A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems

This paper serves to systematically describe the attempts made to forge fingerprints to fool biometric systems and to review all relevant publications on forging fingerprints to fool sensors. The research finds that many of the related works fail in this aspect and that past successes could not be repeated. First, the basics of biometrics are explained in order to define the meaning of the term security in this special context. Next, the state of the art of biometric systems is presented, followed by to the topic of security of fingerprint scanners. For this, a series of more than 30,000 experiments were conducted to fool scanners. The authors were able to reproduce and keep records of each single step in the test and to show which methods lead to the desired results. Most studies on this topic exclude a number of steps in producing a fake finger and fooling a fingerprint scanner are not explained, which means that some of the studies cannot be replicated. In addition, the authors' own ideas and slight variations of existing experiment set-ups are presented.

[1]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[2]  Alex Pentland,et al.  Face recognition using eigenfaces , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[3]  Gian Luca Marcialis,et al.  Fingerprint Verification by Decision-Level Fusion of Optical and Capacitive Sensors , 2004, ECCV Workshop BioAW.

[4]  Lus Gomes,et al.  Behavioral Modeling for Embedded Systems and Technologies: Applications for Design and Implementation , 2009 .

[5]  John Krogstie Frameworks for Developing Efficient Information Systems: Models, Theory, and Practice , 2013 .

[6]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[7]  Neil A. M. Maiden,et al.  Exploiting Codified User Task Knowledge to Discover Services at Design-Time , 2012, Int. J. Syst. Serv. Oriented Eng..

[8]  Ton van der Putte,et al.  Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.

[9]  John Daugman How iris recognition works , 2004 .

[10]  Sharath Pankanti,et al.  A Prototype Hand Geometry-based Verication System , 1999 .

[11]  Satoshi Takahashi,et al.  An Approach to Co-Dependent Value Based Internet Advertisement Auction , 2013, Int. J. Softw. Innov..

[12]  Z. Gumienny,et al.  Fingerprint structure imaging based on an ultrasound camera , 1999 .

[13]  Alfredo Pironti,et al.  JavaSPI: A Framework for Security Protocol Implementation , 2011, Int. J. Secur. Softw. Eng..

[14]  Atif M. Memon,et al.  Agile Quality Assurance Techniques for GUI-Based Applications , 2007 .

[15]  Johan Blommé Evaluation of biometric security systems against artificial fingers , 2003 .

[16]  Jacqueline Renée Reich Modelling molecular biological information: ontologies and ontological design patterns , 2000, IRMA Conference.

[17]  Carlos Eduardo Pereira,et al.  High-Level Design Space Exploration of Embedded Systems Using the Model-Driven Engineering and Aspect-Oriented Design Approaches , 2010 .

[18]  Marie Sandström Liveness Detection in Fingerprint Recognition Systems , 2004 .

[19]  Elena Kornyshova,et al.  Towards Method Component Contextualization , 2011, Int. J. Inf. Syst. Model. Des..

[20]  John Daugman,et al.  New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).