Fingerprint Synthesis and Spoof Detection
This chapter addresses two topical issues in the field of fingerprint-based biometric systems: fingerprint template reverse-engineering, that is, the synthesis of fingerprint images starting from minutiae-based templates; and fake fingerprint detection, that is, discriminating between real and fake fingerprint impressions, the latter generated by artificial reproductions of a finger. After a brief review of the current state of the art, two innovative techniques are discussed in detail: a reconstruction approach able to synthesize a valid fingerprint image from an ISO 19794-2 template and a fake fingerprint detection method based on analysis of the finger odor.
KeywordsSecurity Level Electronic Nose Biometric System Fingerprint Image Successful Attack
Unable to display preview. Download preview PDF.
- Baldisserra, D., Franco, A., Maio, D., and Maltoni, D. (2006) Fake fingerprint detection by odor analysis. In Proc. International Conference on Biometrics, pp. 265-272.Google Scholar
- Brownlee, K. (2001) Method and apparatus for distinguishing a human finger from a reproduction of a fingerprint. US Patent #6,292,576.Google Scholar
- Cappelli, R. (2003) Synthetic fingerprint generation. In D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York.Google Scholar
- Cappelli, R., Lumini, A., Maio, D., and Maltoni, D. (2006) Can fingerprints be reconstructed from ISO templates? In Proc. International Conference on Control, Automation, Robotics and Vision.Google Scholar
- Derakhshani, R., Scuckers S., Hornak, L., and O’Gorman, L. (2003) Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recognition, 17(2): 383-396.Google Scholar
- Hill, C. (2001) Risk of masquerade arising from the storage of biometrics. Bachelor of Science thesis, The Department of Computer Science, Australian National University.Google Scholar
- Hurst, W.J. (1999) Electronic Noses and Sensor Array Based Systems : Design and Applications. Technomic.Google Scholar
- ISO/IEC 19794-2:2005, Information technology - Biometric data interchange formats - Part 2: Finger minutiae data.Google Scholar
- Kallo, P., Kiss, I., Podmaniczky, A., and Talosi, A. (2001) Detector for Recognizing the Living Character of a Finger in a Fingerprint Recognizing Apparatus. Dermo Corporation, Ltd. US Patent #6,175,641.Google Scholar
- Keller, P.E. (1995) Electronic noses and their applications. In Proc. IEEE Technical Applications Conference and Workshops Northcon, pp. 116-120.Google Scholar
- Lapsley, P.D., Less, J.A., Pare, D.F.Jr., , and Hoffman, N. (1998) Anti-Fraud Biometric Sensor that Accurately Detects Blood Flow. SmartTouch, LLc, US Patent #5,737,439.Google Scholar
- Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., and Jain, A.K. (2002) FVC2002: Second fingerprint verification competition. In Proc. 16th International Conference on Pattern Recognition (ICPR2002), vol. 3, pp. 811-814. FVC2002 Web site: http://bias.csr.unibo.it/fvc2002.
- Matsumoto, T., Matsumoto, H., Yamada, K., and Hoshino, S. (2002) Impact of artificial “gummy” fingers on fingerprint systems. In Proc. SPIE, pp. 275-289.Google Scholar
- MINEX, NIST Minutiae Interoperability Exchange Test, http://fingerprint.nist.gov/minex
- Nixon, K.A., Rowe, R.K., Allen, J., Corcoran, S., Fang, L., Gabel, D., Gonzales, D., Harbour, R., Love, S., McCaskill, R., Ostrom, B., Sidlauskas, D., and Unruh, K. (2004) Novel spectroscopy-based technology for biometric and liveness verification. In Proc. of SPIE, vol. 5404, pp. 287-295.CrossRefGoogle Scholar
- Osten, D., Carim, H.M., Arneson, M.R., and Blan, B.L. (1998) Biometric, Personal Authentication System. Minnesota Mining and Manufacturing Company, US Patent #5,719,950.Google Scholar
- Putte, T.v.D. and Keuning, J. (2000) Biometrical fingerprint recognition: Don’t get your fingers burned. In Proc. Working Conference on Smart Card Research and Advanced Applications, pp. 289-303.Google Scholar
- Ross, A., Shah, J., and Jain, A.K. (2005) Toward reconstructing fingerprints from minutiae points. In A.K. Jain, N.K. Ratha (Eds), Proc. of SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68-80.Google Scholar
- Schneier, B. (1998) Security pitfalls in cryptography. In Proc. CardTech/ SecureTech Conf., pp. 621-626.Google Scholar
- Setlak, D.R. (1999) Fingerprint Sensor Having Spoof Reduction Features and Related Methods. US Patent #5,953,441.Google Scholar
- Tan, B. and Schuckers, S.A.C. (2006) Liveness detection for fingerprint scan-ners based on the statistics of wavelet signal processing. In Proc. IEEE Conference on Computer Vision and Pattern Recognition Workshop, pp. 26-33.Google Scholar
- Thalheim, L., Krissler, J., and Ziegler, P.M. (2002) Bodycheck: Biometric access protection devices and their programs put to the test. C’T, 11, May 22,2002.(www.heise.de/ct/english/02/11/114/).
- Tuyls, P. and Goseling, J. (2004) Capacity and examples of template protecting biometric authentication systems. In Proc. Biometric Authentication Workshop, pp. 158-170.Google Scholar
- Uludag, U. and Jain, A.K. (2004) Attacks on biometric systems: A case study in fingerprints. In E.J. Delp III, P.W. Wong (Eds.), Proc. of SPIE, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622-633.Google Scholar
- U.S. General Accounting Office (2002) Using Biometrics for Border Security. Government Accountability Office, Washington, DC, report GAO-03-174.Google Scholar
- Watson, C. and Garris, M. (2004) NIST Fingerprint Image Software 2 (NFIS2), National Institute of Standards and Technology. URL: http://fingerprint.nist.gov/NFIS.