z-logo
open-access-imgOpen Access
Planting attack on latent fingerprints
Author(s) -
Askarin Mohammad Mogharen,
Wong KokSheik,
Phan Raphael C.W.
Publication year - 2018
Publication title -
iet biometrics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.434
H-Index - 28
eISSN - 2047-4946
pISSN - 2047-4938
DOI - 10.1049/iet-bmt.2016.0113
Subject(s) - fingerprint (computing) , computer science , biometrics , liveness , spoofing attack , matching (statistics) , identification (biology) , artificial intelligence , fingerprint recognition , pattern recognition (psychology) , computer security , data mining , machine learning , mathematics , statistics , botany , biology , programming language
The fingerprint is arguably the most successfully deployed biometric data in a broad spectrum of applications for identification and verification purposes. While fingerprint matching algorithms are fairly matured, most studies have so far focused on improving the matching precision, and some effort has been channelled to combat spoofing attacks on biometric readers through liveness detection. To the best of the authors’ knowledge, the feasibility of planting attacks of latent fingerprints has not been reported in the literature. In this study, the authors present a low‐cost latent fingerprint planting attack involving steps that can be performed by an untrained person who has no prior knowledge in forensics. Experiment results based on a publicly available database suggest that this approach feasibly leads to planted latent fingerprints being indistinguishable from real ones. It is also verified that the planted latent fingerprints could be utilised to identify their corresponding rolled fingerprints, suggesting the viability of the proposed latent fingerprint planting attack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here