Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?

by   Roberto Casula, et al.

We investigated the threat level of realistic attacks using latent fingerprints against sensors equipped with state-of-art liveness detectors and fingerprint verification systems which integrate such liveness algorithms. To the best of our knowledge, only a previous investigation was done with spoofs from latent prints. In this paper, we focus on using snapshot pictures of latent fingerprints. These pictures provide molds, that allows, after some digital processing, to fabricate high-quality spoofs. Taking a snapshot picture is much simpler than developing fingerprints left on a surface by magnetic powders and lifting the trace by a tape. What we are interested here is to evaluate preliminary at which extent attacks of the kind can be considered a real threat for state-of-art fingerprint liveness detectors and verification systems. To this aim, we collected a novel data set of live and spoof images fabricated with snapshot pictures of latent fingerprints. This data set provide a set of attacks at the most favourable conditions. We refer to this method and the related data set as "ScreenSpoof". Then, we tested with it the performances of the best liveness detection algorithms, namely, the three winners of the LivDet competition. Reported results point out that the ScreenSpoof method is a threat of the same level, in terms of detection and verification errors, than that of attacks using spoofs fabricated with the full consensus of the victim. We think that this is a notable result, never reported in previous work.


page 4

page 5


Generalizing Fingerprint Spoof Detector: Learning a One-Class Classifier

Prevailing fingerprint recognition systems are vulnerable to spoof attac...

On the vulnerability of fingerprint verification systems to fake fingerprint attacks

A new method to generate gummy fingers is presented. A medium-size fake ...

Analysis of "User-Specific Effect" and Impact of Operator Skills on Fingerprint PAD Systems

Fingerprint Liveness detection, or presentation attacks detection (PAD),...

Fingerprint recognition with embedded presentation attacks detection: are we ready?

The diffusion of fingerprint verification systems for security applicati...

Fooling State-of-the-Art Deepfake Detection with High-Quality Deepfakes

Due to the rising threat of deepfakes to security and privacy, it is mos...

LivDet in Action - Fingerprint Liveness Detection Competition 2019

The International Fingerprint liveness Detection Competition (LivDet) is...

Network Modelling of Criminal Collaborations with Dynamic Bayesian Steady Evolutions

The threat status and criminal collaborations of potential terrorists ar...

Please sign up or login with your details

Forgot password? Click here to reset