): 32-40.CrossRefGoogle Scholar
  2. Antonelli, A., Cappelli, R., Maio, D. and Maltoni, D. (2006) Fake finger detection by skin distortion analysis. IEEE Transactions on Information Forensics and Security, 1(3): 360-373.CrossRefGoogle Scholar
  3. Baldisserra, D., Franco, A., Maio, D., and Maltoni, D. (2006) Fake fingerprint detection by odor analysis. In Proc. International Conference on Biometrics, pp. 265-272.Google Scholar
  4. Bazen, A.M. and Gerez, S.H. (2002) Systematic methods for the computation of the directional fields and singular points of fingerprints. IEEE Trans. Pattern Analysis and Machine Intelligence, 24(7): 905-919.CrossRefGoogle Scholar
  5. Bolle, R.M., Connell, J.H., and Ratha, N.K. (2002) Biometric perils and patches. Pattern Recognition, 35(12): 2727-2738.MATHCrossRefGoogle Scholar
  6. Brownlee, K. (2001) Method and apparatus for distinguishing a human finger from a reproduction of a fingerprint. US Patent #6,292,576.Google Scholar
  7. Cappelli, R. (2003) Synthetic fingerprint generation. In D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York.Google Scholar
  8. Cappelli, R., Lumini, A., Maio, D., and Maltoni, D. (2006) Can fingerprints be reconstructed from ISO templates? In Proc. International Conference on Control, Automation, Robotics and Vision.Google Scholar
  9. Derakhshani, R., Scuckers S., Hornak, L., and O’Gorman, L. (2003) Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recognition, 17(2): 383-396.Google Scholar
  10. Dorai, C., Ratha, N.K., and Bolle, R.M. (2004) Dynamic behavior analysis in compressed fingerprint videos. IEEE Transactions on Circuits and Systems for Video Technology, 14(1): 58-73.CrossRefGoogle Scholar
  11. Harwood, D. (2001) Something in the air. IEE Review, 47: 10-14.CrossRefGoogle Scholar
  12. Hill, C. (2001) Risk of masquerade arising from the storage of biometrics. Bachelor of Science thesis, The Department of Computer Science, Australian National University.Google Scholar
  13. Hurst, W.J. (1999) Electronic Noses and Sensor Array Based Systems : Design and Applications. Technomic.Google Scholar
  14. ISO/IEC 19794-2:2005, Information technology - Biometric data interchange formats - Part 2: Finger minutiae data.Google Scholar
  15. Kallo, P., Kiss, I., Podmaniczky, A., and Talosi, A. (2001) Detector for Recognizing the Living Character of a Finger in a Fingerprint Recognizing Apparatus. Dermo Corporation, Ltd. US Patent #6,175,641.Google Scholar
  16. Keller, P.E. (1995) Electronic noses and their applications. In Proc. IEEE Technical Applications Conference and Workshops Northcon, pp. 116-120.Google Scholar
  17. Lapsley, P.D., Less, J.A., Pare, D.F.Jr., , and Hoffman, N. (1998) Anti-Fraud Biometric Sensor that Accurately Detects Blood Flow. SmartTouch, LLc, US Patent #5,737,439.Google Scholar
  18. Li, J., Yau, W.Y., and Wang, H.(2006) Constrained nonlinear models of fingerprint orientations with prediction. Pattern Recognition,39(1): 102-114.CrossRefGoogle Scholar
  19. Maio, D. and Maltoni, D. (1997) Direct gray-scale minutiae detection in finger-prints. IEEE Transactions on Pattern Analysis Machine Intelligence, 19(1): 27-40.CrossRefGoogle Scholar
  20. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., and Jain, A.K. (2002) FVC2002: Second fingerprint verification competition. In Proc. 16th International Conference on Pattern Recognition (ICPR2002), vol. 3, pp. 811-814. FVC2002 Web site:
  21. Maltoni, D., Maio, D., Jain, A.K., and S. Prabhakar (2003) Handbook of Fingerprint Recognition, Springer, New York.MATHGoogle Scholar
  22. Matsumoto, T., Matsumoto, H., Yamada, K., and Hoshino, S. (2002) Impact of artificial “gummy” fingers on fingerprint systems. In Proc. SPIE, pp. 275-289.Google Scholar
  23. MINEX, NIST Minutiae Interoperability Exchange Test,
  24. Moon, Y.S., Chen, J.S., Chan, K.C., So, K., and Woo, K.C. (2005) Wavelet based fingerprint liveness detection. Electronic Letters, 41(20): 1112-1113.CrossRefGoogle Scholar
  25. Nixon, K.A., Rowe, R.K., Allen, J., Corcoran, S., Fang, L., Gabel, D., Gonzales, D., Harbour, R., Love, S., McCaskill, R., Ostrom, B., Sidlauskas, D., and Unruh, K. (2004) Novel spectroscopy-based technology for biometric and liveness verification. In Proc. of SPIE, vol. 5404, pp. 287-295.CrossRefGoogle Scholar
  26. Osten, D., Carim, H.M., Arneson, M.R., and Blan, B.L. (1998) Biometric, Personal Authentication System. Minnesota Mining and Manufacturing Company, US Patent #5,719,950.Google Scholar
  27. Parthasaradhi, S.T.V., Derakhshani, R., Hornak, L.A., and Schuckers, S.A.C. (2005) Time-series detection of perspiration as a liveness test in fingerprint devices. IEEE Transactions on Systems, Man and Cybernetics - Part C: Applications and Reviews, 35(3): 335-343.CrossRefGoogle Scholar
  28. Putte, T.v.D. and Keuning, J. (2000) Biometrical fingerprint recognition: Don’t get your fingers burned. In Proc. Working Conference on Smart Card Research and Advanced Applications, pp. 289-303.Google Scholar
  29. Ratha, N.K., Connell, J.H., and Bolle, R.M. (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40 (3): 614-634.CrossRefGoogle Scholar
  30. Ross, A., Shah, J., and Jain, A.K. (2005) Toward reconstructing fingerprints from minutiae points. In A.K. Jain, N.K. Ratha (Eds), Proc. of SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68-80.Google Scholar
  31. Schneier, B. (1998) Security pitfalls in cryptography. In Proc. CardTech/ SecureTech Conf., pp. 621-626.Google Scholar
  32. Setlak, D.R. (1999) Fingerprint Sensor Having Spoof Reduction Features and Related Methods. US Patent #5,953,441.Google Scholar
  33. Sherlock, B. and Monroe, D. (1993) A model for interpreting fingerprint topology. Pattern Recognition, 26(7): 1047-1055.CrossRefGoogle Scholar
  34. Tan, B. and Schuckers, S.A.C. (2006) Liveness detection for fingerprint scan-ners based on the statistics of wavelet signal processing. In Proc. IEEE Conference on Computer Vision and Pattern Recognition Workshop, pp. 26-33.Google Scholar
  35. Thalheim, L., Krissler, J., and Ziegler, P.M. (2002) Bodycheck: Biometric access protection devices and their programs put to the test. C’T, 11, May 22,2002.(
  36. Tuyls, P. and Goseling, J. (2004) Capacity and examples of template protecting biometric authentication systems. In Proc. Biometric Authentication Workshop, pp. 158-170.Google Scholar
  37. Uludag, U. and Jain, A.K. (2004) Attacks on biometric systems: A case study in fingerprints. In E.J. Delp III, P.W. Wong (Eds.), Proc. of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622-633.Google Scholar
  38. U.S. General Accounting Office (2002) Using Biometrics for Border Security. Government Accountability Office, Washington, DC, report GAO-03-174.Google Scholar
  39. Vizcaya, P. and Gerhardt, L. (1996) A nonlinear orientation model for global description of fingerprints. Pattern Recognition, 29(7): 1221-1231.CrossRefGoogle Scholar
  40. Watson, C. and Garris, M. (2004) NIST Fingerprint Image Software 2 (NFIS2), National Institute of Standards and Technology. URL:
  41. Zhou, J. and Gu, J. (2004) Modeling orientation fields of fingerprints with rational complex functions. Pattern Recognition, 37(2): 389-391.MATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag London Limited 2008

Authors and Affiliations

  • Annalisa Franco
    • 1
  • Davide Maltoni
    • 2
  1. 1.C.d.L. Scienze dell’InformazioneUniversitá di BolognaItaly
  2. 2.Scienze dell’InformazioneUniversitá di BolognaItaly

Personalised recommendations