2011
DOI: 10.1016/j.forsciint.2010.05.002
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities of fingerprint reader to fake fingerprints attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(32 citation statements)
references
References 11 publications
0
32
0
Order By: Relevance
“…There are ample examples of spoofing biometric characteristics. Many authors [47][48][49][50][51] demonstrated how artificial fingerprints, molded after a latent user fingerprint or a template, can be used to bypass fingerprint authentication systems. The same can be said by iris authentication system which are also susceptible to spoofing [52].…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…There are ample examples of spoofing biometric characteristics. Many authors [47][48][49][50][51] demonstrated how artificial fingerprints, molded after a latent user fingerprint or a template, can be used to bypass fingerprint authentication systems. The same can be said by iris authentication system which are also susceptible to spoofing [52].…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…There are many studies [17-19, 24, 27] that examine methods to circumvent fingerprint based biometric systems. Espinoza et al [32] experimentally concluded that current state-of-the-art sensors can be deceived using spoof fingerprints, created with or without user cooperation. They also elaborate and measure the significance of quality of the spoof in attacks.…”
Section: Fingerprint Verificationmentioning
confidence: 99%
“…For example, retinal scanning, while accurate, is an unpleasant and invasive technology most users are not willing to accept as part of the authentication paradigm. Biometrics that are more socially acceptable, such as fingerprints, tend to be vulnerable to compromise, spoofing, and natural or accidental biometric variation [9].…”
Section: Limitations Of Traditional Authentication Techniques Andmentioning
confidence: 99%