Encyclopedia of Biometrics

Living Edition
| Editors: Stan Z. Li, Anil K. Jain

Anti-spoofing: Fingerprint (Fake Fingers)

  • Jean-François Mainguet
Living reference work entry
DOI: https://doi.org/10.1007/978-3-642-27733-7_59-3


Cut finger problem; Dead finger detection; Fake finger detection; Gummy bear finger; Latex finger; Liveness detection; Liveness detection


Fingerprint fake detection is used to identify a fake finger, such as a cast made of latex. By extension, it also includes tests to detect a cut finger or dead finger, or a latent print remaining on a sensor after usage.


In “Diamonds are forever” (1971) [1], James Bond took the identity of Peter Frank with a thin layer of latex glued on his fingertip to spoof Tiffany Case’s camera. James was using a simple fake finger, but the situation can be worse. With automated fingerprint recognition systems becoming more widely used, concerns over fingerprint fake detection have increased. In March 2005, a team of carjackers in Subang Jaya in Malaysia chopped off part of the owner’s left index finger, when they realized that his S-Class Mercedes Benz had a security feature which would immobilize the car without his fingerprint....

This is a preview of subscription content, log in to check access.


  1. 1.
    “DIAMONDS ARE FOREVER” Copyright 1971 Danjaq S.A.Google Scholar
  2. 2.
    10ème anniversaire de la 1ère double greffe mondiale de mains / Hôpital Edouard Herriot, CHU de Lyon/February 5, 2010 (http://www.reseau-chu.org/fileadmin/reseau-chu/docs/2389/dp_final_double_greffe.pdf retrieved June 2013)
  3. 3.
    U.S. Department of Justice’s U.S. Attorney’s office for Arizona press release, 3 May 2006Google Scholar
  4. 4.
    T. van der Putte, J. Keuning, Biometrical fingerprint recognition don’t get your fingers burned, in Proceedings of IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, Bristol (Kluwer Academic, 2000), pp. 289–303, http://cryptome.org/fake-prints.htm. Retrieved June 2013
  5. 5.
    M. Kàkona, Biometrics: yes or no? Jan 2001, http://home.i.cz/kakl/biometrics/Biometricsyesorno.htm. Retrieved June 2013
  6. 6.
    L. Thalheim, J. Krissler, P.M. Ziegler, Body check: biometric access protection devices and their programs put to the test, http://www.larc.usp.br/~pbarreto/Leitura%202%20-%20Biometria.pdf. Retrieved Jun 2013
  7. 7.
    T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of artificial gummy fingers on fingerprint systems, in Optical Security and Counterfeit Deterrence Techniques IV, San Jose. Proceedings of SPIE, vol. #4677 (2002), http://cryptome.org/gummy.htm. Retrieved June 2013
  8. 8.
    H. Kang, B. Lee, H. Kim, D. Shin, J. Kim, A study on performance evaluation of the liveness detection for various fingerprint sensor modules, http://link.springer.com/chapter/10.1007%2F978-3-540-45226-3_169
  9. 9.
    J. Blommé, Evaluation of biometric security systems against artificial fingers, http://liu.diva-portal.org/smash/get/diva2:17879/FULLTEXT01. Retrieved June 2013
  10. 10.
    A. Stén, A. Kaseva, T. Virtanen, Fooling fingerprint scanners – biometric vulnerabilities of the precise biometrics 100 SC scanner, in 4th Australian Information Warfare and IT Secu- rity Conference, Adelaide (2003), http://www.cil.cnrs.fr/CIL/IMG/pdf/GiveMeAFinger.pdf. Retrieved June 2014
  11. 11.
    M. Sandström, Liveness Detection in Fingerprint Recognition Systems, thesis, Linkoping, 2004Google Scholar
  12. 12.
    T. van der Putte, Workshop spoofing fingerprints, SAFE-NL, University of Twente, http://www.safe-nl.org/meetings/08-06-2006/ton.pdf. Retrieved June 2013
  13. 13.
    Chaos Computer Club, How to fake fingerprints? 26 Oct 2004, http://dasalte.ccc.de/biometrie/fingerabdruck_kopieren?language=en. Retrieved June 2013
  14. 14.
    M. Martinez-Diaz, J. Fierrez-Aguilar, F. Alonso-Fernandez, J. Ortega-Garcia, J.A. Siguenza, Hill-climbing and brute-force attacks on biometric systems: a case study in match-on-card fingerprint verification, in Proceedings of 2006 40th Annual IEEE International Carnahan Conferences Security Technology, Lexington, Oct 2006, pp. 151–159Google Scholar
  15. 15.
    A. Ross, J. Shah, A.K. Jain, Towards reconstructing fingerprints from minutiae points, in Proceedings of SPIE Conference on Biometric Technology for Human Identification II, Orlando, Mar 2005, pp. 68–80Google Scholar
  16. 16.
    C. Barral, A. Tria, Fake fingers in fingerprint recognition: glycerin supersedes gelatin. Lect. Notes Comput. Sci. 5458, 57–69 (2009). http://link.springer.com/chapter/10.1007%2F978-3-642-02002-5_4
  17. 17.
    K.A. Nixon, R.K. Rowe, Multispectral fingerprint imaging for spoof detection, in Biometric Technology for Human Identification II, Orlando, ed. by A. Jain, N. Ratha. Proceedings of SPIE, vol. 5779 (Bellingham, 2005), pp. 214–225Google Scholar
  18. 18.
    S. Parthasaradhi, R. Derakhshani, L. Hornak, S.A.C. Schuckers, Time-series detection of perspiration as a liveness test in fingerprint devices. IEEE Trans. Syst. Man Cybern. C Appl. Rev. 35, 335–343 (2005)CrossRefGoogle Scholar
  19. 19.
    A. Antonelli, R. Cappelli, D. Maio, D. Maltoni, A new approach to fake finger detection based on skin distortion, in International Conference on Biometric Authentication (ICBA06), Hong Kong, Jan 2006Google Scholar
  20. 20.
    D. Baldisserra, A. Franco, D. Maio, D. Maltoni, Fake fingerprint detection by odor analysis, in International Conference on Biometric Authentication (ICBA06), Hong Kong, Jan 2006Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.GrenobleFrance
  2. 2.LETI, MINATEC CampusGrenobleFrance