On the vulnerability of fingerprint verification systems to fake fingerprint attacks
2006 (English)In: Proceedings: International Carnahan Conference on Security Technology, Piscataway, N.J.: IEEE Press, 2006, 130-136 p.Conference paper (Refereed)
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it. Three different scenarios are considered in the experiments, namely: enrollment and test with real fingerprints, enrollment and test with fake fingerprints, and enrollment with real fingerprints and test with fake fingerprints. Results for an optical and a thermal sweeping sensors are given. Both systems are shown to be vulnerable to direct attacks. © 2006 IEEE.
Place, publisher, year, edition, pages
Piscataway, N.J.: IEEE Press, 2006. 130-136 p.
, Conference on Crime Countermeasures and Security. Proceedings, ISSN 0737-1160
IdentifiersURN: urn:nbn:se:hh:diva-21250DOI: 10.1109/CCST.2006.313441ISI: 000243472000021ScopusID: 2-s2.0-37849011664ISBN: 978-142440174-1OAI: oai:DiVA.org:hh-21250DiVA: diva2:589372
2006 40th Annual IEEE International Carnahan Conference on Security Technology, ICCST, Lexington, KY, USA, 16-19 October, 2006