This webpage has been moved.
Please click here for
Liveness Detection Resources .
Biometric devices, such as fingerprint, face, iris, voice, and handprint
recognition, have been suggested for use in applications from access
to personal computers, automated teller machines, credit card transactions,
electronic transactions to access control for airports, nuclear facilities,
and border control. Given this diverse array of potential applications,
biometric devices have the potential to provide additional security
over traditional security means such as passwords, keys, signatures,
picture identification, etc. While biometrics may improve security,
biometric systems also have vulnerabilities such as being spoofed
by artificial fingers or, in the worst case, dismembered fingers.
Two recent highly publicized drew attention to the spoofing vulnerabilities
of biometric devices. Matsumoto and colleagues developed a method
to spoof fingerprint devices making a mold from plastic and casts
using gelatin, termed “gummy fingers”. Secondly, Lisa
Thalheim and Jan Krissler for c’t magazine used simple techniques
such as breathing on the fingerprint scanner to reactivate the latent
fingerprint and using high-resolution still images and/or video. We
have developed spoofing techniques in our laboratory using Play-Doh
and cadaver fingers. Example spoof images are shown below. One method
for anti-spoofing protection is liveness testing, that is, to determine
if the biometric being captured is an actual measurement from the
authorized, live person who is present at the time of capture.
Perspiration for Detecting
Liveness in Fingerprint Scanners—Comparison of Different Classifiers
|Spoofing and Liveness Detection
- Brief Background
Spoofing Fingerprint Devices
Figure: Images of spoof fingerprints made from Play-Doh (bottom)
and of cadaver (top) fingerprints for a variety of fingerprint scanner