1999
DOI: 10.1520/jfs12024j
|View full text |Cite
|
Sign up to set email alerts
|

A Chronological Review of Fingerprint Forgery

Abstract: The article reviews the history of fingerprint forgery chronologically, based on about 70 papers, books and private communications. More than 30 known cases of fingerprint forgery are considered. Various techniques of fingerprint forgery are described and discussed as well as methods of fingerprint forgery detection.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
1

Year Published

2003
2003
2017
2017

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 3 publications
0
9
0
1
Order By: Relevance
“…This means spoofing methods have to primarily reproduce only first-and second-level information ]. Techniques employed for spoofing are categorized in Figure 9 and described next [Geller et al 1999[Geller et al , 2001Wiehe et al 2004;Fladsrud and Sollie 2004].…”
Section: Artificial Fingerprintsmentioning
confidence: 99%
“…This means spoofing methods have to primarily reproduce only first-and second-level information ]. Techniques employed for spoofing are categorized in Figure 9 and described next [Geller et al 1999[Geller et al , 2001Wiehe et al 2004;Fladsrud and Sollie 2004].…”
Section: Artificial Fingerprintsmentioning
confidence: 99%
“…For fmgerprints [17] B. Geller and al through a chronological study based on 70 papers, books and secret communications, noted more 30 cases of falsification of fingerprints, using different techniques, the study also cited methods of detection of false documents and fmgerprints. T. Matsumoto and al discuss in a workshop the various methods for the generation of artificial fingerprints to gain fraudulent access, this paper explains that it has become easy to create an artificial fingerprint using products widespread among the general public [18].…”
Section: The Spoof At Tacks In Biometricsmentioning
confidence: 99%
“…Several methods to spoof fingerprints have been pro posed, since the early papers of [2,3]. The most adopted approach is the so-called "consensual" method, which is 4.…”
Section: Fingerprint Spoofsmentioning
confidence: 99%
“…For instance, a fake fingerprint or a photo of the targeted client [2,3,4]. These replicas are acquired and processed as "live" biomet rics.…”
Section: Introductionmentioning
confidence: 99%