25 research outputs found
Attacking a smartphone biometric fingerprint system:a novice’s approach
Biometric systems on mobile devices are an
increasingly ubiquitous method for identity verification. The
majority of contemporary devices have an embedded fingerprint
sensor which may be used for a variety of transactions including
unlock a device or sanction a payment. In this study we explore
how easy it is to successfully attack a fingerprint system using a
fake finger manufactured from commonly available materials.
Importantly our attackers were novices to producing the fingers
and were also constrained by time. Our study shows the relative
ease that modern devices can be attacked and the material
combinations that lead to these attacks
On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Nowadays, fingerprint-based biometric recognition systems are becoming
increasingly popular. However, in spite of their numerous advantages, biometric
capture devices are usually exposed to the public and thus vulnerable to
presentation attacks (PAs). Therefore, presentation attack detection (PAD)
methods are of utmost importance in order to distinguish between bona fide and
attack presentations. Due to the nearly unlimited possibilities to create new
presentation attack instruments (PAIs), unknown attacks are a threat to
existing PAD algorithms. This fact motivates research on generalisation
capabilities in order to find PAD methods that are resilient to new attacks. In
this context, we evaluate the generalisability of multiple PAD algorithms on a
dataset of 19,711 bona fide and 4,339 PA samples, including 45 different PAI
species. The PAD data is captured in the short wave infrared domain and the
results discuss the advantages and drawbacks of this PAD technique regarding
unknown attacks