Fingerprint Alteration

The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the security afforded by these systems is not compromised. While several issues related to fingerprint system security have been investigated in the past, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received no attention in the biometric literature. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his or her identity. Several cases of fingerprint obfuscation have been described in the media. Existing image quality assessment software cannot detect such altered fingerprints since the implicit image quality during alteration may not change significantly. The goal of this paper is to understand the problem of altered fingerprints and to design solutions that can be used to detect these images. In this regard, this paper makes following contributions: (a) compiling case studies of incidents where individuals were found to have altered their fingerprints for circumventing fingerprint systems; (b) classifying the observed alterations into three broad categories and suggesting possible counter-measures; (c) a method to synthetically generate altered fingerprints in the absence of real-world data; (d) a technique to detect altered fingerprints; and (e) experimental results involving both real-world altered prints and synthetically generated altered prints. Experimental results show the feasibility of the proposed approach in detecting altered fingerprints and highlights the need to further pursue this research agenda.

[1]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[2]  S. Choo,et al.  Travel warning with capecitabine. , 2009, Annals of oncology : official journal of the European Society for Medical Oncology.

[3]  Jie Zhou,et al.  Modeling orientation fields of fingerprints with rational complex functions , 2004, Pattern Recognit..

[4]  Harold Cummins,et al.  Attempts to Alter and Obliterate Finger-Prints , 1935 .

[5]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[6]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[7]  A. Newell,et al.  Fingerprint formation. , 2005, Journal of theoretical biology.

[8]  Barry G. Sherlock,et al.  A model for interpreting fingerprint topology , 1993, Pattern Recognit..

[9]  H. L. Updegraff Changing of fingerprints , 1934 .

[10]  Paulo Schor,et al.  Iris recognition as a biometric method after cataract surgery , 2004, Biomedical engineering online.

[11]  Vladimir N. Dvornychenko,et al.  Summary of NIST latent fingerprint testing workshop , 2006 .

[12]  M. V. Winkle,et al.  SCIENCE-ADVERTISEMENTS 9 I Blakis ton Books I Cummins and Midlo Finger Prints , Palms and Soles An Introduction to Dermatoglyphics , 2005 .

[13]  Robert K. Rowe,et al.  Multispectral fingerprint imaging for spoof detection , 2005, SPIE Defense + Commercial Sensing.

[14]  Julian Fiérrez,et al.  A Comparative Study of Fingerprint Image-Quality Estimation Methods , 2007, IEEE Transactions on Information Forensics and Security.

[15]  David R. Ashbaugh,et al.  Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology , 1999 .

[16]  H PINKUS,et al.  The epidermal vs. the dermal fingerprint; an experimental and anatomical study. , 1958, A.M.A. archives of dermatology.

[17]  Richa Singh,et al.  Effect of plastic surgery on face recognition: A preliminary study , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[18]  Fanglin Chen,et al.  A Novel Algorithm for Detecting Singular Points from Fingerprint Images , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Kieran G Larkin,et al.  A coherent framework for fingerprint analysis: are fingerprints Holograms? , 2007, Optics express.

[20]  Charles L. Wilson,et al.  Matching Performance for the US-Visit IDENT System Using Flat Fingerprints , 2004 .

[21]  H. G. Hill,et al.  Finger prints, palms and soles. An introduction to dermatoglyphics , 1945 .

[22]  Davide Maltoni,et al.  On the Spatial Distribution of Fingerprint Singularities , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[23]  Anil K. Jain,et al.  Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[24]  Dario Maio,et al.  Synthetic fingerprint-database generation , 2002, Object recognition supported by user interaction for service robots.

[25]  R. Penrose,et al.  The topology of ridge systems , 1979, Annals of human genetics.

[26]  Anil K. Jain,et al.  FM Model Based Fingerprint Reconstruction from Minutiae Template , 2009, ICB.

[27]  Arun Ross,et al.  Fusion in Multibiometric Identification Systems: What about the Missing Data? , 2009, ICB.

[28]  Lawrence M Wein,et al.  Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indicator Technology Program. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[29]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[30]  J W BURKS The effect of dermabrasion on fingerprints; a preliminary report. , 1958, A.M.A. archives of dermatology.

[31]  Craig Watson,et al.  NIST 8-Bit Gray Scale Images of Fingerprint Image Groups (FIGS), NIST Special Database 4 , 1992 .