Corpus ID: 36762714

Attacking Fingerprint Sensors

  title={Attacking Fingerprint Sensors},
  author={Anders Wiehe and Ole Kasper Olsen and Fredrik Skarderud},
We leave our fingerprints behind everywhere like when going to a café for a coffee or a soda, yet we never think of the possibilities that others might steal our prints from the cup or glass we just drank from. In this report we have conducted several experiments of lifting such latent fingerprints, and later having used them to create artificial reproductions. We have tried to use several different materials and techniques to reproduce artificial fingers in both consensual and unconsensual… Expand
A Survey on Antispoofing Schemes for Fingerprint Recognition Systems
The literature is reviewed and the state of the art in fingerprint antispoofing is presented, which includes several countermeasures that discriminate between live fingerprints and spoof artifacts. Expand
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
This paper evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials, and gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials. Expand
An Introduction to Fingerprint Presentation Attack Detection
This chapter provides an introduction to Presentation Attack Detection (PAD), also coined anti-spoofing, in fingerprint biometrics, and summarizes key developments for that purpose in the last twoExpand
Presentation attack detection methods for fingerprint recognition systems: a survey
This study is a survey of presentation attack detection methods for fingerprints, both in terms of liveness detection and alteration detection. Expand
Android Fingerprint Sensor: Pitfalls and Challenges
  • Luminita Apostol, C. Dobre
  • Computer Science
  • 2018 IEEE 16th International Conference on Embedded and Ubiquitous Computing (EUC)
  • 2018
This paper analyses former and current issues affecting the fingerprint authentication in mobile devices powered by the Android operating system to identify privacy and security flaws of the existing implementations. Expand
Fingerprint Image Reconstruction from Standard Templates
The experimental results show that the reconstructed images are very realistic and that, although it is unlikely that they can fool a human expert, there is a high chance to deceive state-of-the-art commercial fingerprint recognition systems. Expand
Fingerprint Liveness Detection Using CNN Features of Random Sample Patches
Experimental results show that the proposed method can be applied to fingerprint liveness detection with a 3.42% average classification error rate on a LivDet2009 Identix sensor dataset. Expand
Evaluating software-based fingerprint liveness detection using Convolutional Networks and Local Binary Patterns
  • R. Nogueira, R. Lotufo, R. C. Machado
  • Computer Science
  • 2014 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) Proceedings
  • 2014
This work implements and evaluates two different feature extraction techniques for software-based fingerprint liveness detection: Convolutional Networks with random weights and Local Binary Patterns used in conjunction with a Support Vector Machine (SVM) classifier. Expand
Spoof Detection Schemes
The problem of determining if the presented trait originates from a living person has received relatively less attention and there are various points where the overall security of a biometric access system can be compromised. Expand
Information Leakage Prevention Using Public Key Encryption System and Fingerprint Augmented with Apriori Algorithm
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academicExpand


Impact of artificial "gummy" fingers on fingerprint systems
Gummy fingers, namely artificial fingers that are easily made of cheap and readily available gelatin, were accepted by extremely high rates by 11 particular fingerprint devices with optical or capacitive sensors. Expand
Fooling Fingerprint Scanners - Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner
This paper looks into the security of fingerprint scanners. To do this, an example device is chosen and some attempts to break its protection are made. We analyzed some vulnerability and then threeExpand
Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned
This article shows how all currently available fingerprint scanners can be fooled by dummies that are created with very limited means and skills, specifically verification based on fingerprints. Expand
Handbook of Fingerprint Recognition
This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators. Expand
Liveness Detection in Fingerprint Recognition Systems
Fingerprint scanning is the most common method of the biometric methods available today and it is expected that the security of fingerprin ... Expand
Best practices in testing and reporting performance of biometric devices.
The purpose of this document is to summarise the current understanding of the biometrics community of the best scientific practices for conducting technical performance testing towards the end ofExpand
Biometric access protection devices and their programs put to the test
  • c’t,
  • 2002