http://iet.metastore.ingenta.com
1887

access icon openaccess Presentation attack detection methods for fingerprint recognition systems: a survey

  • HTML
    135.81640625Kb
  • PDF
    1.1335201263427734MB
  • XML
    167.4736328125Kb
Loading full text...

Full text loading...

/deliver/fulltext/iet-bmt/3/4/IET-BMT.2013.0020.html;jsessionid=wjaa7dkairqt.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-bmt.2013.0020&mimeType=html&fmt=ahah

References

    1. 1)
      • Y. Han , C. Ryu , J. Moon , H. Kim , H. Choi .
        1. Han, Y., Ryu, C., Moon, J., Kim, H., Choi, H.: ‘A study on evaluating the uniqueness of fingerprints using statistical analysis’. Information Security and Cryptology – ICISC 2004, 2005(LNCS, 3506), pp. 467477.
        . Information Security and Cryptology – ICISC 2004 , 467 - 477
    2. 2)
      • A. Zwiesele , A. Munde , C. Busch , H. Daum .
        2. Zwiesele, A., Munde, A., Busch, C., Daum, H.: ‘BioIS study. Comparative study of biometric identification systems’. Proc. 34th Annual Int. Carnahan Conf. on Security Technology, 2000, pp. 6063.
        . Proc. 34th Annual Int. Carnahan Conf. on Security Technology , 60 - 63
    3. 3)
    4. 4)
    5. 5)
    6. 6)
      • H. Kang , B. Lee , H. Kim , D. Shin , J. Kim .
        6. Kang, H., Lee, B., Kim, H., Shin, D., Kim, J.: ‘A study on performance evaluation of the liveness detection for various fingerprint sensor modules’. Knowledge-Based Intelligent Information and Engineering Systems, 2003(LNCS, 2774), pp. 12451253.
        . Knowledge-Based Intelligent Information and Engineering Systems , 1245 - 1253
    7. 7)
      • T. van der Putte , J. Keuning .
        7. van der Putte, T., Keuning, J.: ‘Biometrical fingerprint recognition: don't get your fingers burned’. Proc. IFIP TC8/WG8.8, 4thWorking Conf. on Smart Card Research and Advanced Applications, 2000, pp. 289303.
        . Proc. IFIP TC8/WG8.8, 4thWorking Conf. on Smart Card Research and Advanced Applications , 289 - 303
    8. 8)
      • T. Matsumoto , H. Matsumoto , K. Yamada , S. Hoshino .
        8. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: ‘Impact of artificial ‘gummy’ fingers on fingerprint systems’. Proc. SPIE 4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002, vol. 4677, pp. 275289.
        . Proc. SPIE 4677, Optical Security and Counterfeit Deterrence Techniques IV , 275 - 289
    9. 9)
      • A. Wiehe , T. Søndrol , O. Olsen , F. Skarderud .
        9. Wiehe, A., Søndrol, T., Olsen, O., Skarderud, F.: ‘Attacking fingerprint sensors’. Technical report, NISlab/Gjovik Univ. College, 2004.
        .
    10. 10)
      • S. Memon , M. Sepasian , W. Balachandran .
        10. Memon, S., Sepasian, M., Balachandran, W.: ‘Review of finger print sensing technologies’. Proc. IEEE Int. Multitopic Conf. (INMIC), 2008, pp. 226231.
        . Proc. IEEE Int. Multitopic Conf. (INMIC) , 226 - 231
    11. 11)
    12. 12)
      • R.K. Rowe , K.A. Nixon , P.W. Butler . (2008)
        12. Rowe, R.K., Nixon, K.A., Butler, P.W.: ‘Multispectral fingerprint image acquisition’, in Ratha, N., Govindaraju, V. (Eds.): ‘Advances in Biometrics’ (Springer, London, 2008), pp. 323.
        .
    13. 13)
      • C. Lee , S. Lee , J. Kim .
        13. Lee, C., Lee, S., Kim, J.: ‘A study of touchless fingerprint recognition system’. Structural, Syntactic, and Statistical Pattern Recognition, 2006(LNCS, 4109), pp. 358365.
        . Structural, Syntactic, and Statistical Pattern Recognition , 358 - 365
    14. 14)
      • D. Maltoni , D. Maio , A.K. Jain , S. Prabhakar . (2009)
        14. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: ‘Handbook of fingerprint recognition’ (Springer London, 2009, 2nd edn.), Ch. 9.5, pp. 386391.
        .
    15. 15)
      • D. Yambay , L. Ghiani , P. Denti , G. Marcialis , F. Roli , S. Schuckers .
        15. Yambay, D., Ghiani, L., Denti, P., Marcialis, G., Roli, F., Schuckers, S.: ‘LivDet 2011 – Fingerprint liveness detection competition 2011’. Proc. Fifth IAPR Int. Conf. on Biometrics (ICB), 2012, pp. 208215.
        . Proc. Fifth IAPR Int. Conf. on Biometrics (ICB) , 208 - 215
    16. 16)
    17. 17)
      • M. Espinoza , C. Champod .
        17. Espinoza, M., Champod, C.: ‘Using the number of pores on fingerprint images to detect spoofing attacks’. Proc. Int. Conf. on Hand-Based Biometrics (ICHB), 2011, pp. 15.
        . Proc. Int. Conf. on Hand-Based Biometrics (ICHB) , 1 - 5
    18. 18)
      • 18. International Organization for Standardization, ISO/IEC 5th WD 30107: ‘Information Technology – Biometrics – Presentation attack detection’, 2013.
        .
    19. 19)
      • P. Coli , G.L. Marcialis , F. Roli .
        19. Coli, P., Marcialis, G.L., Roli, F.: ‘Vitality detection from fingerprint images: a critical survey’. Proc. of the Int. Conf. on Advances in Biometrics (ICB ‘07), 2007, pp. 722731.
        . Proc. of the Int. Conf. on Advances in Biometrics (ICB ‘07) , 722 - 731
    20. 20)
      • J. Feng , A. Jain , A. Ross .
        20. Feng, J., Jain, A., Ross, A.: ‘Detecting altered fingerprints’. Proc. 20th Int. Conf. on Pattern Recognition (ICPR), 2010, pp. 16221625.
        . Proc. 20th Int. Conf. on Pattern Recognition (ICPR) , 1622 - 1625
    21. 21)
    22. 22)
      • M. Tiribuzi , M. Pastorelli , P. Valigi , E. Ricci .
        22. Tiribuzi, M., Pastorelli, M., Valigi, P., Ricci, E.: ‘A multiple kernel learning framework for detecting altered fingerprints’. Proc. 21st Int. Conf. on Pattern Recognition (ICPR), 2012, pp. 34023405.
        . Proc. 21st Int. Conf. on Pattern Recognition (ICPR) , 3402 - 3405
    23. 23)
      • S. Yoon , Q. Zhao , A. Jain .
        23. Yoon, S., Zhao, Q., Jain, A.: ‘On matching altered fingerprints’. Proc. Fifth IAPR Int. Conf. on Biometrics (ICB), 2012, pp. 222229.
        . Proc. Fifth IAPR Int. Conf. on Biometrics (ICB) , 222 - 229
    24. 24)
      • A. Petrovici , C. Lazar .
        24. Petrovici, A., Lazar, C.: ‘Identifying fingerprint alteration using the reliability map of the orientation field’, Ann. Univ. Craiova, Series Autom. Comput. Electron. Mechatronics, 2010, 7, (34), pp. 4552.
        . Ann. Univ. Craiova, Series Autom. Comput. Electron. Mechatronics , 34 , 45 - 52
    25. 25)
      • A. Petrovici .
        25. Petrovici, A.: ‘Simulating alteration on fingerprint images’. Proc. IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2012, pp. 15.
        . Proc. IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) , 1 - 5
    26. 26)
    27. 27)
      • C. Sousedik , R. Breithaupt , C. Busch .
        27. Sousedik, C., Breithaupt, R., Busch, C.: ‘Volumetric fingerprint data analysis using optical coherence tomography’. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), 2013, pp. 16.
        . Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG) , 1 - 6
    28. 28)
    29. 29)
      • H. Choi , R. Kang , K. CHoi , J. Kim .
        29. Choi, H., Kang, R., CHoi, K., Kim, J.: ‘Aliveness detection of fingerprints using multiple static features’. Proc. World Academy of Science, Engineering and Technology, 2007, vol. 22.
        . Proc. World Academy of Science, Engineering and Technology
    30. 30)
    31. 31)
      • C. Jin , S. Li , H. Kim , E. Park .
        31. Jin, C., Li, S., Kim, H., Park, E.: ‘Fingerprint liveness detection based on multiple image quality features’. Information Security Applications, 2011(LNCS, 6513), pp. 281291.
        . Information Security Applications , 281 - 291
    32. 32)
      • E. Marasco , C. Sansone .
        32. Marasco, E., Sansone, C.: ‘An anti-spoofing technique using multiple textural features in fingerprint scanners’. Proc. IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2010, pp. 814.
        . Proc. IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS) , 8 - 14
    33. 33)
      • B. Tan , S. Schuckers .
        33. Tan, B., Schuckers, S.: ‘Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing’. Proc. Computer Vision and Pattern Recognition Workshop (CVPRW ‘06), 2006, pp. 26.
        . Proc. Computer Vision and Pattern Recognition Workshop (CVPRW ‘06)
    34. 34)
    35. 35)
    36. 36)
    37. 37)
      • S. Nikam , S. Agarwal .
        37. Nikam, S., Agarwal, S.: ‘Wavelet energy signature and GLCM features-based fingerprint anti-spoofing’. Proc. Int. Conf. on Wavelet Analysis and Pattern Recognition (ICWAPR ‘08), 2008, vol. 2, pp. 717723.
        . Proc. Int. Conf. on Wavelet Analysis and Pattern Recognition (ICWAPR ‘08) , 717 - 723
    38. 38)
    39. 39)
    40. 40)
      • S. Nikam , S. Agarwal .
        40. Nikam, S., Agarwal, S.: ‘Gabor filter-based fingerprint anti-spoofing’. Advanced Concepts for Intelligent Vision Systems, 2008(LNCS, 5259), pp. 11031114.
        . Advanced Concepts for Intelligent Vision Systems , 1103 - 1114
    41. 41)
      • S. Nikam , S. Agarwal .
        41. Nikam, S., Agarwal, S.: ‘Fingerprint liveness detection using curvelet energy and co-occurrence signatures’. Proc. Fifth Int. Conf. on Computer Graphics, Imaging and Visualisation (CGIV ‘08), 2008, pp. 217222.
        . Proc. Fifth Int. Conf. on Computer Graphics, Imaging and Visualisation (CGIV ‘08) , 217 - 222
    42. 42)
      • S. Nikam , S. Agarwal .
        42. Nikam, S., Agarwal, S.: ‘Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems’. Proc. First Int. Conf. on Emerging Trends in Engineering and Technology (ICETET ‘08), 2008, pp. 675680.
        . Proc. First Int. Conf. on Emerging Trends in Engineering and Technology (ICETET ‘08) , 675 - 680
    43. 43)
      • L. Pereira , H. Pinheiro , J. Silva .
        43. Pereira, L., Pinheiro, H., Silva, J., et al: ‘A fingerprint spoof detection based on MLP and SVM’. Proc. Int. Joint Conf. on Neural Networks (IJCNN), 2012, pp. 17.
        . Proc. Int. Joint Conf. on Neural Networks (IJCNN) , 1 - 7
    44. 44)
      • P. Coli , G. Marcialis , F. Roli .
        44. Coli, P., Marcialis, G., Roli, F.: ‘Power spectrum-based fingerprint vitality detection’. Proc. IEEE Workshop on Automatic Identification Advanced Technologies, 2007, pp. 169173.
        . Proc. IEEE Workshop on Automatic Identification Advanced Technologies , 169 - 173
    45. 45)
    46. 46)
      • J. Jia , L. Cai , K. Zhang , D. Chen .
        46. Jia, J., Cai, L., Zhang, K., Chen, D.: ‘A new approach to fake finger detection based on skin elasticity analysis’. Proc. ICB, 2007, pp. 309318.
        . Proc. ICB , 309 - 318
    47. 47)
    48. 48)
      • Y. Zhang , J. Tian , X. Chen , X. Yang , P. Shi .
        48. Zhang, Y., Tian, J., Chen, X., Yang, X., Shi, P.: ‘Fake finger detection based on thin-plate spline distortion model’. Advances in Biometrics, 2007(LNCS, 4642), pp. 742749.
        . Advances in Biometrics , 742 - 749
    49. 49)
    50. 50)
    51. 51)
    52. 52)
      • J. Jia , L. Cai .
        52. Jia, J., Cai, L.: ‘Fake finger detection based on time-series fingerprint image analysis’. Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007(LNCS, 4681), pp. 11401150.
        . Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues , 1140 - 1150
    53. 53)
      • B. Decann , B. Tan , S. Schuckers .
        53. Decann, B., Tan, B., Schuckers, S.: ‘A novel region based liveness detection approach for fingerprint scanners’. Proc. Third Int. Conf. on Advances in Biometrics (ICB ‘09), 2009, pp. 627636.
        . Proc. Third Int. Conf. on Advances in Biometrics (ICB ‘09) , 627 - 636
    54. 54)
      • S.B. Nikam , S. Agarwal .
        54. Nikam, S.B., Agarwal, S.: ‘Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection’, Int. J. Inf. Comput. Sec., 2009, 3, (1), pp. 146.
        . Int. J. Inf. Comput. Sec. , 1 , 1 - 46
    55. 55)
      • G. Marcialis , F. Roli , A. Tidu .
        55. Marcialis, G., Roli, F., Tidu, A.: ‘Analysis of fingerprint pores for vitality detection’. Proc. 20th Int. Conf. on Pattern Recognition (ICPR), 2010, pp. 12891292.
        . Proc. 20th Int. Conf. on Pattern Recognition (ICPR) , 1289 - 1292
    56. 56)
      • S. Memon , N. Manivannan , W. Balachandran .
        56. Memon, S., Manivannan, N., Balachandran, W.: ‘Active pore detection for liveness in fingerprint identification system’. Proc. Telecommunications Forum (TELFOR), 2011 19th, 2011, pp. 619622.
        . Proc. Telecommunications Forum (TELFOR), 2011 19th , 619 - 622
    57. 57)
    58. 58)
      • W.Y. Yau , H.L. Tran , E.K. Teoh .
        58. Yau, W.Y., Tran, H.L., Teoh, E.K.: ‘Fake finger detection using an electrotactile display system’. Proc. Tenth Int. Conf. on Control, Automation, Robotics and Vision (ICARCV 2008), 2008, pp. 962966.
        . Proc. Tenth Int. Conf. on Control, Automation, Robotics and Vision (ICARCV 2008) , 962 - 966
    59. 59)
      • D. Baldisserra , A. Franco , D. Maio , D. Maltoni .
        59. Baldisserra, D., Franco, A., Maio, D., Maltoni, D.: ‘Fake fingerprint detection by odor analysis’. Advances in Biometrics, 2005(LNCS, 3832), pp. 265272.
        . Advances in Biometrics , 265 - 272
    60. 60)
    61. 61)
    62. 62)
      • 62. LUMIDIGM: ‘http://www.lumidigm.com/technology/.
        .
    63. 63)
      • S. Chang , K. Larin , Y. Mao , W. Almuhtadi , C. Flueraru . (2011)
        63. Chang, S., Larin, K., Mao, Y., Almuhtadi, W., Flueraru, C.: ‘Fingerprint spoof detection by NIR optical analysis’, in Yang, J. (Ed.): ‘State of the art in Biometrics’ (InTech, 2011).
        .
    64. 64)
      • M. Drahansky , R. Notzel , W. Funk .
        64. Drahansky, M., Notzel, R., Funk, W.: ‘Liveness detection based on fine movements of the fingertip surface’. Proc. IEEE Information Assurance Workshop, 2006, pp. 4247.
        . Proc. IEEE Information Assurance Workshop , 42 - 47
    65. 65)
    66. 66)
    67. 67)
    68. 68)
    69. 69)
    70. 70)
    71. 71)
    72. 72)
      • M. Menrath .
        72. Menrath, M.: ‘Fingerprint with OCT’. Master's thesis, Fern-Universität Hagen in Cooperation with Bundesamt für Sicherheit in der Informationstechnik (BSI), 2011.
        .
    73. 73)
      • G. Marcialis , A. Lewicke , B. Tan .
        73. Marcialis, G., Lewicke, A., Tan, B., et al: ‘First international fingerprint liveness detection competition – LivDet 2009’. Image Analysis and Processing – ICIAP 2009, 2009(LNCS, 5716), pp. 1223.
        . Image Analysis and Processing – ICIAP 2009 , 12 - 23
    74. 74)
      • L. Ghiani , P. Denti , G. Marcialis .
        74. Ghiani, L., Denti, P., Marcialis, G.: ‘Experimental results on fingerprint liveness detection’. Articulated Motion and Deformable Objects, 2012(LNCS, 7378), pp. 210218.
        . Articulated Motion and Deformable Objects , 210 - 218
    75. 75)
      • G. Marcialis , L. Ghiani , K. Vetter , D. Morgeneier , F. Roli .
        75. Marcialis, G., Ghiani, L., Vetter, K., Morgeneier, D., Roli, F.: ‘Large scale experiments on fingerprint liveness detection’. Structural, Syntactic, and Statistical Pattern Recognition, 2012(LNCS, 7626), pp. 501509.
        . Structural, Syntactic, and Statistical Pattern Recognition , 501 - 509
    76. 76)
    77. 77)
      • L. Ghiani , D. Yambay , V. Mura .
        77. Ghiani, L., Yambay, D., Mura, V., et al: ‘LivDet 2013 fingerprint liveness detection competition 2013’. Proc. Sixth IAPR Int. Conference on Biometrics (ICB), 2013.
        . Proc. Sixth IAPR Int. Conference on Biometrics (ICB)
    78. 78)
      • M. Sepasian , C. Mares , W. Balachandran .
        78. Sepasian, M., Mares, C., Balachandran, W.: ‘Vitality detection in fingerprint identification’, WSEAS Trans. Info. Sci. and App., 2010, 7, (4), pp. 498507.
        . WSEAS Trans. Info. Sci. and App. , 4 , 498 - 507
    79. 79)
      • S. Meissner , R. Breithaupt , E. Koch .
        79. Meissner, S., Breithaupt, R., Koch, E.: ‘Fingerprint fake detection by optical coherence tomography’. Proc. SPIE 8571, Optical Coherence Tomography and Coherence Domain Optical Methods in Biomedicine XVII, 2013, vol. 8571.
        . Proc. SPIE 8571, Optical Coherence Tomography and Coherence Domain Optical Methods in Biomedicine XVII
    80. 80)
      • 80. Biometrics Evaluation and Testing (BEAT): ‘http://www.beat-eu.org/.
        .
    81. 81)
      • 81. Trusted Biometrics under Spoofing Attacks (Tabula Rasa): ‘http://www.tabularasa-euproject.org/.
        .
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2013.0020
Loading

Related content

content/journals/10.1049/iet-bmt.2013.0020
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address