In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors?

In this study, we want to determine if an attacker with different a priori information on the sensor parameters during the enrollment process can impersonate an individual. We have tested different apriorism such as the fingerprint class, sensor type, image resolution and the number of minutiae. Two different matching algorithms have been used on specific designed databases generated with SFinge. Two attack scenarii have been tested. Obtained results show that the knowledge of fingerprint class and resolution influence the attack success.

[1]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[2]  Sébastien Marcel,et al.  BEAT – biometrics evaluation and testing , 2013 .

[3]  Kai Huang,et al.  Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges , 2001, VIP.

[4]  Davide Maltoni,et al.  Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Raffaele Cappelli,et al.  SFinGe : an Approach to Synthetic Fingerprint Generation , 2004 .

[6]  Kenneth Ko,et al.  Users Guide to Export Controlled Distribution of NIST Biometric Image Software (NBIS-EC) , 2007 .

[7]  Christophe Rosenberger,et al.  EvaBio Platform for the Evaluation Biometric System , 2015, ICISS 2015.

[8]  Christophe Rosenberger,et al.  Security and performance evaluation platform of biometric match on card , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[9]  Christophe Rosenberger,et al.  EvaBio a New Modular Platform to Evaluate Biometric System , 2015, ICISSP.

[10]  Anil K. Jain,et al.  A Multichannel Approach to Fingerprint Classification , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[11]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[12]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[13]  Craig I. Watson,et al.  NIST IR 7477, Revision II, MINEX II Performance of Fingerprint Match-on-Card Algorithms - Phase IV Report , 2011 .

[14]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[15]  Colin Soutar Implementation of Biometric Systems - Security and Privacy Considerations , 2002, Inf. Secur. Tech. Rep..