We investigated the threat level of realistic attacks using latent fingerprints against sensors equipped with state-of-art liveness detectors and fingerprint verification systems which integrate such liveness algorithms. To the best of our knowledge, only a previous investigation was done with spoofs from latent prints. In this paper, we focus on using snapshot pictures of latent fingerprints. These pictures provide molds, that allows, after some digital processing, to fabricate high-quality spoofs. Taking a snapshot picture is much simpler than developing fingerprints left on a surface by magnetic powders and lifting the trace by a tape. What we are interested here is to evaluate preliminary at which extent attacks of the kind can be considered a real threat for state-of-art fingerprint liveness detectors and verification systems. To this aim, we collected a novel data set of live and spoof images fabricated with snapshot pictures of latent fingerprints. This data set provide a set of attacks at the most favourable conditions. We refer to this method and the related data set as "ScreenSpoof". Then, we tested with it the performances of the best liveness detection algorithms, namely, the three winners of the LivDet competition. Reported results point out that the ScreenSpoof method is a threat of the same level, in terms of detection and verification errors, than that of attacks using spoofs fabricated with the full consensus of the victim. We think that this is a notable result, never reported in previous work.

Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? / Casula, R.; Orr(`u), G.; Angioni, D.; Feng, X.; Marcialis, G. L.; Roli, F.. - (2021), pp. 3412-3418. (Intervento presentato al convegno International Conference on Pattern Recognition tenutosi a Milano; Italia) [10.1109/ICPR48806.2021.9413301].

Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?

Angioni, D.
;
2021

Abstract

We investigated the threat level of realistic attacks using latent fingerprints against sensors equipped with state-of-art liveness detectors and fingerprint verification systems which integrate such liveness algorithms. To the best of our knowledge, only a previous investigation was done with spoofs from latent prints. In this paper, we focus on using snapshot pictures of latent fingerprints. These pictures provide molds, that allows, after some digital processing, to fabricate high-quality spoofs. Taking a snapshot picture is much simpler than developing fingerprints left on a surface by magnetic powders and lifting the trace by a tape. What we are interested here is to evaluate preliminary at which extent attacks of the kind can be considered a real threat for state-of-art fingerprint liveness detectors and verification systems. To this aim, we collected a novel data set of live and spoof images fabricated with snapshot pictures of latent fingerprints. This data set provide a set of attacks at the most favourable conditions. We refer to this method and the related data set as "ScreenSpoof". Then, we tested with it the performances of the best liveness detection algorithms, namely, the three winners of the LivDet competition. Reported results point out that the ScreenSpoof method is a threat of the same level, in terms of detection and verification errors, than that of attacks using spoofs fabricated with the full consensus of the victim. We think that this is a notable result, never reported in previous work.
2021
International Conference on Pattern Recognition
fingerprint liveness detection; presentation attacks
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors? / Casula, R.; Orr(`u), G.; Angioni, D.; Feng, X.; Marcialis, G. L.; Roli, F.. - (2021), pp. 3412-3418. (Intervento presentato al convegno International Conference on Pattern Recognition tenutosi a Milano; Italia) [10.1109/ICPR48806.2021.9413301].
File allegati a questo prodotto
File Dimensione Formato  
Casula_Are-spoofs_2021.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 4.55 MB
Formato Adobe PDF
4.55 MB Adobe PDF   Contatta l'autore
Casula_postprint_Are-spoof_2020.pdf

accesso aperto

Note: DOI: 10.1109/ICPR48806.2021.9413301
Tipologia: Documento in Post-print (versione successiva alla peer review e accettata per la pubblicazione)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 4.48 MB
Formato Adobe PDF
4.48 MB Adobe PDF

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1671708
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 9
  • ???jsp.display-item.citation.isi??? 6
social impact