Call for Paper - August 2020 Edition
IJCA solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 20, 2020. Read More

Survey on Fingerprint Spoofing, Detection Techniques and Databases

Print
PDF
IJCA Proceedings on National Conference on Advances in Computing
© 2015 by IJCA Journal
NCAC 2015 - Number 7
Year of Publication: 2015
Authors:
Samruddhi S. Kulkarni
Hemprasad Y. Patil

Samruddhi S Kulkarni and Hemprasad Y Patil. Article: Survey on Fingerprint Spoofing, Detection Techniques and Databases. IJCA Proceedings on National Conference on Advances in Computing NCAC 2015(7):30-33, December 2015. Full text available. BibTeX

@article{key:article,
	author = {Samruddhi S. Kulkarni and Hemprasad Y. Patil},
	title = {Article: Survey on Fingerprint Spoofing, Detection Techniques and Databases},
	journal = {IJCA Proceedings on National Conference on Advances in Computing},
	year = {2015},
	volume = {NCAC 2015},
	number = {7},
	pages = {30-33},
	month = {December},
	note = {Full text available}
}

Abstract

In biometrics, Fingerprint is widely used in identification of individual's identity. Biometric recognition is leading technology for identification and security systems. Fingerprint has unique identification among all other biometric modalities. Use of the fingerprints as biometric characteristics is extensively used and developed for fingerprint recognition in forensic, civilian and commercial applications. This paper presents the brief data about fingerprint spoofing which encompasses misuse caused by the attackers. Fingerprint spoofing detection attributes to the investigation of the finger characteristics to ensure whether the finger is spoofed or live. The various spoofing types are explained and there detection techniques are introduced with three commonly used databases.

References

  • Luca G, Valerio M, Simona T, Gian M, Fabio R. 2013,University of Cagliari - Department of Electrical and Electronic Engineering Italy. LivDet2013.
  • Shahzad M, April 2012,Novel Active Sweat Pores Based Liveness Detection Techniques for Fingerprint Biometrics,Brunel University. School of Engineering and Design.
  • David Y, Luca G, Paolo D, Gian Luca M, Fabio R,2011 S Schuckers,Clarkson University - Department of Electrical and Computer Engineering USA.
  • Gian M, AaronT, Pietro C, Fabio R,Stephanie S, Dominic G, Alessandra Tand, LivDet 2009 Group.
  • Mojtaba M, Wamadeva B, Jan 2010Liveness and Spoofing in Fingerprint Identification Issues and Challenges,School of Engineering & DesignBrunel UniversityUxbridge, Moddlesex.
  • Emanuela M, Arun R, 2014. A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems ACM Comput. Surv. 47, 2, Article A ,36 pages.
  • Javier G,,Julian F,,Javier,,Raffaele C,2014,Fingerprint Anti-spoofing in Biometric Systems, Springer London.
  • ManeeshS,July 2014Detection and Prevention of FingerprintAltering /Spoofing Based on Pores (Level-3) withthe Help ofMultimodal Biometrics,International Journal of Science and Research (IJSR).
  • Annalisa F,Davide M ,2008,Fingerprint Synthesis and Spoof Detection,Springer London.
  • R. Derakhshani, S. Schuckers, L. Hornak, L. O'Gorman, "Determination of vitality from a noninvasive biomedical measurement for use in fingerprint scanners", Pattern Recognition.
  • Maltoni D,Maio D, Jain A K, PrabhakarS,2003,Handbook of Fingerprint Recognitin,New York, Springer Verlog.
  • Sousedik, C. ; Busch, C. , 12 2014 "Presentation attack detection methods for fingerprint recognition systems: a survey," in Biometrics, IET.
  • Menotti, D. ; Chiachia, G. ; Pinto, A. ; Robson Schwartz, W. ; Pedrini, H. ; Xavier Falcao, A. ; Rocha, A. , April 2015 "Deep Representations for Iris, Face, and Fingerprint Spoofing Detection," in Information Forensics and Security, IEEE Transactions,vol. 10, no. 4, pp. 864-879.