Are spoofs from latent fingerprints a real threat for the best
state-of-art liveness detectors?
- URL: http://arxiv.org/abs/2007.03397v2
- Date: Sat, 17 Oct 2020 15:03:59 GMT
- Title: Are spoofs from latent fingerprints a real threat for the best
state-of-art liveness detectors?
- Authors: Roberto Casula, Giulia Orr\`u, Daniele Angioni, Xiaoyi Feng, Gian Luca
Marcialis, Fabio Roli
- Abstract summary: ScreenSpoof method is a threat of the same level, in terms of detection and verification errors, as that of attacks using spoofs fabricated with the full consensus of the victim.
- Score: 9.666104375359701
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We investigated the threat level of realistic attacks using latent
fingerprints against sensors equipped with state-of-art liveness detectors and
fingerprint verification systems which integrate such liveness algorithms. To
the best of our knowledge, only a previous investigation was done with spoofs
from latent prints. In this paper, we focus on using snapshot pictures of
latent fingerprints. These pictures provide molds, that allows, after some
digital processing, to fabricate high-quality spoofs. Taking a snapshot picture
is much simpler than developing fingerprints left on a surface by magnetic
powders and lifting the trace by a tape. What we are interested here is to
evaluate preliminary at which extent attacks of the kind can be considered a
real threat for state-of-art fingerprint liveness detectors and verification
systems. To this aim, we collected a novel data set of live and spoof images
fabricated with snapshot pictures of latent fingerprints. This data set provide
a set of attacks at the most favourable conditions. We refer to this method and
the related data set as "ScreenSpoof". Then, we tested with it the performances
of the best liveness detection algorithms, namely, the three winners of the
LivDet competition. Reported results point out that the ScreenSpoof method is a
threat of the same level, in terms of detection and verification errors, than
that of attacks using spoofs fabricated with the full consensus of the victim.
We think that this is a notable result, never reported in previous work.
Related papers
- Fingerprint Liveness Detection using Minutiae-Independent Dense Sampling
of Local Patches [0.0]
Fingerprint recognition and matching is a common form of user authentication.
Spoof detection and liveness detection algorithms are being researched as countermeasures to this security vulnerability.
This paper introduces a fingerprint anti-spoofing mechanism using machine learning.
arXiv Detail & Related papers (2023-04-11T16:11:44Z) - Hierarchical Perceptual Noise Injection for Social Media Fingerprint
Privacy Protection [106.5308793283895]
fingerprint leakage from social media raises a strong desire for anonymizing shared images.
To guard the fingerprint leakage, adversarial attack emerges as a solution by adding imperceptible perturbations on images.
We propose FingerSafe, a hierarchical perceptual protective noise injection framework to address the mentioned problems.
arXiv Detail & Related papers (2022-08-23T02:20:46Z) - A review of schemes for fingerprint image quality computation [66.32254395574994]
This paper reviews existing approaches for fingerprint image quality computation.
We also implement, test and compare a selection of them using the MCYT database including 9000 fingerprint images.
arXiv Detail & Related papers (2022-07-12T10:34:03Z) - On the vulnerability of fingerprint verification systems to fake
fingerprint attacks [57.36125468024803]
A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it.
Results for an optical and a thermal sweeping sensors are given.
arXiv Detail & Related papers (2022-07-11T12:22:52Z) - SpoofGAN: Synthetic Fingerprint Spoof Images [47.87570819350573]
A major limitation to advances in fingerprint spoof detection is the lack of publicly available, large-scale fingerprint spoof datasets.
This work aims to demonstrate the utility of synthetic (both live and spoof) fingerprints in supplying these algorithms with sufficient data.
arXiv Detail & Related papers (2022-04-13T16:27:27Z) - Responsible Disclosure of Generative Models Using Scalable
Fingerprinting [70.81987741132451]
Deep generative models have achieved a qualitatively new level of performance.
There are concerns on how this technology can be misused to spoof sensors, generate deep fakes, and enable misinformation at scale.
Our work enables a responsible disclosure of such state-of-the-art generative models, that allows researchers and companies to fingerprint their models.
arXiv Detail & Related papers (2020-12-16T03:51:54Z) - Enabling Fingerprint Presentation Attacks: Fake Fingerprint Fabrication
Techniques and Recognition Performance [5.886986014593717]
We evaluate five different commercial-off-the-shelf fingerprint scanners based on different sensing technologies.
Several different materials to create the fake representation are tested and evaluated, including wax, cast, latex, silicone, different types of glue, window colours, modelling clay, etc.
arXiv Detail & Related papers (2020-12-01T16:20:32Z) - Artificial Fingerprinting for Generative Models: Rooting Deepfake
Attribution in Training Data [64.65952078807086]
Photorealistic image generation has reached a new level of quality due to the breakthroughs of generative adversarial networks (GANs)
Yet, the dark side of such deepfakes, the malicious use of generated media, raises concerns about visual misinformation.
We seek a proactive and sustainable solution on deepfake detection by introducing artificial fingerprints into the models.
arXiv Detail & Related papers (2020-07-16T16:49:55Z) - Level Three Synthetic Fingerprint Generation [0.0]
We present a novel hybrid approach to synthesize realistic, high-resolution fingerprints.
First, we improved Anguli, a handcrafted fingerprint generator, to obtain dynamic ridge maps with sweat pores and scratches.
We trained a CycleGAN to transform these maps into realistic fingerprints.
arXiv Detail & Related papers (2020-02-05T14:09:47Z) - An Overview of Fingerprint-Based Authentication: Liveness Detection and
Beyond [0.0]
We focus on methods to detect physical liveness, defined as techniques that can be used to ensure that a living human user is attempting to authenticate on a system.
We analyze how effective these methods are at preventing attacks where a malicious entity tries to trick a fingerprint-based authentication system to accept a fake finger as a real one.
arXiv Detail & Related papers (2020-01-24T20:07:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.