Abstract
The vulnerabilities of fingerprint-based recognition systems to direct attacks with and without the cooperation of the user are studied. Two different systems, one minutiae-based and one ridge feature-based, are evaluated on a database of real and fake fingerprints. Based on the fingerprint images quality and on the results achieved on different operational scenarios, we obtain a number of statistically significant observations regarding the robustness of the systems.
Similar content being viewed by others
References
Jain, A. K., Ross, A., & Flynn, P. (Eds.) (2008). Handbook of biometrics. Berlin: Springer.
Wayman, J., Jain, A., et al. (2005). Biometric systems. Technology, design and performance evaluation. Berlin: Springer.
Schneier, B. (1999). The uses and abuses of biometrics. Communications of the ACM, 48, 136.
Ratha, N., Connell, J., & Bolle, R. (2001). An analysis of minutiae matching strength. In LNCS : Vol. 2091. Proc. AVBPA (pp. 223–228). Berlin: Springer.
Maltoni, D., Maio, D., et al. (2003). Handbook of fingerprint recognition. Berlin: Springer.
Wehde, A., & Beffel, J. N. (1924). Finger-prints can be forged. Tremonia Publish Co.
Willis, D., & Lee, M. (1998). Biometrics under our thumb. Network Computing.
van der Putte, T., & Keuning, J. (2000). Biometrical fingerprint recognition: don’t get your fingers burned. In Proc. IFIP (pp. 289–303).
Matsumoto, T., Matsumoto, H., et al. (2002). Impact of artificial gummy fingers on fingerprint systems. In Proc. SPIE (Vol. 4677, pp. 275–289).
Thalheim, L., & Krissler, J. (2002). Body check: biometric access protection devices and their programs put to the test. CT Magazine, November 114–121.
Kang, H., Lee, B., et al. (2003). A study on performance evaluation of the liveness detection for various fingerprint sensor modules. In LNAI : Vol. 2774. Proc. KES (pp. 1245–1253). Berlin: Springer.
Galbally, J., Cappelli, R., Lumini, A., Gonzalez-de-Rivera, G., Maltoni, D., Fierrez, J., Ortega-Garcia, J., & Maio, D. (2010). An evaluation of direct attacks using fake fingers generated from ISO templates. Pattern Recognition Letters, 31(8), 725–732.
Cappelli, R., Lumini, A., et al. (2007). Fingerprint image reconstruction from standard templates. IEEE Trans. on Pattern Analysis and Machine Intelligence, 29, 1489–1503.
Tan, B., & Schuckers, S. (2006). Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners. In Proc. SPIE BTHI IV, Vol. 6202, sect. 62020A.
Antonelli, A., Capelli, R., et al. (2006). Fake finger detection by skin distortion analysis. IEEE Trans. on Information Forensics and Security, 1, 360–373.
Chen, Y., & Jain, A. K. (2005). Fingerprint deformation for spoof detection. In Proc. IEEE biometric symposium (pp. 19–21).
Coli, P., Marcialis, G. L., & Roli, F. (2008). Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device. International Journal of Image and Graphics, 8, 495–512.
Baldiserra, D., et al. (2006). Fake fingerprint detection by odor analysis. In LNCS : Vol. 3832. Proc. IAPR ICB (pp. 265–272). Berlin: Springer.
Lapsley, P., Less, J., et al. (1998). Anti-fraud biometric sensor that accurately detects blood flow. US Patent.
Biel, L., Pettersson, O., et al. (2001). ECG analysis: A new approach in human identification. IEEE Trans. on Instrumentation and Measurement, 50, 808–812.
Osten, D., Arneson, H. M., & Blan, B. L. (1998). Biometric personal authentication system. US Patent.
Watson, G. I., Garris, M. D., et al. (2004). User’s guide to NIST fingerprint image software 2 (NFIS2). National Institute of Standards and Technology.
Fierrez-Aguilar, J., Chen, Y., et al. (2006). Incorporating image quality in multi-algorithm fingerprint verification. In LNCS : Vol. 3832. Proc. IAPR ICB (pp. 213–220). Berlin: Springer.
Fronthaler, H., Kollreider, K., et al. (2008). Fingerprint image quality estimation and its application to multi-algorithm verification. Trans. on Information Forensics and Security, 3, 331–338.
Galbally, J., Fierrez, J., et al. (2006). On the vulnerability of fingerprint verification systems to fake fingerprint attacks. Proc. IEEE ICCST, 1, 130–136.
Fierrez, J., Ortega-Garcia, J., et al. (2007). BioSec baseline corpus: A multimodal biometric database. Pattern Recognition, 40, 1389–1392.
Tabassi, E., & Wilson, C. L. (2005). A novel approach to fingerprint image quality. Proc. IEEE ICIP, 2, 37–40.
Alonso-Fernandez, F., Fierrez, J., et al. (2003). A comparative study of fingerprint image quality estimation methods. IEEE Trans. on Information Forensics and Security, 2, 734–743.
Schuckers, M. E. (2003). Using the bet-binomial distribution to assess performance of a biometric identification device. Int. Journal of Image and Graphics, 3, 523–529.
Schuckers, M. E., Hawley, A., et al. (2004). A comparison of statistical methods for evaluating matching performance of a biometric identification device—a preliminary report. Proc. SPIE BTHI, 5404, 144–155.
Dass, S. C., Zhu, Y., & Jain, A. K. (2006). Validating a biometric authentication system: samples size requirements. IEEE Trans. on Pattern Analysis and Machine Intelligence, 28, 1902–1913.
Bolle, R., Ratha, N., & Pankanti, S. (2004). Error analysis of pattern recognition systems: the subsets bootstrap. Computer Vision and Image Understanding, 93, 1–33.
Fierrez-Aguilar, J., Ortega-Garcia, J., et al. (2005). Discriminative multimodal biometric authentication based on quality measures. Pattern Recognition, 38(5), 777–779.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Galbally, J., Fierrez, J., Alonso-Fernandez, F. et al. Evaluation of direct attacks to fingerprint verification systems. Telecommun Syst 47, 243–254 (2011). https://doi.org/10.1007/s11235-010-9316-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-010-9316-0