CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey on Fingerprint Spoofing, Detection Techniques and Databases

Published on December 2015 by Samruddhi S. Kulkarni, Hemprasad Y. Patil
National Conference on Advances in Computing
Foundation of Computer Science USA
NCAC2015 - Number 7
December 2015
Authors: Samruddhi S. Kulkarni, Hemprasad Y. Patil
cf956f10-1629-496a-897b-607fe7d85ee0

Samruddhi S. Kulkarni, Hemprasad Y. Patil . Survey on Fingerprint Spoofing, Detection Techniques and Databases. National Conference on Advances in Computing. NCAC2015, 7 (December 2015), 30-33.

@article{
author = { Samruddhi S. Kulkarni, Hemprasad Y. Patil },
title = { Survey on Fingerprint Spoofing, Detection Techniques and Databases },
journal = { National Conference on Advances in Computing },
issue_date = { December 2015 },
volume = { NCAC2015 },
number = { 7 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 30-33 },
numpages = 4,
url = { /proceedings/ncac2015/number7/23406-5077/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing
%A Samruddhi S. Kulkarni
%A Hemprasad Y. Patil
%T Survey on Fingerprint Spoofing, Detection Techniques and Databases
%J National Conference on Advances in Computing
%@ 0975-8887
%V NCAC2015
%N 7
%P 30-33
%D 2015
%I International Journal of Computer Applications
Abstract

In biometrics, Fingerprint is widely used in identification of individual's identity. Biometric recognition is leading technology for identification and security systems. Fingerprint has unique identification among all other biometric modalities. Use of the fingerprints as biometric characteristics is extensively used and developed for fingerprint recognition in forensic, civilian and commercial applications. This paper presents the brief data about fingerprint spoofing which encompasses misuse caused by the attackers. Fingerprint spoofing detection attributes to the investigation of the finger characteristics to ensure whether the finger is spoofed or live. The various spoofing types are explained and there detection techniques are introduced with three commonly used databases.

References
  1. Luca G, Valerio M, Simona T, Gian M, Fabio R. 2013,University of Cagliari - Department of Electrical and Electronic Engineering Italy. LivDet2013.
  2. Shahzad M, April 2012,Novel Active Sweat Pores Based Liveness Detection Techniques for Fingerprint Biometrics,Brunel University. School of Engineering and Design.
  3. David Y, Luca G, Paolo D, Gian Luca M, Fabio R,2011 S Schuckers,Clarkson University - Department of Electrical and Computer Engineering USA.
  4. Gian M, AaronT, Pietro C, Fabio R,Stephanie S, Dominic G, Alessandra Tand, LivDet 2009 Group.
  5. Mojtaba M, Wamadeva B, Jan 2010Liveness and Spoofing in Fingerprint Identification Issues and Challenges,School of Engineering & DesignBrunel UniversityUxbridge, Moddlesex.
  6. Emanuela M, Arun R, 2014. A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems ACM Comput. Surv. 47, 2, Article A ,36 pages.
  7. Javier G,,Julian F,,Javier,,Raffaele C,2014,Fingerprint Anti-spoofing in Biometric Systems, Springer London.
  8. ManeeshS,July 2014Detection and Prevention of FingerprintAltering /Spoofing Based on Pores (Level-3) withthe Help ofMultimodal Biometrics,International Journal of Science and Research (IJSR).
  9. Annalisa F,Davide M ,2008,Fingerprint Synthesis and Spoof Detection,Springer London.
  10. R. Derakhshani, S. Schuckers, L. Hornak, L. O'Gorman, "Determination of vitality from a noninvasive biomedical measurement for use in fingerprint scanners", Pattern Recognition.
  11. Maltoni D,Maio D, Jain A K, PrabhakarS,2003,Handbook of Fingerprint Recognitin,New York, Springer Verlog.
  12. Sousedik, C. ; Busch, C. , 12 2014 "Presentation attack detection methods for fingerprint recognition systems: a survey," in Biometrics, IET.
  13. Menotti, D. ; Chiachia, G. ; Pinto, A. ; Robson Schwartz, W. ; Pedrini, H. ; Xavier Falcao, A. ; Rocha, A. , April 2015 "Deep Representations for Iris, Face, and Fingerprint Spoofing Detection," in Information Forensics and Security, IEEE Transactions,vol. 10, no. 4, pp. 864-879.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Fingerprint Spoofing Detection Databases.