[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

An evaluation of direct attacks using fake fingers generated from ISO templates

Published: 01 June 2010 Publication History

Abstract

This work reports a vulnerability evaluation of a highly competitive ISO matcher to direct attacks carried out with fake fingers generated from ISO templates. Experiments are carried out on a fingerprint database acquired in a real-life scenario and show that the evaluated system is highly vulnerable to the proposed attack scheme, granting access in over 75% of the attempts (for a high-security operating point). Thus, the study disproves the popular belief of minutiae templates non-reversibility and raises a key vulnerability issue in the use of non-encrypted standard templates. (This article is an extended version of Galbally et al., 2008, which was awarded with the IBM Best Student Paper Award in the track of Biometrics at ICPR 2008).

References

[1]
Adler, A., 2003. Sample images can be independently restored from face recognition templates. In: Proc. CCECE, vol. 2, pp. 1163-1166.
[2]
A comparative study of fingerprint image quality estimation methods. IEEE Trans. Inform. Forensics Security. v2. 734-743.
[3]
ANSI X9.84, 2001. Biometric Information Management and Security.
[4]
Fake finger detection by skin distortion analysis. IEEE Trans. IFS. v1. 360-373.
[5]
BEM, 2002. Biometric Evaluation Methodology, V1.0.
[6]
. Synthetic Fingerprint Generation, 2003.Springer.
[7]
Cappelli, R., Lumini, A., Maio, D., Maltoni, D., 2006. Can fingerprints be reconstructed from iso templates? In: Proc. ICARCV, pp. 191-196.
[8]
Cappelli, R., Lumin, A., Maio, D., Maltoni, D., 2007a. Evaluating minutiae template vulnerability to masquerade attack. In: Proc. IEEE AutoID, pp. 174-179.
[9]
Fingerprint image reconstruction from standard templates. IEEE Trans. PAMI. v29. 1489-1503.
[10]
CC, 2006. Common Criteria for Information Technology Security Evaluation, V3.1.
[11]
Chen, T.P., Jiang, X., Yau, W.Y., 2004. Fingerprint image quality analysis. In: Proc. Internat. Conf. on Image Processing, ICIP, vol. 2, pp. 1253-1256.
[12]
Chen, Y., Dass, S., Jain, A.K., 2005. Fingerprint quality indices for predicting authentication performance. In: Proc. Internat. Conf. on Audio- and Video-Based Biometric Person Authentication, AVBPA. LNCS, vol. 3546. Springer, pp. 160-170.
[13]
Clancy, T.C., Kiyavash, N., Lin, D.J., 2003. Secure smartcard-based fingerprint authentication. In: Proc. ACMSIGMM, pp. 45-52.
[14]
Fierrez, J., Chen, Y., Ortega-Garcia, J., Jain, A.K., 2006. Incorporating image quality in multi-algorithm fingerprint verification. In: Proc. IAPR Internat. Conf. on Biometrics, ICB. LNCS, vol. 383. Springer, pp. 213-220.
[15]
Biosec baseline corpus: A multimodal biometric database. Pattern Recognition. v40. 1389-1392.
[16]
FVC, 2006. Fingerprint Verification Competition. <http://bias.csr.unibo.it/fvc2006>.
[17]
Galbally, J., Fierrez, J., Rodriguez-Gonzalez, J.D., Alonso-Fernandez, F., Ortega-Garcia, J., Tapiador, M., 2006. On the vulnerability of fingerprint verification systems to fake fingerprint attacks. In: Proc. IEEE ICCST, vol. 1, pp. 130-136.
[18]
Galbally, J., Cappelli, R., Lumini, A., Maltoni, D., Fierrez, J., 2008. Fake fingertip generation from a minutiae template. In: Proc. ICPR. IEEE Press, pp. 1-4.
[19]
Hill, C.J., 2001. Risk of Masquerade Arising from the Storage of Biometrics, B.S. Thesis. Autralian National University.
[20]
Fingerprint imagen enhancement: Algorithm and performance evaluation. IEEE Trans. Pattern Anal. Machine Intell. v20. 777-789.
[21]
ILO SID-0002, 2006. Finger Minutiae-Based Biometric Profile for Seafarers Identity Documents. Intl Labour Organization.
[22]
ISO/IEC 19794-2, 2005. Information Technology - Biometric Data Interchange Formats - Part 2: Finger Minutiae Data.
[23]
Biometrics: A tool for information security. IEEE Trans. IFS. v1 i2. 125-143.
[24]
Kang, H., Lee, B., Kim, H., Shin, D., Kim, J., 2003. A study on performance evaluation of the liveness detection for various fingerprint sensor modules. In: Proc. KES. LNAI, vol. 2774. Springer, pp. 1245-1253.
[25]
FVC2002: Second fingerprint verification competition. In: Proc. ICPR, IEEE Press. pp. 811-814.
[26]
Martinez-Diaz, M., Fierrez, J., Alonso-Fernandez, F., Ortega-Garcia, J., Siguenza, J.A., 2006. Hill-climbing and brute force attacks on biometric systems: A case study in match-on-card fingerprint verification. In: Proc. IEEE ICCST, vol. 1, pp. 151-159.
[27]
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, H., 2002. Impact of artificial gummy fingers on fingerprint systems. In: Proc. SPIE, vol. 4677, pp. 275-289.
[28]
NIST Special Publication 800-76, 2005. Biometric Data Specification for Personal Identity Verification, February 2005.
[29]
Ratha, N., Connell, J., Bolle, R., 2001. An analysis of minutiae matching strength. In: Proc. AVBPA. LNCS, vol. 2091. Springer, pp. 223-228.
[30]
Generating cancelable fingerprint templates. IEEE Trans. PAMI. v29. 561-572.
[31]
From template to image: Reconstructing fingerprints from minutiae points. IEEE Trans. PAMI. v29. 544-560.
[32]
The uses and abuses of biometrics. Comm. ACM. v48. 136
[33]
Soutar, C., Gilroy, R., Stoianov, A., 1999. Biometric system performance and security. In: Proc. IEEE AIAT.
[34]
Tan, B., Schuckers, S., 2006. Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners. In: Proc. SPIE, vol. 6202 (Sect. 62020A).
[35]
Thalheim, L., Krissler, J., 2002. Body Check: Biometric Access Protection Devices and their Programs Put to the Test. ct Magazine, pp. 114-121.
[36]
Uludag, U., Jain, A.K., 2004. Attacks on biometric systems: A case study in fingerprints. In: Proc. SPIE, vol. 5306, pp. 622-633.
[37]
van der Putte, T., Keuning, J., 2000. Biometrical fingerprint recognition: Don't get your fingers burned. In: Proc. IFIP, pp. 289-303.
[38]
A nonlinear orientation model for global description of fingerprints. Pattern Recognition. v29. 1221-1231.
[39]
Biometric Systems. Technology, Design and Performance Evaluation. Springer.

Cited By

View all
  • (2020)Continuous User Verification via Respiratory BiometricsIEEE INFOCOM 2020 - IEEE Conference on Computer Communications10.1109/INFOCOM41043.2020.9155258(1-10)Online publication date: 6-Jul-2020
  • (2018)Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian PyramidJournal of Electrical and Computer Engineering10.1155/2018/15392982018Online publication date: 9-Jan-2018
  • (2018)DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)10.1109/BTAS.2018.8698539(1-9)Online publication date: 22-Oct-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Pattern Recognition Letters
Pattern Recognition Letters  Volume 31, Issue 8
June, 2010
117 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 01 June 2010

Author Tags

  1. Biometric systems
  2. Direct attacks
  3. Fingerprint reconstruction
  4. Security
  5. Vulnerability

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Continuous User Verification via Respiratory BiometricsIEEE INFOCOM 2020 - IEEE Conference on Computer Communications10.1109/INFOCOM41043.2020.9155258(1-10)Online publication date: 6-Jul-2020
  • (2018)Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian PyramidJournal of Electrical and Computer Engineering10.1155/2018/15392982018Online publication date: 9-Jan-2018
  • (2018)DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)10.1109/BTAS.2018.8698539(1-9)Online publication date: 22-Oct-2018
  • (2017)Multi-biometric template protection based on Homomorphic EncryptionPattern Recognition10.1016/j.patcog.2017.01.02467:C(149-163)Online publication date: 1-Jul-2017
  • (2017)A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprintPattern Recognition10.1016/j.patcog.2016.09.00362:C(214-224)Online publication date: 1-Feb-2017
  • (2015)Fast match-on-card technique using in-matcher clustering with ISO minutia templateInternational Journal of Biometrics10.1504/IJBM.2015.0709257:2(119-146)Online publication date: 1-Jul-2015
  • (2015)An Investigation of Local Descriptors for Biometric Spoofing DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.240429410:4(849-863)Online publication date: 1-Apr-2015
  • (2015)Local contrast phase descriptor for fingerprint liveness detectionPattern Recognition10.1016/j.patcog.2014.05.02148:4(1050-1058)Online publication date: 1-Apr-2015
  • (2015)Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment schemeInternational Journal of Information Security10.1007/s10207-015-0273-114:6(549-560)Online publication date: 1-Nov-2015
  • (2014)A novel hand reconstruction approach and its application to vulnerability assessmentInformation Sciences: an International Journal10.1016/j.ins.2013.06.015268(103-121)Online publication date: 1-Jun-2014
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media