Abstract
Fingerprints have been used for decades to verify the identity of an individual for various security reasons. Attackers have developed many approaches to deceive a fingerprint verification system, ranging from the sensor level, where gummy fingers are created, to gaining access to the decision-maker level, where the decision is made based on low matching criteria. Even though fingerprint sensor-level countermeasures have developed advanced metrics to detect any attempt to dupe the system, attackers still manage to outwit a fingerprint verification system. In this paper, we present the Micro-behavioral Fingerprint Analysis System (MFAS), a system that records the micro-behavior of the user’s fingertips over time as they are placing their fingerprint on the sensor. The system captures the stream of ridges as they are formed while placed on a sensor to combat the attacks that deceive the sensor. An experiment on 24 people was conducted, wherein the fingerprints and the behavior of the fingertip as it is placed were collected. Subsequently, a gummy finger was created to try to fool the system. Further, a legitimate user was chosen to participate in an experiment that mimicked an attempt to use their fingertip unwillingly to detect coerced fingerprint placement. After applying the micro-behavior, the system reported 100% true positives and 0% false-negatives when providing legitimate vs. gummy-based fingerprints to authenticate a malicious user. The system also reported a 100% accuracy in differentiating between a voluntary and a coerced fingerprint placement. The results improve the fingerprint robustness against attacks on a fingerprint sensor by factoring in micro-behavior, thus helping to overcome fake and coerced fingerprint attacks.
Funder
the Deanship of Scientific Research at the University of Tabuk
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference35 articles.
1. Kim, J., and Teoh, A.B.J. (2018, January 20–24). One-factor Cancellable Biometrics based on Indexing-First-Order Hashing for Fingerprint Authentication. Proceedings of the 24th International Conference on Pattern Recognition (ICPR), Beijing, China.
2. Syarif, M.A., Nen, L.M., Goh, A., Win, L.K., Ng, K.S., and Tiong, L.C.O. (2016, January 12–14). Challenge response interaction for biometric liveness establishment and template protection. Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand.
3. Fingerprint Image Reconstruction from Standard Templates;IEEE Trans. Pattern Anal. Mach. Intell.,2007
4. Memon, S., Manivannan, N., and Balachandran, W. (2011, January 22–24). Active pore detection for liveness in fingerprint identification system. Proceedings of the 2011 19th Telecommunications Forum (TELFOR), Belgrade, Serbia.
5. Johnson, P., and Schuckers, S. (2014, January 10–12). Fingerprint pore characteristics for liveness detection. Proceedings of the 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献