Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Wayman, A. Jain, D. Maltoni, and D. Maio. Biometric Systems: Technology, Design and Performance Evaluation Springer. 2005.
I. R. Buhan, P. H. Hartel. The state of the art in abuse of biometrics: Centre for Telematics and Information Technology, University of Twente, Enschede. 2005.
International Biometric Group. Spoof 2007 -High-Level Test Plan. New York, NY. 2006.
M. Sandström. Liveness Detection in Fingerprint Recognition systems. Linköpings Universitet: Linköping, Sweden. 2004.
S. A. Cole. Suspect Identities -A History of Fingerprinting and Criminal Identification. Cambridge, MA: Harvard University Press. 2001.
T. Van der Putte, J. Keuning. Biometrical fingerprint recognition: don’t get your fingers burned. IFIP TC8/WG88 Fourth Working Conference on Smart Card Research and Advanced Applications: Kluwer Academic; 2000. p. 289-303.
T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino. Impact of artificial gummy fingers on fingerprint systems. Proc SPIE, 4677:275-89, 2002.
S. T. V. Parthasaradhi. Comparison of Classification methods for perspiration based liveness algorithm. West Virginia University: Morgantown, West Virginia. 2003.
S. Schuckers, R. Derakhshani, S. Parthasardhi, L. Hornak. Liveness Detection in Biometric Devices. Electrical Engineering Handbook. 3rd ed. CRC Press. 2005.
S. T. V. Parthasaradhi, R. Derakhshani, L. A. Hornak, S. A. C. Schuckers. Time-series detection of perspiration as a liveness test in fingerprint devices. Systems, Man and Cybernetics, Part C, IEEE Transactions on, 35(3):335-43, 2005.
A. Wehde, J. N. Befiel. Finger-Prints can be forged. Chicago: Tremonia Publish Co. 1924.
D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar. Handbook of Fingerprint Recognition: Springer. 2003.
S. Schuckers. Spoofing and Anti-Spoofing Measures. Information Security Technical Report, 7(4):56-62, 2002.
L. Thalheim, J. Krissler, P.-M. Ziegler. Body Check: Biometric Access Protection Devices and their Programs Put to the Test. Heise Online. November 2002.
Lumidigm. J-Series Multispectral Fingerprint Sensors. Albuquerque, NM. 2006.
M. Lewis, P. Statham. CESG Biometric Security Capabilities Programme: Method, Results and Research Challenges. Biometrics Consortium Conference. Arlington, Virginia. 2004.
A. Wiehe, T. Søndrol, O. K. Olsen, F. Skarderud. Attacking Fingerprint Sensors. Gjøvik University College. 2004.
PhysOrg.com. Biometric expert shows an easy way to spoof fingerprint scanning devices. 2005.
J. Leyden. Biometric sensors beaten senseless in tests. The Register. May 23, 2002.
V. A. Grønland, H. Hasli, J. F. Pettersen. Challenging fingerprint scanner: NISLAB Authentication Laboratory, Gjøvik University College. 2005.
D. Rutter. Thinking Putty defeats Biometric Fingerprint Scanners! www. dansdata.com. 2007.
B. Schneier. Biometrics: Truths and Fictions. Crypto-Gram Newsletter. 1998.
A. Kaseva, A. Stén. Fooling Fingerprint Scanners: Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner. Helsinki University of Technology. 2003.
J. Leyden. Gummi bears defeat fingerprint sensors. The Register. May 16, 2002.
D. Rutter. Review: DigitalPersona U.are.U Personal fingerprint scanner. www.dansdata.com. 2002.
D. Willis, M. Lee. Six Biometric Devices Point The Finger At Security. Network Computing. 1998.
A. Ligon. An Investigation into the Vulnerability of the Siemens ID Mouse Professional Version 4. 2002.
R. Derakhshani, S. Schuckers, L. Hornak, L. O. Gorman. Determination of Vitality from A Non-Invasive Biomedical Measurement for Use in Fingerprint Scanners. Pattern Recognition Journal, 36(2):383-96, 2003.
FIDIS Consortium. Forensic Implications of Identity Management Systems. 2006.
H. Gravnås. Biometric Authentication: Is it a threat to take the end-users for grantedfi Gjøvik University College. 2005.
J. Blommé. Evaluation of biometric security systems against artificial fingers. Linköpings Universitet: Linköping, Sweden. 2003.
H. Kang, B. Lee, H. Kim, D. Shin, J. Kim. A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor Modules. Lecture Notes in Computer Science, Volume 2774/2003:1245-53, 2003.
Chaos Computer Club. How to fake fingerprintsfi www.ccc.de. 2004.
T. Matsumoto. Gummy Fingers and Paper Iris: An Update. The 2004 Workshop on Information Security Research: Yokohama National University. 2004.
D. C. Hitchcock. Evaluation and Combination of Biometric Authentication Systems. University of Florida. 2003.
InterNational Committee for Information Technology Standards. Study Report on Biometrics in E-Authentication. Washington, DC: Information Technology Industry Council. 2006.
A. S. Abhyankar, S. C. Schuckers. A wavelet-based approach to detecting liveness in fingerprint scanners. A. K. Jain, N. K. Ratha, editors. SPIE. p. 278-86.
R. K. Rowe. Multispectral Fingerprint Sensors. Biometric Consortium Conference. Arlington, Virginia USA. 2005.
P. Lapsley, J. Less, J. DF Pare, N. Hofiman, inventors; SmartTouch, LLC, assignee. Anti-Fraud Biometric Sensor that Accurately Detects Blood Flow. 1998.
J. Daugman, inventor Biometric Personal Identification System Based on Iris Analysis. US patent 5,291,560. 1994.
J. Daugman. How Iris Recognition Works. IEEE Transactions on Circuits and Systems for Video Technology, 14(1):21-30, 2004.
U. C. von Seelen. Countermeasures Against Iris Spoofing with Contact Lenses. Biometrics Consortium Conference. Arlington, VA. 2005.
A. Lefohn, B. Budge, P. Shirley, R. Caruso, E. Reinhard. An ocularist’s approach to human iris synthesis. Computer Graphics and Applications, IEEE, 23(6):70-5, 2003.
A. K. Jain, R. Bolle and S. Pankanti (Eds.), BIOMETRICS: Personal Identification in Networked society, Kluwer Academic Publishers, 1999.
findBiometrics.com. Interview with Dr. John Daugman, Cambridge University. 2004.
J. Daugman. Liveness Detection Countermeasures. University of Cambridge. 2005.
A. A. Ross, K. Nandakumar, A. K. Jain. Handbook of Multibiometrics Springer. 2006.
D. Sarkar. Identix integrating state-of-the-art skin and facial recognition technology. Federal Computer Week. 2004.
F. J. Prokoski, R. B. Riedel. Infrared identification of faces and body parts. A. K. Jain, R. Bolle, S. Pankanti, editors. Biometrics: Personal Identification in Networked Society, International Series in Engineering and Computer Science. Kluwer. 1999. p. 191-212.
J. Li, Y. Wang, T. Tan, A. K. Jain. Biometric Technology for Human Identification. In: A. K. Jain, N. K. Ratha, editors. SPIE; 2004. p. 296-303.
T. Fladsrud. Face Recognition in a Border Control Environment. Gjøvik University College. 2005.
European Commission BioSecure Project. Biometrics for Secure Authentication. 2005.
G. Parziale, J. Dittmann, M. Tistarelli. Analysis and evaluation of alternatives and advanced solutions for system elements: BioSecure. 2005.
H. Cummins, C. Midlo. Fingerprints, Palms and Soles: An Introduction to Dermatoglyphics. New York: Dover Publications Inc. 1961.
S. Sangiorgi, A. Manelli, T. Congiu, A. Bini, G. Pilato, M. Reguzzoni, et al. Microvascularization of the human digit as studied by corrosion casting. Journal of Anatomy, 204 (2):123-31, 2004.
S. Sangiorgi. Personal Communication with Matthew Ennis, PhD, Lumidigm. 2005.
A. Shiratsuki, E. Sano, M. Shikai, T. Nakashima, T. Takashima, M. Ohmi, et al. Novel optical fingerprint sensor utilizing optical characteristics of skin tissue under fingerprints. International Society for Optical Engineering, Proceedings of SPIE, 5686:80-7, 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Nixon, K.A., Aimale, V., Rowe, R.K. (2008). Spoof Detection Schemes. In: Jain, A.K., Flynn, P., Ross, A.A. (eds) Handbook of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71041-9_20
Download citation
DOI: https://doi.org/10.1007/978-0-387-71041-9_20
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-71040-2
Online ISBN: 978-0-387-71041-9
eBook Packages: Computer ScienceComputer Science (R0)