14
360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006 Fake Finger Detection by Skin Distortion Analysis Athos Antonelli, Raffaele Cappelli, Dario Maio, and Davide Maltoni, Member, IEEE Abstract—Attacking fingerprint-based biometric systems by presenting fake fingers at the sensor could be a serious threat for unattended applications. This work introduces a new approach for discriminating fake fingers from real ones, based on the anal- ysis of skin distortion. The user is required to move the finger while pressing it against the scanner surface, thus deliberately exaggerating the skin distortion. Novel techniques for extracting, encoding and comparing skin distortion information are formally defined and systematically evaluated over a test set of real and fake fingers. The proposed approach is privacy friendly and does not require additional expensive hardware besides a fingerprint scanner capable of capturing and delivering frames at proper rate. The experimental results indicate the new approach to be a very promising technique for making fingerprint recognition systems more robust against fake-finger-based spoofing attempts. Index Terms—Biometric systems, fake fingers, security, skin distortion, skin elasticity. I. INTRODUCTION B IOMETRIC systems offer great benefits with respect to other authentication techniques: in particular, they are often more user friendly and can guarantee the physical pres- ence of the user. Thanks to their good performance and to the growing market of low-cost acquisition devices, fingerprint- based identification/verification systems are becoming very popular and are being deployed in a wide range of applications: from PC logon to electronic commerce, from ATMs to phys- ical access control [18]. On the other hand, it is important to understand that, as any other authentication technique, finger- print recognition is not totally spoof-proof. The main potential threats for fingerprint-based systems are [28], [29] attacking the communication channels, including replay at- tacks on the channel between the sensor and the rest of the system; attacking specific software modules (e.g., replacing the feature extractor or the matcher with a Trojan horse); attacking the database of enrolled templates; presenting fake fingers to the sensor. Recently, the feasibility of the last type of attack has been reported by some researchers [19], [25]: they showed that it is actually possible to spoof some fingerprint recognition systems with well-made fake fingertips (Fig. 1), created with the collaboration of the fingerprint owner or from a latent Manuscript received January 18, 2006; revised May 3, 2006. This work was supported by the European Commission (BioSec—FP6 IST-2002-001766). The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Anil Jain. A. Antonelli is with the Biometrika s.r.l., Forlì 47100, Italy (e-mail: an- [email protected]). R. Cappelli, D. Maio, and D. Maltoni are with the DEIS—Università di Bologna, Cesena (FO) 47023, Italy (e-mail: [email protected]; maio@ csr.unibo.it; [email protected]). Digital Object Identifier 10.1109/TIFS.2006.879289 fingerprint; in the latter case, the procedure is more difficult but still possible. A deep study on the feasibility of spoofing some commercial fingerprint scanners was performed by the authors within the BioSec project [1], [5], [2]. From the critical review of the related bibliography (as described in Section II) and from the 24-months experience we accumulated by making hundreds of fake fingers with different materials and procedures and using them to spoof existing fingerprint scanners (of different types: optical, capacitive, thermals, RF-based, etc.), we may draw some conclusions. Forging a fake finger is not as easy as some authors claim, even when the person whose finger has to be cloned is cooperative; it is necessary to find the right materials to mould the cast, learn the right process and handle with care the artificial finger. Creating a fake finger from a latent fingerprint is sig- nificantly more difficult, requiring a skill comparable to that of a forensic expert equipped with the appropriate instrumentation. To the best of our knowledge and from the experience gained testing recent scanners provided with fake detec- tion mechanisms, nowadays, in spite of the claims of some fingerprint scanner producers, no commercial fingerprint scanner (among those we tested) seems to be resistant to well-made fake fingerprints. The lack of satisfactory solutions to reject fake fingers shows that there are a lot of challenges in fake detection; more research and investments on fingerprint fake detec- tion methods are needed. This work introduces a novel method for discriminating fake fingers from real ones, based on the analysis of a peculiar char- acteristic of the human skin: its elasticity. When a real finger moves on a scanner surface, it produces a significant amount of distortion, which can be observed to be quite different from that produced by fake fingers. Usually fake fingers are more rigid than skin and the distortion is definitely lower; even if highly elastic materials are used, it seems very difficult to precisely emulate the specific way a real finger is distorted, because the behavior is related to the way the external skin is anchored to the underlying derma and influenced by the position and shape of the finger bone. The analysis of skin distortion requires in input a sequence of frames instead of a single static image. To this purpose, the fingerprint scanner must be able to deliver a set of frames (Fig. 2) to the processing unit at a high speed (at least 20 frames per second). In our study, we used the prototype of a fingerprint scanner that the company Biometrika developed within the BioSec project [5] (Fig. 3). A database of video sequences has been collected, acquiring images both from real and fake fingers. Systematic experiments 1556-6013/$20.00 © 2006 IEEE

360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006

Fake Finger Detection by Skin Distortion AnalysisAthos Antonelli, Raffaele Cappelli, Dario Maio, and Davide Maltoni, Member, IEEE

Abstract—Attacking fingerprint-based biometric systems bypresenting fake fingers at the sensor could be a serious threat forunattended applications. This work introduces a new approachfor discriminating fake fingers from real ones, based on the anal-ysis of skin distortion. The user is required to move the fingerwhile pressing it against the scanner surface, thus deliberatelyexaggerating the skin distortion. Novel techniques for extracting,encoding and comparing skin distortion information are formallydefined and systematically evaluated over a test set of real andfake fingers. The proposed approach is privacy friendly and doesnot require additional expensive hardware besides a fingerprintscanner capable of capturing and delivering frames at proper rate.The experimental results indicate the new approach to be a verypromising technique for making fingerprint recognition systemsmore robust against fake-finger-based spoofing attempts.

Index Terms—Biometric systems, fake fingers, security, skindistortion, skin elasticity.

I. INTRODUCTION

B IOMETRIC systems offer great benefits with respect toother authentication techniques: in particular, they are

often more user friendly and can guarantee the physical pres-ence of the user. Thanks to their good performance and to thegrowing market of low-cost acquisition devices, fingerprint-based identification/verification systems are becoming verypopular and are being deployed in a wide range of applications:from PC logon to electronic commerce, from ATMs to phys-ical access control [18]. On the other hand, it is important tounderstand that, as any other authentication technique, finger-print recognition is not totally spoof-proof. The main potentialthreats for fingerprint-based systems are [28], [29]

• attacking the communication channels, including replay at-tacks on the channel between the sensor and the rest of thesystem;

• attacking specific software modules (e.g., replacing thefeature extractor or the matcher with a Trojan horse);

• attacking the database of enrolled templates;• presenting fake fingers to the sensor.Recently, the feasibility of the last type of attack has been

reported by some researchers [19], [25]: they showed thatit is actually possible to spoof some fingerprint recognitionsystems with well-made fake fingertips (Fig. 1), created withthe collaboration of the fingerprint owner or from a latent

Manuscript received January 18, 2006; revised May 3, 2006. This work wassupported by the European Commission (BioSec—FP6 IST-2002-001766). Theassociate editor coordinating the review of this manuscript and approving it forpublication was Dr. Anil Jain.

A. Antonelli is with the Biometrika s.r.l., Forlì 47100, Italy (e-mail: [email protected]).

R. Cappelli, D. Maio, and D. Maltoni are with the DEIS—Università diBologna, Cesena (FO) 47023, Italy (e-mail: [email protected]; [email protected]; [email protected]).

Digital Object Identifier 10.1109/TIFS.2006.879289

fingerprint; in the latter case, the procedure is more difficultbut still possible.

A deep study on the feasibility of spoofing some commercialfingerprint scanners was performed by the authors within theBioSec project [1], [5], [2]. From the critical review of therelated bibliography (as described in Section II) and from the24-months experience we accumulated by making hundreds offake fingers with different materials and procedures and usingthem to spoof existing fingerprint scanners (of different types:optical, capacitive, thermals, RF-based, etc.), we may drawsome conclusions.

• Forging a fake finger is not as easy as some authors claim,even when the person whose finger has to be cloned iscooperative; it is necessary to find the right materials tomould the cast, learn the right process and handle with carethe artificial finger.

• Creating a fake finger from a latent fingerprint is sig-nificantly more difficult, requiring a skill comparable tothat of a forensic expert equipped with the appropriateinstrumentation.

• To the best of our knowledge and from the experiencegained testing recent scanners provided with fake detec-tion mechanisms, nowadays, in spite of the claims of somefingerprint scanner producers, no commercial fingerprintscanner (among those we tested) seems to be resistant towell-made fake fingerprints.

• The lack of satisfactory solutions to reject fake fingersshows that there are a lot of challenges in fake detection;more research and investments on fingerprint fake detec-tion methods are needed.

This work introduces a novel method for discriminating fakefingers from real ones, based on the analysis of a peculiar char-acteristic of the human skin: its elasticity. When a real fingermoves on a scanner surface, it produces a significant amount ofdistortion, which can be observed to be quite different from thatproduced by fake fingers. Usually fake fingers are more rigidthan skin and the distortion is definitely lower; even if highlyelastic materials are used, it seems very difficult to preciselyemulate the specific way a real finger is distorted, because thebehavior is related to the way the external skin is anchored tothe underlying derma and influenced by the position and shapeof the finger bone.

The analysis of skin distortion requires in input a sequenceof frames instead of a single static image. To this purpose,the fingerprint scanner must be able to deliver a set of frames(Fig. 2) to the processing unit at a high speed (at least 20 framesper second). In our study, we used the prototype of a fingerprintscanner that the company Biometrika developed within theBioSec project [5] (Fig. 3).

A database of video sequences has been collected, acquiringimages both from real and fake fingers. Systematic experiments

1556-6013/$20.00 © 2006 IEEE

Page 2: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

ANTONELLI et al.: FAKE FINGER DETECTION BY SKIN DISTORTION ANALYSIS 361

Fig. 1. Fake fingertips created with different materials. From left to right: gelatin, silicone, and latex.

Fig. 2. Set of frames acquired while a finger was rotating over the surface of a fingerprint scanner.

Fig. 3. Specific version of the scanner Fx3000 (by Biometrika) that allows to acquire and transfer frames to the host at 20 fps.

have been performed to understand how much the proposedmethod is capable to discriminate real from fake fingers; the re-sults achieved are very promising.

The rest of this work is organized as follows. Section II sum-marizes the state-of-the art in this field, Section III describesthe proposed approach, Section IV reports the experimentationcarried out to validate the new technique, and finally Section Vdraws some conclusions.

II. RELATED WORKS

Several papers have been recently devoted to this importanttopic: from the analysis of potential weaknesses in generic bio-metric systems [28], [29], [34], to experiments aimed at in-vestigating how current fingerprint verification systems can bespoofed [6], [16], [19], [25], [33]; from proposals of possible

solutions [1], [2], [9], [10], [20], [24], to surveys of the currentstate-of-the-art [31].

It is worth noting that the idea of spoofing fingerprint recog-nition systems by using a fake reproduction of the fingertip isnot a novelty. The idea seems to have been described for thefirst time by the mystery writer R. A. Freeman in the book“The Red Thumb Mark” [12], published in 1907. More re-cently, James Bond in the film Diamonds are Forever (1971)was able to spoof a fingerprint check with a thin layer oflatex glued on his fingertip [35]. However, only recently someresearchers published the results of experiments aimed at ana-lyzing such vulnerability.

• In [25], the authors described two methods for creatingfake fingers: duplication with cooperation and without co-operation; in both these cases, the material used to create

Page 3: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

362 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006

the fakes was silicone; six different commercial fingerprintscanners were tested and the authors reported to be able tospoof all of them at the first or second attempt.

• In [19], it was reported that fakes created with gelatinwere more effective, in particular against scanners basedon solid-state sensors [18]; similar to [25], the authorsdescribed cooperative and noncooperative fake-creationmethods; 11 commercial fingerprint scanners were tested,with a success rate higher than 67% for both the coopera-tive and the noncooperative scenarios.

• In [6], three commercial fingerprint scanners were tested:all of them were spoofed by fake fingers made of gelatin,with a level of ease depending on the scanner and softwarecharacteristics.

• In [16], the studies reported in [25] and [19] were extendedby testing new scanners that included specific fake detec-tion measures; the authors concluded that such measureswere able to reject fake fingers made of nonconductive ma-terials (such as silicone), but were not able to detect con-ductive materials such as gelatin.

The main fake finger detection techniques that have been pro-posed to date can be roughly classified as explained in the restof this section.

• Analysis of skin details in the acquired images: using veryhigh resolution sensors (e.g., 1000 dpi) allows to capturesome details that may be useful for fake detection, such assweat pores [18] or coarseness of the skin texture [20]. Infact, it has been experimentally noted that typical materialsused to make fake fingers (e.g., gelatin) usually consist oflarge organic molecules that tend to amalgamate, resultingin a surface coarser than human skin and where small de-tails such as pores are not present or poorly reproduced.

• Analysis of static properties of the finger: additional hard-ware is used to capture information such as temperature[25], impedance or other electric measurements [15], [32],odor [2], and spectroscopy [21]. In [2], electronic noses areused with the aim of detecting the odor of those materialsthat are typically used to create fake fingers (e.g., siliconeor gelatin); spectroscopy-based techniques expose the skinto multiple wavelengths of light and analyze the reflectedspectrum: nonhuman tissues show a spectrum usually quitedifferent from human ones. Other techniques [7] direct lightto the finger from two or more sources and capture finger-print images with different illuminations: the authors claimthat it is possible to discriminate between real and fake fin-gers by comparing such differently illuminated images.

• Analysis of dynamic properties of the finger, such as: skinperspiration [10], [24], pulse oximetry [23], blood pulsa-tion [17], [23] and skin elasticity [1], [11], [9]. To date, fakedetection by skin-perspiration is probably the techniquemost deeply studied in scientific publications: the idea isto exploit the perspiration of the skin that, starting fromthe pores, diffuses in the fingerprint patter following theridge lines, making them appear darker over time. In [24],the perspiration process is detected through a time-seriesof images acquired from the scanner over a time windowof a few seconds. Skin elasticity, which produces distortionin the acquired fingerprint images [18], has been studied in

some previous works, but mainly focusing on the problemsthat such distortion causes to fingerprint matching algo-rithms [3], [22], [27], [30], or trying to find a mathematicalmodel to explain its behavior [8]. In [11], it was suggestedthat the acquisition of a video sequence of fingerprint im-ages could be used to define a new type of biometric fea-ture, which combines a physiological trait (fingerprint) tobehavioral traits (e.g., a particular movement of the fingeron the sensor chosen by the user); the authors underlinedthat this new biometric feature, among the other advan-tages, could be harder to be spoofed, but they did not re-ported any experiment with fake fingers. In [1], we brieflyintroduced a fake detection approach based on skin distor-tion and reported some preliminary results. In this paper,the whole technique is described and experiments with anew prototype scanner are reported and discussed.

III. FAKE FINGER DETECTION APPROACH

The user is required to place a finger onto the scanner surfaceand to apply some pressure while rotating the finger in eitherclockwise or counter-clockwise direction (this particular move-ment has been chosen after some initial tests, as it seems quiteeasy for the user and it produces the right amount of distortion).A sequence of frames is acquired at a high frame rate during themovement and analyzed to extract relevant features related toskin distortion. Although the finger can be rotated at differentspeed, we experimentally found that an angular speed of about15 per second is optimal for measuring the distortion.

Some constraints are enforced to simplify the subsequent pro-cessing steps; in particular

• any frame such that the amount of rotation with respectto the previous one (inter-frame rotation) is less thanis discarded (the inter-frame rotation angle is calculatedas described in Section III-B); is a parameter whoseoptimal value has been experimentally determined as 0.25(see Section IV-B);

• only frames acquired when the rotation of the finger isless than are considered: when angle has beenreached, the acquisition halts (the rotation angle of thefinger is calculated as described in Section III-E-1).is a parameter that was set to 15 in the experimentations(see Section IV-B); hence, if we assume an angular speedof about 15 per second, on the average, the user is requiredto rotate the finger for about 1 s before the system informsher or him that the acquisition process is terminated.

Let be a sequence of images that satisfiesthe above constraints: each frame , , is segmentedby isolating the fingerprint area from the background; then, foreach frame , the following steps are per-formed (Fig. 4):

• computation of the optical flow between the current frameand the next one;

• computation of the distortion map;• temporal integration of the distortion map;• computation of the DistortionCode from the integrated dis-

tortion map.At the beginning of the sequence, the finger is assumed re-

laxed (i.e., nondistorted), without any superficial tension; this is

Page 4: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

ANTONELLI et al.: FAKE FINGER DETECTION BY SKIN DISTORTION ANALYSIS 363

Fig. 4. Main steps of the feature extraction approach: a sequence of acquired fingerprint images is processed to obtain a sequence of DistortionCodes.

reasonable since when the finger approaches the sensor platenthere is no skin distortion.

The isolation of the fingerprint area from the background isperformed by computing the gradient of the image block-wise:let be a generic pixel in the image and asquare block of frame centered in : each whose gra-dient module exceeds a given threshold is associated to the fore-ground [18] (Fig. 5). Only foreground blocks are considered inthe rest of the algorithm.

A. Computation of the Optical Flow

Block-wise correlation is computed to detect the new positionof each block in frame . For each block ,

the vector denotes the estimated

Fig. 5. Fingerprint image before and after the segmentation from the back-ground.

movement of from frame to frame . In the fol-lowing, for simplifying the notation, will be indicated as

Page 5: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

364 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006

Fig. 6. From left to right: two consecutive images, their difference (reported to graphically highlight the movement) and the corresponding optical flow.

Fig. 7. Optical flow before (on the left) and after (on the right) the regularization process.

. A graphical representation of the movement vectors (seeFig. 6), is also known in the literature as optical flow [4].

This method is in theory only translation-invariant but, sincethe images are taken at a fast frame rate, for small blocks it is pos-sible to assume a certain rotation- and deformation-invariance.

The block size (in pixels) is a parameter that should beadjusted according to the sensor area and resolution. If theblocks are too small, they do not contain enough informationto univocally identify their positions in the subsequent frame.Otherwise, if they are too large, two problems may arise: thealgorithm would become computationally expensive and thedistortion could make the matching unfeasible. To increasethe accuracy of the optical flow, the blocks can be also partiallyoverlapped: in this case the distance among the centers of twoconsecutive blocks is smaller than the block size.

In order to filter out outliers produced by noise, by false cor-relation matches, or by other anomalies, the optical flow is thenregularized as follows.

1) Each such thatis discarded . This step allows to removeoutliers, under the assumption that the movement of eachblock cannot deviate too much from the largest movementof the blocks of the previous frame; is a parameter thatshould correspond to the maximum expected accelerationbetween two consecutive frames.

2) For each , the value is calculated as the weightedaverage of the 3 3 neighbours of , using a 3 3Gaussian mask; elements discarded by the previous stepare not included in the average: if no valid elements arepresent, is marked as “invalid”.

3) Each such that is discarded. Thisstep allows to remove elements that are not consistent withtheir neighbours; is a parameter that controls the strengthof this procedure.

4) are recalculated as in step 2, but considering only theelements retained at step 3.

Fig. 7 shows the optical flow before ( vectors) and after( vectors) the steps described above.

B. Computation of the Distortion Map

The center of rotation is estimated as theweighted average of the positions of all the foreground blocks

such that the corresponding movement vector isvalid

is valid (1)

where is the average of the elements in set .The inter-frame rotation angle (around the center ) and

the translation vector are then computed in theleast square sense, starting from all of the average movementvectors

(2)

Page 6: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

ANTONELLI et al.: FAKE FINGER DETECTION BY SKIN DISTORTION ANALYSIS 365

Fig. 8. Graphical representation of a distortion map (A) and of the corre-sponding integrated distortion map (B). Blocks with a lighter gray color denotehigher distortion values.

using the Gauss–Newton approach to numerically solve theproblem [13].

If the finger were moving solidly, then each movement vectorwould be coherent with and . Even if the movement is notsolid, and still encode the dominant movement and, foreach block , the distortion can be computed as the inco-herence of each average movement vector with respect to

and . In particular, if a movement vector were computedaccording to a solid movement, then its value would be

(3)

and, therefore, the distortion can be defined as the residual

if is valid

otherwise.(4)

A distortion map is defined as a block-wise image whoseblocks encode the distortion values [Fig. 8(a)].

C. Temporal Integration of the Distortion Map

The computation of the distortion map, made on just two con-secutive frames, is affected by three problems.

• The movement vectors are discrete (because of the discretenature of the images) and, in case of small movement, theloss of accuracy might be significant.

• Errors in seeking the new position of blocks could lead toa wrong distortion estimation.

• The measured distortion is proportional to the amount ofmovement between two frames (and, therefore, dependson the finger speed), without considering previous ten-sion accumulated/released. This makes it difficult to com-pare a distortion map against the distortion map of anothersequence.

An effective solution to the above problems is to perform atemporal-integration of the distortion map, resulting in an in-tegrated distortion map [Fig. 8(b)]. The temporal integration issimply obtained by block-wise summing the current distortionmap to the distortion map “accumulated” in the previous frames.Each integrated distortion element is defined as shown in (5) atthe bottom of the page with .

The rationale behind the definition is that if the norm of theaverage movement vector is smaller than the norm of theestimated solid movement , then the block is moving slowerthan expected and this means it is accumulating tension (i.e., dis-tortion). Otherwise, if the norm of is larger than the normof , the block is moving faster than expected, thus it is slip-ping on the sensor surface releasing the tension accumulated.

The integrated distortion map solves most of the previouslylisted problems: 1) discretization and local estimation errors areno longer serious problems because the integration tends to pro-duce smoothed values; 2) for a given movement trajectory, theintegrated distortion map is quite invariant with respect to thefinger speed. Fig. 9 shows the integrated distortion maps com-puted for a given image sequence acquired by rotating a realfinger.

D. Distortioncode

Comparing two sequences of integrated distortion maps, bothacquired under the same movement trajectory, is the basis ofthis fake finger detection approach. On the other hand, directlycomparing two sequences of integrated distortion maps wouldbe computationally very demanding and it would be quite dif-ficult to deal with the unavoidable local changes between thesequences.

To simplify this task, a feature vector (called DistortionCodefor the analogy with the FingerCode introduced in [14]) is ex-tracted from each integrated distortion map: circular annuliof increasing radius ( , , where is the radius ofthe smaller annulus) are centered in and superimposed to themap. For each annulus , a feature is computed as the av-erage of the integrated distortion elements of the blocks fallinginside it (Fig. 10)

belongs to annulus (6)

The number of annuli and the radius are parametersthat must be chosen to optimally cover a typical fingerprint, ac-cording to the sensor area and resolution.

A DistortionCode is obtained from each frame ,

if is valid and

if is not valid

if

(5)

Page 7: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

366 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006

Fig. 9. Sequence of integrated distortion maps.

Fig. 10. Integrated distortion map with them annuli superimposed. Note thatbackground blocks are discarded at the beginning of the process (see Section III)and therefore they are not taken into account in (6).

The DistortionCodes are invariant to rotation since distortionvalues are averaged over the circular annuli; they are also in-variant with respect to the position of the fingerprint in the image(translation), since they are centered in ; in any case, it shouldbe noted that translation accuracy is not critical because of theintegrated and global nature of the features adopted.

A DistortionCode sequence is then defined by normalizingthe distortion codes

where

(7)

The obtained DistortionCode sequence (Fig. 11) characterizesthe distortion of a particular finger under a specific movement.Further sequences from the same finger do not necessarily lead tothe same DistortionCode sequence: the overall length might bedifferent, because the user could produce the same trajectory (ora similar trajectory) faster or slower. While a minor rotation ac-cumulates less tension, during a major rotation the finger couldslip and the tension be released in the middle of the sequence.Therefore, a straightforward comparison of DistortionCode se-quences is not feasible and an alignment technique like thoseintroduced in Sections III-E1 and III-E2 is necessary.

E. Distortion Match Function

In order to discriminate a real finger from a fake one, theDistortionCode sequence acquired at verification/identifica-tion time (current sequence) is compared with a referencesequence obtained from a real finger. The reference sequencemay be a sequence acquired from the finger of the same userduring an “enrolment” session (similarly to what happens inbiometric recognition), or a predefined “ideal” sequence to beadopted for all users (in this case the fake-detection systemdoes not require an enrolment stage, see Section IV-C). Let

be the reference sequence andthe current sequence; a distor-

tion match function DMF compares the reference andthe current sequence and returns a score in the range ,indicating how much the current sequence is similar to thereference sequence (1 means maximum similarity).

A Distortion Match Function must define how to do thefollowing.

Step 1) Calculate the similarity between two Distortion-Codes.

Step 2) Align the elements by establishing a correspondencebetween the DistortionCodes of the two sequences

and .Step 3) Measure the similarity between the two aligned

sequences.As to Step 1), a simple Euclidean distance between two Dis-

tortionCodes has been adopted, since it is a good metric and alsovery efficient to be computed, having the vectors a very small di-mensionality. As to Step 2), two different approaches have beenexperimented.

• Aligning the sequences according to the accumulated inter-frame rotation (Section III-E1).

• Aligning the sequences using dynamic time warping(DTW) [26] (Section III-E2).

In both cases, the result of Step 2) is a new DistortionCodesequence , obtained fromduring the alignment process with ; has the same car-dinality of and the final similarity can be simply computed(Step 3) as the average Euclidean distance of corresponding Dis-tortionCodes in and .

Page 8: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

ANTONELLI et al.: FAKE FINGER DETECTION BY SKIN DISTORTION ANALYSIS 367

Fig. 11. Sequence of DistortionCodes calculated on the integrated distortion maps in Fig. 9.

Fig. 12. Example of DTW alignment. On the left, the mapping function DTW(i), which maps each DistortionCode in the current sequence to a DistortionCodein the reference sequence. On the right, a graphical representation of the same mapping: note that the same DistorsionCode in the reference sequence can beassociated twice or more times (or not associated at all), not only to deal with different lengths but, more in general, to find the optimal alignment.

1) Aligning the Sequences According to the Accumu-lated Inter-Frame Rotation: Any DistortionCode canbe associated to the rotation angle obtained by accumu-lating the inter-frame rotation angles (see Section III-B):

. This approach determines optimal pairingbetween the DistortionCodes in and according to rota-tion angles ; interpolation is used to deal with discretizationeffects. The new sequence is obtained by calculating, foreach pair in the current sequence, a new distor-tion code from the two consecutive DistortionCodes inthe reference sequence and (where

) as follows:

(8)

Equation (8) simply estimates as the linear interpolationof the distortion codes corresponding to the two closest rotationangles.

2) Aligning the Sequences Using Dynamic Time Warping:The main limitation of the previous alignment approach is thatthe distortion is not only related to the amount of rotation, butalso to the pressure applied while rotating the finger, and morein general to the movement performed, hence aligning only onthe basis of the rotation angle may be not always a good choice.

An alternative approach to align the two DistortionCode se-quences is based on DTW [26]. Using DTW with constrainedendpoints, slope three and the Euclidean distance as a cost func-tion, each DistortionCode in is associated to a Distor-tionCode (see Fig. 12). This allows to warpthe time dimension of the reference sequence to obtain thenew sequence .

The DTW algorithm aligns the two sequences according tothe less expensive path. If the two sequences are similar, the

resulting path will have a total cost low and will be quite closeto the diagonal path (Fig. 12).

3) Computation of the Final Score: Once the new sequencehas been obtained (using one

of the approaches described above), the final score can be com-puted as follows:

(9)

The normalization coefficient ensures that thescore is always in the range . In fact, for any Distortion-Code sequence and for any of its ele-ments , it is easy to prove that

(10)

and

(11)

Constraint (10) follows directly from the definition of Distor-tionCode sequence (7), constraint (11) from the definitions ofintegrated distortion map (5) and DistortionCode (6).

It is worth noting that the transformations performed to obtainthe new sequence do not violate the two constraints in boththe proposed approaches, since:

• in the first one, , thus (10)is guaranteed by the triangular inequality and (11) by thedefinition of ;

• in the DTW approach, , thus (10) and(11) are trivially verified.

Page 9: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

368 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006

IV. EXPERIMENTATION

A. Measuring Fake Detection Errors

A fingerprint scanner that embeds a fake-finger detectionmechanism has to decide, for each transaction, if the currentsample comes from a real finger or from a fake one. This deci-sion will be unavoidably affected by errors, that should be aslow as possible: in particular, a scanner could reject real fingersand/or accept fake fingers, independently of the user’s identity.

In the rest of this section, we assume a system operating inverification mode. Let be the proportion of fake-fingertransactions where the system incorrectly considered the inputto come from a real finger. Let be the proportion ofreal-finger transactions where the system incorrectly consideredthe input to come from a fake sample. and mustnot be confused with identity verification errors typical of anybiometric system; in the following, to avoid confusion we willdenote with and the identity verification errorrates. Under the simplifying hypothesis of no correlation be-tween the two classes of errors (fake detection errors and iden-tity verification errors), and assuming the identify verificationperformance is not significantly decreased by the fake-detectionmechanism, the overall FRR error can be estimated as

• (for an au-thorized user trying to be authenticated normally using thereal enrolled finger).

Depending on the hypotheses (Real or Fake finger, Enrolledor Nonenrolled fingerprint) under which the transaction is per-formed, the overall FAR error can be estimated as

• - (for anattacker trying to be authenticated using a real finger, dif-ferent from the enrolled one);

• - (for an attackertrying to be authenticated using a fake reproduction of afinger which is not the enrolled one);

• - (for an attacker trying tobe authenticated using a fake reproduction of the enrolledfinger), where , since, even if a fakefingerprint is created by using professional equipments, itsquality is usually lower than the real finger it is designedto imitate and therefore the chance that the identity ver-ification algorithm does not match it with the user’s realtemplate is higher.

Actually, the two classes of errors (fake detection errors andidentify verification errors) could be correlated in some cases:for instance, a low-quality finger may determine both a high

(due, for example, to the difficulty of calculating thecorrect optical flow) and a high (due to the few numberof minutiae that can be reliably found in its fingerprint images).It should be also considered that the adoption of a fake-detectionapproach may affect the performance of the identity verifica-tion system. For instance, due to the need of measuring specificfeatures for fake-detection, it could be more difficult to acquiregood quality images, thus increasing (e.g., in the case offingerprint distortion, due to the need of producing distorted im-ages it could be more difficult to acquire good quality images,at the beginning of the image sequence, which are not affected

by distortion). Anyway, studying such correlation is beyond thescope of this work, and will be better investigated in the future.

The experiments carried out in this study consider only fake-detection errors ( and ), to avoid reporting per-formance indicators depending on the identity verification ac-curacy of a specific biometric algorithm. There is obviously astrict trade-off between and : both are functionsof a fake-detection threshold . depends also on howmuch skilled the attacker is, which technologies the attacker isable to implement, how much time and money (s)he can invest,etc. In the experimentation performed in this work we assumedthat

• the attackers were experts of the application domain andskilled in manufacturing fake fingers (the fake fingers man-ufactured in our tests were made by people with 24-monthexperience);

• attacks were carried out using some known methods (e.g.,fake fingers made of silicone, gelatin and other materialscommercially available);

• the attackers were aware of the particular fake-detectiontechnique adopted and did their best to defeat it (in ourtests fake fingers were created trying to emulate as muchas possible the human skin deformation);

• attacks had to be performed in a short time and without livefeedback from the device.

In Sections IV-B and C, and errors measuredin the experimentation are reported, together with the(the value such that ).

B. Database

In order to evaluate the proposed approach, a database ofimage sequences was collected using a prototype fingerprintscanner by Biometrika. No public available benchmark databasecould be used, due to the specific requirements of the fake de-tection algorithm (each sample must consist of a sequence ofimages acquired by a scanner while the user is rotating her/hisfinger and producing distortion, and samples from both real andfake fingers acquired by the same device must be available). Thedatabase was collected at the Biometric System Laboratory ofthe University of Bologna acquiring, from each of 45 volun-teers, two fingers (thumb and forefinger of the right hand); 10image sequences were recorded for each finger. 40 fake fingerswere manufactered (10 made of RTV silicone, 10 of gelatin, 10of latex, and 10 of wood glue). Instead of making whole 3Dfake fingers, we manufactured just thin layers reproducing thefingertips (see Fig. 1 for some sample pictures): this allowedto better imitate genuine finger movements when trying to at-tack the system. For each fake finger, 10 image sequences wererecorded. The prototype scanner produces 400 560 fingerprintimages at 569 DPI and captures images at 20 fps. In Fig. 13 andin Fig. 14 some sample fingerprint images are shown.

The volunteers received a brief training before the first acqui-sition. Sequences having a total finger rotation angle less than15 were discarded, and the user was asked to repeat the acqui-sition; no other quality check was adopted during the collectionof the data (for instance ensuring that a minimum amount of dis-tortion was produced in the sequence).

Page 10: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

ANTONELLI et al.: FAKE FINGER DETECTION BY SKIN DISTORTION ANALYSIS 369

Fig. 13. Sample images from the database of sequences: a real finger and four fake fingers (the first image of each sequence is shown).

Fig. 14. Some images from two sequences in the database: a real finger (top row) and a fake finger (bottom row).

TABLE IPARAMETER VALUES USED IN THE EXPERIMENTATION

The acquisition of the image sequences from the fake fingerswas performed by experts, trying to emulate as much as pos-sible the deformation of the skin in real fingers and choosingthe optimal conditions for each material; for instance, image se-quences from fakes made of gelatin were acquired a hour aftertheir creation, when their elasticity is similar to the human skin,and not later, when they become rigid and easier to be discrim-inated from real fingers.

The parameters of the approach (see Table I) were adjustedon a totally disjoint dataset that was collected using a differentacquisition sensor (see [1]). The only different parameter is theblock size, which here was set to 16 16 pixels to increase theprocessing speed.

C. Results

As introduced in Section III-E, the fake detection approachhere proposed may be used in two different modalities:

• per-user reference sequence: for each user, during an en-rolment stage, a sequence of frames is acquired fromthe selected finger, the corresponding DistortionCode se-quence is calculated and stored as the reference se-quence for that user (similar to what happens with thefingerprint template to be used in a biometric recognitionprocess);

• predefined reference sequence: a single reference sequenceis adopted for all of the users and no enrolment stage is

required for the fake detection system.Both of these operating modalities were experimented by

using the same test set described in the previous section.In the per-user reference sequence modality, the following

transactions were performed on the test set:• 4050 genuine attempts (each sequence was matched

against the remaining sequences of the same finger, ex-cluding the symmetric matches to avoid correlation, thusperforming 45 attempts for each of the 90 real fingers);

• 36 000 impostor attempts (each of the 400 fake sequenceswas matched against the first sequence of each real finger).

Page 11: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

370 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006

Fig. 15. Integrated distortion maps from the predefined reference sequence used in the experimentation; it is worth noting that the shape of the deformed regionis almost elliptical and distortion is mainly confined to an elliptical annulus around the center of rotation, as discussed in [8].

TABLE IIPERFORMANCE OF THE TWO ALIGNMENT APPROACHES

IN THE TWO DIFFERENT MODALITIES

Note that, since only fake-detection performance was eval-uated (not combined with identity verification) and con-sidering that the proposed approach is based on the elasticproperties of real/fake fingers and not on the ridge-line pat-tern, it is not necessary that a fake finger corresponding tothe real finger is used in the impostor attempts: any fakefinger can be matched against any real finger without sig-nificantly affecting the results.

In the predefined reference sequence modality, a sequence ac-quired from a well-trained user (not included in the test data-base) was selected as the predefined sequence (Fig. 15) and thefollowing transactions were performed on the test set:

• 900 genuine attempts (each sequence was matched againstthe reference sequence, thus performing 10 attempts foreach of the 90 real fingers);

• 400 impostor attempts (each of the 400 fake sequences wasmatched against the reference sequence).

Table II reports the obtained for the two alignmentapproaches (Sections III-E1 and III-E2) in the two modalities,respectively; Fig. 16 compares the ROC graphs.

An error analysis was performed by visually inspecting the100 real finger sequences that obtained the lowest scores inthe predefined reference sequence modality with the DTWalignment. In Table III, each sequence is labeled according tothe most evident error cause: 70% of the errors were due to anincorrect movement (e.g., moving the finger in a nonuniformway, translating instead of rotating,…) or a too fast movement.Table IV analyzes the distribution of false rejection errorsamong the different users; since 10 sequences were acquiredfrom two fingers of each user, the maximum number of errorsfor each user is 20. It is worth noting that all of the users wereable to provide good sequences with both the fingers (only oneuser had more than 10 errors among the 100 examined: 8 withthe first finger and 4 with the second).

On a Pentium IV PC at 3.2 GHz, the feature extraction takesabout 100 ms for each frame: the most demanding step (80% ofthe feature extraction time) is the correlation, whose complexity,in the worst case, is proportional to the square of the number offoreground pixels in the image. However, thanks to an MMXoptimization of the correlation routine, an efficient implemen-tation has been achieved. The matching step proved to be veryefficient: the average time is less than 1 ms for both the align-ment approaches. The average transaction time is about two sec-onds, including acquisition, feature extraction, and matching.

V. CONCLUSIONS AND FUTURE WORK

Attacks to fingerprint-based biometric systems using fake re-productions of the finger may be a serious threat, in particularfor nonsupervised access control applications and remote au-thentication applications.

Page 12: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

ANTONELLI et al.: FAKE FINGER DETECTION BY SKIN DISTORTION ANALYSIS 371

Fig. 16. ROC graphs of the two alignment approaches: per-user reference sequence modality (on the left) and predefined reference sequence modality (on theright).

TABLE IIIERROR ANALYSIS OF THE 100 REAL-FINGER SEQUENCES

THAT OBTAINED THE LOWEST SCORE IN THE PREDEFINED

REFERENCE SEQUENCE MODALITY (DTW ALIGNMENT)

TABLE IVDISTRIBUTION OF THE FALSE REJECTION ERRORS AMONG THE DIFFERENT

USERS (THE SAME SEQUENCES ANALYZED IN TABLE III ARE CONSIDERED)

This work introduced a fake finger detection approach basedon skin elasticity: novel techniques for extracting skin distortioninformation, for encoding it as DistortionCodes, and for nor-malizing and comparing DistortionCode sequences have beenformally defined and experimentally evaluated over a test set ofreal and fake fingers. Two different operating modalities havebeen proposed: the former (per-user reference sequence) wherethe user is required to perform an “enrollment” before usingthe system, the latter (predefined reference sequence) where noenrollment is required for the fake-detection (obviously enroll-ment is still necessary for fingerprint recognition).

Contrary to what one may expect, the performance of the pre-defined modality was better than that of the per-user modality.The analysis of the main error causes for both the modalities

suggested that this behavior could probably be ascribed to thesefacts.

• The reference DistortionCode sequence (which all the cur-rent sequences were compared to) was obtained from awell-trained user with a uniform and smooth movement,resulting in a sequence that was able to correctly representmost of real finger distortions and was very difficult to em-ulate using fake fingers.

• During the database collection, the volunteers receivedonly a quick training and no specific quality control mea-sure was enforced (except the minimum amount of fingerrotation, see Section IV-B). For this reason, a good portionof the users did not produce enough distortion and theircorresponding DistortionCode sequences, when used asthe reference sequence in the per-user modality, were notenough dissimilar from the fake finger sequences.

It is also worth noting that, in the per-user modality, the inter-frame rotation angle alignment approach achieved better resultsthan the DTW-based one. This may be explained by consideringthat, if on the one hand DTW is more flexible in adapting to agiven reference sequence (potentially decreasing ), onthe other, if no minimum quality is enforced for the referencesequences, the greater flexibility is likely to affect morethan .

We may conclude that the predefined modality, besides beingsimpler to be deployed in a final system, achieves better resultswith nonhabituated users; on the other hand, the performancewith the per-user modality may be increased if users are well-trained and habituated.

We believe the experimental results are very promising; infact, although the system did make errors (the bestachieved was 11.24%), we must underline that what we mea-sured in our experimentation was not the robustness withrespect to zero-effort attempts, but the robustness to attackscarried out by experts that were aware of the specific fake-de-tection technology and did their best to emulate the human skindeformation. The same experts achieved a very high success

Page 13: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

372 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 3, SEPTEMBER 2006

rate (comparable to those reported in [19]) in spoofing all thecommercial devices they tested [5], including devices withspecific fake-finger countermeasures. However, it should bepointed out that the proposed system, as any other fake-detec-tion mechanisms, trades usability for security: for some largescale low-security applications it may not be worth adoptinga fake-finger detection system, while, for other high-securityapplications, the fake-detection operating threshold may beadjusted to meet the given constraints.

Although in the experiments performed we were not able tofind a way to make the proposed system ineffective, as for anyother similar system it cannot be totally excluded that someonemight find a combination of techniques and materials that sig-nificantly decrease its efficacy. Combining this fake-detectionsystem with other methods based on uncorrelated features (e.g.,impedance, odor [2]) could make the resulting system even morereliable.

The proposed fake detection approach is not privacy invasive,since it does not collect any information (such as, for instance,blood pulsation or blood pressure) that may reveal medical dis-eases; it has the further advantage of not requiring expensive ad-ditional hardware, provided that the fingerprint scanner is ableto acquire images at a proper frame rate.

Future work will be mainly dedicated to• implementation and evaluation of alternative alignment

techniques for the DistortionCode sequences;• experimentation on a larger user population;• implementation of quality control measures for the enroll-

ment stage in the per-user modality;• better understanding the relation between fake detection

errors and identity verification errors.While this paper is being written, a usability study is being

conducted by Prof. Bente’s team at the University of Colognewhere the Biometrika fingerprint scanner equipped with ourfake detection approach is being experimented outside of lab-oratory environments. The feedback from that experimentationwill help to improve the approach here introduced, thank tothe complementary information that a user-centered perspectivemay provide.

ACKNOWLEDGMENT

The authors would like to thank G. Alboni from Biometrika(Italy) and J.-F. Mainguet from Atmel (France) for their fruitfulcooperation on the fake-finger detection topic within the scopeof the BioSec project.

REFERENCES

[1] A. Antonelli, R. Cappelli, D. Maio, and D. Maltoni, “A new approachto fake finger detection based on skin distortion,” in Proc. Int. Conf.Biometric Authentication, Hong Kong, China, Jan. 2006.

[2] D. Baldisserra, A. Franco, D. Maio, and D. Maltoni, “Fake fingerprintdetection by odor analysis,” in Proc. Int. Conf. Biometric Authentica-tion, Hong Kong, China, Jan. 2006.

[3] A. M. Bazen and S. Gerez, “Fingerprint matching by thin-plate splinemodeling of elastic deformations,” Pattern Recognit., vol. 36, no. 8, pp.1859–1867, Aug. 2003.

[4] S. S. Beauchemin and J. L. Barron, “The computation of optical flow,”ACM Comput. Surv., vol. 27, no. 3, pp. 433–467, 1995.

[5] BioSec European Research Project—FP6 IST-2002-001766 [Online].Available: http://www.biosec.org.

[6] J. Blommé, “Evaluation of Biometric Security Systems Against Artifi-cial Fingers,” M.S. thesis, Linköping Univ., Linköping, Sweden, 2003.

[7] K. Brownlee, “Method and Apparatus for Distinguishing a HumanFinger From a Reproduction of a Fingerprint,” U.S. Patent 6 292 576,2001.

[8] R. Cappelli, D. Maio, and D. Maltoni, “Modelling plastic distortion infingerprint images,” in Proc. 2nd Int. Conf. Advances in Pattern Recog-nition (ICAPR2001), Rio de Janeiro, Brazil, Mar. 2001, pp. 369–376.

[9] Y. Chen and A. Jain, “Fingerprint deformation for spoof detection,” inProc. Biometrics Symp., Crystal City, VA, Sep. 19–21, 2005.

[10] R. Derakhshani, S. A. C. Schuckers, L. A. Hornak, and L. O. Gorman,“Determination of vitality from a non-invasive biomedical measure-ment for use in fingerprint scanners,” Pattern Recognit., vol. 36, pp.383–396, 2003.

[11] C. Dorai, N. K. Ratha, and R. M. Bolle, “Dynamic behavior analysisin compressed fingerprint videos,” IEEE Trans. Circuits Syst. VideoTechnol., vol. 14, no. 1, pp. 58–73, Jan. 2004.

[12] R. A. Freeman, The Red Thumb Mark. London, U.K.: Collingwood,1907.

[13] M. T. Heath, Scientific Computing: An Introductory Survey, 2nd ed.New York: McGraw-Hill, 2002.

[14] A. K. Jain, S. Prabhakar, and L. Hong, “A multichannel approach tofingerprint classification,” IEEE Trans. Pattern Anal. Machine Intell.,vol. 21, no. 4, pp. 348–359, Apr. 1999.

[15] P. Kallo, I. Kiss, A. Podmaniczky, and J. Talosi, “Detector for Recog-nizing the Living Character of a Finger in a Fingerprint RecognizingApparatus,” U.S. Patent 6 175 641, Jan. 16, 2001.

[16] H. Kang, B. Lee, H. Kim, D. Shin, and J. Kim, “A study on performanceevaluation of the liveness detection for various fingerprint sensor mod-ules,” in Proc. KES, 2003, pp. 1245–1253.

[17] P. D. Lapsley, J. A. Less, D. F. Pare Jr, and N. Hoffman, “Anti-FraudBiometric Sensor That Accurately Detects Blood Flow,” U.S. Patent5 737 439, Apr. 7, 1998.

[18] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fin-gerprint Recognition. New York: Springer, 2003.

[19] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, “Impactof artificial “Gummy” fingers on fingerprint systems,” Proc. SPIE, vol.4677, Jan. 2002.

[20] Y. S. Moon, J. S. Chen, K. C. Chan, K. So, and K. C. Woo, “Waveletbased fingerprint liveness detection,” Electron. Lett., vol. 41, no. 20,pp. 1112–1113, 2005.

[21] K. Nixon, “Novel spectroscopy-based technology for biometric andliveness verification,” Proc. SPIE, vol. 5404, 2004.

[22] Proc. Biometric Authentication ECCV Int. Workshop , ser. Lect. NotesComput. Sci., D. Maltoni and A. K. Jain, Eds. Prague, Czech Re-public: Springer, May 15, 2004, vol. 3087.

[23] D. Osten, H. M. Carim, M. R. Arneson, and B. L. Blan, “Biometric,Personal Authentication System,” U.S. Patent 5 719 950, Feb. 17, 1998.

[24] S. T. V. Parthasaradhi, R. Derakhshani, L. A. Hornak, and S. A. C.Schuckers, “Time-series detection of perspiration as a liveness test infingerprint devices,” IEEE Trans. Syst., Man, Cybern. C, vol. 35, no. 3,pp. 335–343, Aug. 2005.

[25] T. Putte and J. Keuning, “Biometrical fingerprint recognition: Don’tget your fingers burned,” in Proc. IFIP TC8/WG8.8, 4th Working Conf.Smart Card Research and Adv. App., 2000, pp. 289–303.

[26] L. Rabiner and B. H. Juang, Fundamentals of Speech Recognition.Englewood Cliffs, NJ: Prentice-Hall, 1993.

[27] N. K. Ratha and R. M. Bolle, “Effect of controlled acquisition on fin-gerprint matching,” in Proc. Int. Conf. Pattern Recognit., 1998, vol. 2,pp. 1659–1661.

[28] N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security andprivacy in biometrics-based authentication systems,” IBM Syst. J., vol.40, no. 3, pp. 614–634, 2001.

[29] ——, “An analysis of minutiae matching strength,” in Proc. 3rd Int.Conf. Audio- and Video-Based Biometric Person Authentication, 2001,pp. 223–228.

[30] A. Ross, S. C. Dass, and A. K. Jain, “Fingerprint warping using ridgecurve correspondences,” IEEE Trans. Pattern Anal. Mach. Intell., vol.28, no. 1, pp. 19–30, Jan. 2006.

[31] S. Schuckers, “Spoofing and anti-spoofing measures,” Inform. SecurityTech. Rep., vol. 7, no. 4, pp. 56–62, 2002.

[32] D. R. Setlak, “Fingerprint Sensor Having Spoof Reduction Featuresand Related Methods,” U.S. Patent 5 953 441, 1999.

[33] L. Thalheim and J. Krissler, “Body check: Biometric access protectiondevices and their programs put to the test,” C’t Mag., Nov. 2002.

Page 14: 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND …sigmedia/pmwiki/uploads/Teaching.1E8/ieee... · 2008-11-16 · 360 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL

ANTONELLI et al.: FAKE FINGER DETECTION BY SKIN DISTORTION ANALYSIS 373

[34] U. Uludag and A. K. Jain, E. J. Delp, III and P. W. Wong, Eds., “Attackson biometric systems: A case study in fingerprints,” in Proc. SPIE, Jun.2004, vol. 5306, Security, Steganography, and Watermarking of Multi-media Contents VI, pp. 622–633.

[35] Diamonds Are Forever (Film) 1971.

Athos Antonelli received the Laurea degree incomputer science from the University of Bologna,Bologna, Italy, in 1998.

From 1998 to 2002, he led the research team ofCT Software, Cesena, Italy, for sonar data processingand underwater image analysis. From 2003 to 2005,he was a Research Fellow with the Biometric SystemLaboratory, University of Bologna, where he studiednew fake detection approaches within the BioSec Eu-ropean Project. Currently, he is with Biometrika srl,Forlì, Italy, where he leads innovative algorithms de-

velopment for biometric solutions.

Raffaele Cappelli received the Laurea degree(Hons.) in computer science from the University ofBologna, Bologna, Italy, in 1998, and the Ph.D. de-gree in computer science and electronic engineeringfrom the University of Bologna in 2002.

Currently, he is an Associate Researcher at theUniversity of Bologna. He is a member of the Bio-metric System Laboratory, University of Bologna.His research interests include pattern recognition,image retrieval by similarity and biometric systems(fingerprint classification and recognition, synthetic

fingerprint generation, fingerprint analysis, face recognition, and performanceevaluation methodologies).

Dario Maio is a Full Professor at the University ofBologna, Bologna, Italy. He is Chair of the CesenaCampus and Director of the Biometric SystemLaboratory, Cesena. He has published many papersin numerous fields, including distributed computersystems, computer performance evaluation, data-base design, information systems, neural networks,autonomous agents, and biometric systems. He isauthor of the books Biometric Systems, Technology,Design and Performance Evaluation (Springer,2005) and The Handbook of Fingerprint Recognition

(Springer, 2003) which received the PSP award from the Association ofAmerican Publishers. Before joining the University of Bologna, he received afellowship from the Italian National Research Council (C.N.R.) for workingon the air-traffic-control project. He is with DEIS and IEIIT-C.N.R. where heteaches database and information systems.

Davide Maltoni (M’05) is an Associate Professorwith the Department of Electronics, Informatics,and Systems, University of Bologna, Bologna,Italy. He teaches computer architectures and patternrecognition in the Computer Science Department,University of Bologna, Cesena. His research in-terests are in the area of pattern recognition andcomputer vision. In particular, he is active in thefield of biometric systems (fingerprint recognition,face recognition, hand recognition, performanceevaluation of biometric systems). He is co-director of

the Biometric System Laboratory, Cesena, which is internationally known forits research and publications in the field. He is author of two books BiometricSystems, Technology, Design and Performance Evaluation (Springer, 2005)and The Handbook of Fingerprint Recognition (Springer, 2003) which receivedthe PSP award from the Association of American Publishers.

Dr. Maltoni is an Associate Editor of the IEEE TRANSACTIONS ON

INFORMATION FORENSICS AND SECURITY and Pattern Recognition.