This webpage has been moved.
Please click here for
Liveness Detection Resources .
Spoofing Fingerprint Devices
The Biomedical Signal Analysis Laboratory has been developing spoofing techniques in order to test a new liveness
algorithm. Our spoofing technique involves a mold made from dental
impression material (combination of type 0 and 3) and casts made from
Play-Doh and clay. These materials are most effective since they are
moisture based and most fingerprint technologies are able to image
them. We enrolled eleven live subjects, formed molds from the eleven
subjects, created six casts from each subject, and attempted to verify
for each cast. Various fingerprint scanners, including capacitive
DC, capacitive AC, optical and opto-electronic technologies, were
tested. All security levels were tested. Results shown here are for
the highest security level (Figure). For certain fingerprint scanners,
most subjects’ casts were able to spoof the system. For all
technologies, at least 3 of 11 subject’s casts were of sufficient
quality to spoof fingerprint devices at least once. It should be noted
that one device was chosen from each technology type. Even though
the specific device manufacturer’s name is withheld, these results
are tests of the entire system from scanner to image processing to
pattern recognition algorithms. Conclusions regarding one technology
over another should not be made, but rather, these tests are a demonstration
that spoofing is possible with a variety of fingerprint devices. In
addition, we also tested cadaver fingers in an attempt to address
the possibility that dismembered fingers could be used to spoof fingerprint
devices. In this method, fourteen cadaver fingers were enrolled and,
if able to enroll, verified six times each. For one device, six cadaver
fingers were not able to enroll. Cadaver fingers were able to be verified
from 40-94% of the time.
Figure. Results of verification of Play-Doh molds made from eleven
subjects, each verifying six times. The enrolled image was from the
|Figure. Results of verification of cadaver fingers from 14 subjects,
each verifying 6 times. The enrolled image was from the cadaver finger.
Six cadaver fingers for one device were unable to enroll
Published in Information Security Technical Report 2002.