Skip to main content

Spoof Detection Schemes

  • Chapter
Handbook of Biometrics

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Wayman, A. Jain, D. Maltoni, and D. Maio. Biometric Systems: Technology, Design and Performance Evaluation Springer. 2005.

    Google Scholar 

  2. I. R. Buhan, P. H. Hartel. The state of the art in abuse of biometrics: Centre for Telematics and Information Technology, University of Twente, Enschede. 2005.

    Google Scholar 

  3. International Biometric Group. Spoof 2007 -High-Level Test Plan. New York, NY. 2006.

    Google Scholar 

  4. M. Sandström. Liveness Detection in Fingerprint Recognition systems. Linköpings Universitet: Linköping, Sweden. 2004.

    Google Scholar 

  5. S. A. Cole. Suspect Identities -A History of Fingerprinting and Criminal Identification. Cambridge, MA: Harvard University Press. 2001.

    Google Scholar 

  6. T. Van der Putte, J. Keuning. Biometrical fingerprint recognition: don’t get your fingers burned. IFIP TC8/WG88 Fourth Working Conference on Smart Card Research and Advanced Applications: Kluwer Academic; 2000. p. 289-303.

    Google Scholar 

  7. T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. Proc SPIE, 4677:275-89, 2002.

    Google Scholar 

  8. S. T. V. Parthasaradhi. Comparison of Classification methods for perspiration based liveness algorithm. West Virginia University: Morgantown, West Virginia. 2003.

    Google Scholar 

  9. S. Schuckers, R. Derakhshani, S. Parthasardhi, L. Hornak. Liveness Detection in Biometric Devices. Electrical Engineering Handbook. 3rd ed. CRC Press. 2005.

    Google Scholar 

  10. S. T. V. Parthasaradhi, R. Derakhshani, L. A. Hornak, S. A. C. Schuckers. Time-series detection of perspiration as a liveness test in fingerprint devices. Systems, Man and Cybernetics, Part C, IEEE Transactions on, 35(3):335-43, 2005.

    Article  Google Scholar 

  11. A. Wehde, J. N. Befiel. Finger-Prints can be forged. Chicago: Tremonia Publish Co. 1924.

    Google Scholar 

  12. D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar. Handbook of Fingerprint Recognition: Springer. 2003.

    Google Scholar 

  13. S. Schuckers. Spoofing and Anti-Spoofing Measures. Information Security Technical Report, 7(4):56-62, 2002.

    Article  Google Scholar 

  14. L. Thalheim, J. Krissler, P.-M. Ziegler. Body Check: Biometric Access Protection Devices and their Programs Put to the Test. Heise Online. November 2002.

    Google Scholar 

  15. Lumidigm. J-Series Multispectral Fingerprint Sensors. Albuquerque, NM. 2006.

    Google Scholar 

  16. M. Lewis, P. Statham. CESG Biometric Security Capabilities Programme: Method, Results and Research Challenges. Biometrics Consortium Conference. Arlington, Virginia. 2004.

    Google Scholar 

  17. A. Wiehe, T. Søndrol, O. K. Olsen, F. Skarderud. Attacking Fingerprint Sensors. Gjøvik University College. 2004.

    Google Scholar 

  18. PhysOrg.com. Biometric expert shows an easy way to spoof fingerprint scanning devices. 2005.

    Google Scholar 

  19. J. Leyden. Biometric sensors beaten senseless in tests. The Register. May 23, 2002.

    Google Scholar 

  20. V. A. Grønland, H. Hasli, J. F. Pettersen. Challenging fingerprint scanner: NISLAB Authentication Laboratory, Gjøvik University College. 2005.

    Google Scholar 

  21. D. Rutter. Thinking Putty defeats Biometric Fingerprint Scanners! www. dansdata.com. 2007.

    Google Scholar 

  22. B. Schneier. Biometrics: Truths and Fictions. Crypto-Gram Newsletter. 1998.

    Google Scholar 

  23. A. Kaseva, A. Stén. Fooling Fingerprint Scanners: Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner. Helsinki University of Technology. 2003.

    Google Scholar 

  24. J. Leyden. Gummi bears defeat fingerprint sensors. The Register. May 16, 2002.

    Google Scholar 

  25. D. Rutter. Review: DigitalPersona U.are.U Personal fingerprint scanner. www.dansdata.com. 2002.

    Google Scholar 

  26. D. Willis, M. Lee. Six Biometric Devices Point The Finger At Security. Network Computing. 1998.

    Google Scholar 

  27. A. Ligon. An Investigation into the Vulnerability of the Siemens ID Mouse Professional Version 4. 2002.

    Google Scholar 

  28. R. Derakhshani, S. Schuckers, L. Hornak, L. O. Gorman. Determination of Vitality from A Non-Invasive Biomedical Measurement for Use in Fingerprint Scanners. Pattern Recognition Journal, 36(2):383-96, 2003.

    Article  Google Scholar 

  29. FIDIS Consortium. Forensic Implications of Identity Management Systems. 2006.

    Google Scholar 

  30. H. Gravnås. Biometric Authentication: Is it a threat to take the end-users for grantedfi Gjøvik University College. 2005.

    Google Scholar 

  31. J. Blommé. Evaluation of biometric security systems against artificial fingers. Linköpings Universitet: Linköping, Sweden. 2003.

    Google Scholar 

  32. H. Kang, B. Lee, H. Kim, D. Shin, J. Kim. A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor Modules. Lecture Notes in Computer Science, Volume 2774/2003:1245-53, 2003.

    Google Scholar 

  33. Chaos Computer Club. How to fake fingerprintsfi www.ccc.de. 2004.

    Google Scholar 

  34. T. Matsumoto. Gummy Fingers and Paper Iris: An Update. The 2004 Workshop on Information Security Research: Yokohama National University. 2004.

    Google Scholar 

  35. D. C. Hitchcock. Evaluation and Combination of Biometric Authentication Systems. University of Florida. 2003.

    Google Scholar 

  36. InterNational Committee for Information Technology Standards. Study Report on Biometrics in E-Authentication. Washington, DC: Information Technology Industry Council. 2006.

    Google Scholar 

  37. A. S. Abhyankar, S. C. Schuckers. A wavelet-based approach to detecting liveness in fingerprint scanners. A. K. Jain, N. K. Ratha, editors. SPIE. p. 278-86.

    Google Scholar 

  38. R. K. Rowe. Multispectral Fingerprint Sensors. Biometric Consortium Conference. Arlington, Virginia USA. 2005.

    Google Scholar 

  39. P. Lapsley, J. Less, J. DF Pare, N. Hofiman, inventors; SmartTouch, LLC, assignee. Anti-Fraud Biometric Sensor that Accurately Detects Blood Flow. 1998.

    Google Scholar 

  40. J. Daugman, inventor Biometric Personal Identification System Based on Iris Analysis. US patent 5,291,560. 1994.

    Google Scholar 

  41. J. Daugman. How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology, 14(1):21-30, 2004.

    Article  Google Scholar 

  42. U. C. von Seelen. Countermeasures Against Iris Spoofing with Contact Lenses. Biometrics Consortium Conference. Arlington, VA. 2005.

    Google Scholar 

  43. A. Lefohn, B. Budge, P. Shirley, R. Caruso, E. Reinhard. An ocularist’s approach to human iris synthesis. Computer Graphics and Applications, IEEE, 23(6):70-5, 2003.

    Article  Google Scholar 

  44. A. K. Jain, R. Bolle and S. Pankanti (Eds.), BIOMETRICS: Personal Identification in Networked society, Kluwer Academic Publishers, 1999.

    Google Scholar 

  45. findBiometrics.com. Interview with Dr. John Daugman, Cambridge University. 2004.

    Google Scholar 

  46. J. Daugman. Liveness Detection Countermeasures. University of Cambridge. 2005.

    Google Scholar 

  47. A. A. Ross, K. Nandakumar, A. K. Jain. Handbook of Multibiometrics Springer. 2006.

    Google Scholar 

  48. D. Sarkar. Identix integrating state-of-the-art skin and facial recognition technology. Federal Computer Week. 2004.

    Google Scholar 

  49. F. J. Prokoski, R. B. Riedel. Infrared identification of faces and body parts. A. K. Jain, R. Bolle, S. Pankanti, editors. Biometrics: Personal Identification in Networked Society, International Series in Engineering and Computer Science. Kluwer. 1999. p. 191-212.

    Google Scholar 

  50. J. Li, Y. Wang, T. Tan, A. K. Jain. Biometric Technology for Human Identification. In: A. K. Jain, N. K. Ratha, editors. SPIE; 2004. p. 296-303.

    Google Scholar 

  51. T. Fladsrud. Face Recognition in a Border Control Environment. Gjøvik University College. 2005.

    Google Scholar 

  52. European Commission BioSecure Project. Biometrics for Secure Authentication. 2005.

    Google Scholar 

  53. G. Parziale, J. Dittmann, M. Tistarelli. Analysis and evaluation of alternatives and advanced solutions for system elements: BioSecure. 2005.

    Google Scholar 

  54. H. Cummins, C. Midlo. Fingerprints, Palms and Soles: An Introduction to Dermatoglyphics. New York: Dover Publications Inc. 1961.

    Google Scholar 

  55. S. Sangiorgi, A. Manelli, T. Congiu, A. Bini, G. Pilato, M. Reguzzoni, et al. Microvascularization of the human digit as studied by corrosion casting. Journal of Anatomy, 204 (2):123-31, 2004.

    Article  Google Scholar 

  56. S. Sangiorgi. Personal Communication with Matthew Ennis, PhD, Lumidigm. 2005.

    Google Scholar 

  57. A. Shiratsuki, E. Sano, M. Shikai, T. Nakashima, T. Takashima, M. Ohmi, et al. Novel optical fingerprint sensor utilizing optical characteristics of skin tissue under fingerprints. International Society for Optical Engineering, Proceedings of SPIE, 5686:80-7, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Nixon, K.A., Aimale, V., Rowe, R.K. (2008). Spoof Detection Schemes. In: Jain, A.K., Flynn, P., Ross, A.A. (eds) Handbook of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71041-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-71041-9_20

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-71040-2

  • Online ISBN: 978-0-387-71041-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics