Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems

A Roy, N Memon, A Ross - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
IEEE Transactions on Information Forensics and Security, 2017ieeexplore.ieee.org
This paper investigates the security of partial fingerprint-based authentication systems,
especially when multiple fingerprints of a user are enrolled. A number of consumer
electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors
for user authentication. The sensors embedded in these devices are generally small and the
resulting images are, therefore, limited in size. To compensate for the limited size, these
devices often acquire multiple partial impressions of a single finger during enrollment to …
This paper investigates the security of partial fingerprint-based authentication systems, especially when multiple fingerprints of a user are enrolled. A number of consumer electronic devices, such as smartphones, are beginning to incorporate fingerprint sensors for user authentication. The sensors embedded in these devices are generally small and the resulting images are, therefore, limited in size. To compensate for the limited size, these devices often acquire multiple partial impressions of a single finger during enrollment to ensure that at least one of them will successfully match with the image obtained from the user during authentication. Furthermore, in some cases, the user is allowed to enroll multiple fingers, and the impressions pertaining to multiple partial fingers are associated with the same identity (i.e., one user). A user is said to be successfully authenticated if the partial fingerprint obtained during authentication matches any one of the stored templates. This paper investigates the possibility of generating a “MasterPrint,” a synthetic or real partial fingerprint that serendipitously matches one or more of the stored templates for a significant number of users. Our preliminary results on an optical fingerprint data set and a capacitive fingerprint data set indicate that it is indeed possible to locate or generate partial fingerprints that can be used to impersonate a large number of users. In this regard, we expose a potential vulnerability of partial fingerprint-based authentication systems, especially when multiple impressions are enrolled per finger.
ieeexplore.ieee.org
Showing the best result for this search. See all results