25 research outputs found

    Attacking a smartphone biometric fingerprint system:a novice’s approach

    Get PDF
    Biometric systems on mobile devices are an increasingly ubiquitous method for identity verification. The majority of contemporary devices have an embedded fingerprint sensor which may be used for a variety of transactions including unlock a device or sanction a payment. In this study we explore how easy it is to successfully attack a fingerprint system using a fake finger manufactured from commonly available materials. Importantly our attackers were novices to producing the fingers and were also constrained by time. Our study shows the relative ease that modern devices can be attacked and the material combinations that lead to these attacks

    On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain

    Full text link
    Nowadays, fingerprint-based biometric recognition systems are becoming increasingly popular. However, in spite of their numerous advantages, biometric capture devices are usually exposed to the public and thus vulnerable to presentation attacks (PAs). Therefore, presentation attack detection (PAD) methods are of utmost importance in order to distinguish between bona fide and attack presentations. Due to the nearly unlimited possibilities to create new presentation attack instruments (PAIs), unknown attacks are a threat to existing PAD algorithms. This fact motivates research on generalisation capabilities in order to find PAD methods that are resilient to new attacks. In this context, we evaluate the generalisability of multiple PAD algorithms on a dataset of 19,711 bona fide and 4,339 PA samples, including 45 different PAI species. The PAD data is captured in the short wave infrared domain and the results discuss the advantages and drawbacks of this PAD technique regarding unknown attacks
    corecore