Skip to main content

Fooling a Liveness-Detecting Capacitive Fingerprint Scanner

  • Chapter
Cryptography and Security: From Theory to Applications

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6805))

Abstract

Biometrics are increasingly being deployed as solutions to the security problems of authentication, identification and to some extent, non-repudiation. Biometrics are also publicized by proponents to be more secure than conventional mechanisms such as passwords and tokens, while also being more convenient too since there is no need to remember passwords nor carry anything around. Yet the security of biometrics lies on the assumption that biometric traits are unique to an individual and are unforgeable; once this assumption is invalidated, the security of biometrics collapses. Therefore, it is crucial to ensure that biometric traits are indeed unforgeable. In scientific literature, proponents have invented different ways for liveness detection, in order to differentiate forged traits from real ones, based on the premise that forged traits should not have liveness. In this paper, we show that a celebrated capacitive fingerprint scanner with liveness detection claims, can be fooled by fake fingers produced by amateurs from cheap commercially available materials. This brings into question that a gap may exist between what scientific literature has proposed for liveness detection and the actual robustness of liveness-detecting fingerprint scanners available in the market against fake fingers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barral, C.: Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography. PhD Dissertation, EPFL, Switzerland (2010)

    Google Scholar 

  2. Coterillo, E.: UPEK Sensors Will Detect Live Skin. Private communication (June 11, 2009)

    Google Scholar 

  3. Espinoza, M., Champod, C., Margot, P.: Vulnerabilities of Fingerprint Reader to Fake Fingerprints Attacks. Forensic Science International 204(1-3), 41–49 (2011)

    Article  Google Scholar 

  4. Galbally, J., Cappelli, R., Lumini, A., Gonzalez-de-Rivera, G., Maltoni, D., Fierrez, J., Ortega-Garcia, J., Maio, D.: An Evaluation of Direct Attacks using Fake Fingers Generated from ISO Templates. Pattern Recognition Letters 31(8), 725–732 (2010)

    Article  Google Scholar 

  5. Galbally, J., Fierrez, J., Alonso-Fernandez, F., Martinez-Diaz, M.: Evaluation of Direct Attacks to Fingerprint Verification Systems. Telecommunication Systems 47(3-4), 243–254 (2011)

    Article  Google Scholar 

  6. Gupta, B., Kramer, A.H.: Solid State Capacitive Switch. U.S. Patent 5,973,623 (October 26, 1999)

    Google Scholar 

  7. Gupta, B., Kramer, A.: Command Interface using Fingerprint Sensor Input System. U.S. Patent 7,239,227 (July 3, 2007)

    Google Scholar 

  8. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial “gummy” Fingers on Fingerprint Systems. In: Proc. SPIE, vol. 4677, pp. 275–289 (2002)

    Google Scholar 

  9. Phan, R.C.-W., Whitley, J.N., Parish, D.J.: On the Design of Forgiving Biometric Security Systems. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2009. IFIP Advances in Information and Communication Technology, vol. 309, pp. 1–8. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy 1(2), 33–42 (2003)

    Article  Google Scholar 

  11. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  12. Sasse, M.A.: Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: a User Experience of Biometric Airport Systems. IEEE Security and Privacy 5(3), 78–81 (2007)

    Article  Google Scholar 

  13. Sunaga, T., Ikehira, H., Furukawa, S., Tamura, M., Yoshitome, E., Obata, T., Shinkai, H., Tanada, S., Murata, H., Sasaki, Y.: Development of a Dielectric Equivalent Gel for Better Impedance Matching for Human Skin. Bioelectromagnetics 24(3), 214–217 (2003)

    Article  Google Scholar 

  14. UPEK Inc. UPEK Embedded Fingerprint Sensor Solutions (2009), http://www.upek.com/pdf/UPEK_flyer_Embedded_Solutions.pdf (accessed May 20, 2011)

  15. Vaudenay, S.: E-Passport Threats. IEEE Security and Privacy 5(6), 61–64 (2007)

    Article  Google Scholar 

  16. Wayman, J.L.: Biometrics in Identity Management Systems. IEEE Security and Privacy 6(2), 30–37 (2008)

    Article  Google Scholar 

  17. Zvetco. P5000 Fingerprint Device (2010), http://www.zvetcobiometrics.com/Business/Products/P5000/overview.jsp (accessed May 18, 2011)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bowden-Peters, E., Phan, R.C.W., Whitley, J.N., Parish, D.J. (2012). Fooling a Liveness-Detecting Capacitive Fingerprint Scanner. In: Naccache, D. (eds) Cryptography and Security: From Theory to Applications. Lecture Notes in Computer Science, vol 6805. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28368-0_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28368-0_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28367-3

  • Online ISBN: 978-3-642-28368-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics