@ARTICLE{ iet:/content/journals/10.1049/iet-bmt.2013.0020, author = {Ctirad Sousedik}, affiliation = {Norwegian Information Security Laboratory (NISlab), Gjøvik University College, Teknologiveien 22, 2815 Gjøvik, Norway}, author = {Christoph Busch}, affiliation = {Norwegian Information Security Laboratory (NISlab), Gjøvik University College, Teknologiveien 22, 2815 Gjøvik, Norway}, keywords = {presentation attack detection methods;fingerprint recognition system;state-of-the-art sensors;security sensitive environments;forensic investigations;migration control;access control;fingerprint biometrics;}, ISSN = {2047-4938}, language = {English}, abstract = {Nowadays, fingerprint biometrics is widely used in various applications, varying from forensic investigations and migration control to access control as regards security sensitive environments. Any biometric system is potentially vulnerable against a fake biometric characteristic, and spoofing of fingerprint systems is one of the most widely researched areas. The state-of-the-art sensors can often be spoofed by an accurate imitation of the ridge/valley structure of a fingerprint. An individual may also try to avoid identification by altering his own fingerprint pattern. This study is a survey of presentation attack detection methods for fingerprints, both in terms of liveness detection and alteration detection.}, title = {Presentation attack detection methods for fingerprint recognition systems: a survey}, journal = {IET Biometrics}, issue = {4}, volume = {3}, year = {2014}, month = {December}, pages = {219-233(14)}, publisher ={Institution of Engineering and Technology}, copyright = {This is an open access article published by the IET under the Creative Commons Attribution-NonCommercial License <br/>(<a href="http://creativecommons.org/licenses/by-nc/3.0/" target="_blank">http://creativecommons.org/licenses/by-nc/3.0/</a>)}, url = {https://digital-library.theiet.org/;jsessionid=1j58sheidhlwp.x-iet-live-01content/journals/10.1049/iet-bmt.2013.0020} }