Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.2.233

Fingerprint Smudge Attacks Based on Fingerprint Image Reconstruction on Smart Devices  

Lee, Hoyeon (Information Security Lab, Graduate School of Information, Yonsei University)
Kwon, Taekyoung (Information Security Lab, Graduate School of Information, Yonsei University)
Abstract
Fingerprint authentication identifies individuals based on user specific information. It is widely used as it is convenient, secure and has no risk of leakage, loss, or forgotten. However, the latent fingerprints remaining on the smart device's surface are vulnerable to smudge attacks. We analyze the usage patterns of individuals using smart device and propose methods to reconstruct damaged fingerprint images using fingerprint smudges. We examine the feasibility of smudge attacks with frequent usage situations by reconstructing fingerprint smudges collected from touch screens. Finally, we empirically verify the vulnerability of fingerprint authentication systems by showing high attack rates.
Keywords
Smart Device; Fingerprint Authentication; Fingerprint Reconstruction; Smudge Attacks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Andriotis, T. Tryfonas and Z. Yu, "POSTER: Breaking the Android Pattern Lock Screen with Neural Networks and Smudge Attacks," In Proc. of the sixth ACM conference on Security and privacy in wireless and mobile networks (WiSec'14), Jul. 2014,
2 "OpenCV" https://opencv-python-tutroals.readthedocs.io/en/latest/py_tutorials/py_feature2d/py_matcher/py_matcher.html#matcher.
3 Apple Inc, "About Touch ID security on iPhone and iPad," https://support.apple.com/en-us/HT204587.
4 Anonymous Authors, Full paper in preparation.
5 L. Hong, Y. Wan and A.K. Jain, "Fingerprint Image Enhancement: Alogrithm and Performance Evaluation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 777-789, Sept. 1998.   DOI
6 A. Jain, L. Hong and R. Bolle, "On-Line Fingerprint Verification," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 302-313, Apr. 1997.   DOI
7 A. Goode, "Bring your own finger-how mobile is bringing biometrics to consumers," Biometric Technology Today, vol. 2014, no. 5, pp. 5-9, May. 2014.   DOI
8 A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J.M. Smith, "Smudge Attacks on Smartphone Touch Screens," In Proc. of the 4th USENIX Conference on Offensive Technologies (WOOT'10), pp. 1-7, Aug. 2010.
9 S. Chikkerur, A.N. Cartwright and V. Govindaraju "Fingerprint enhancement using STFT analysis," Pattern Recognition, vol. 40, no. 1, pp. 198-211, Jan. 2007.   DOI
10 J. Feng, J. Zhou and A. K. Jain, "Orientation Field Estimation for Latent Fingerprint Enhancement,", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 4, pp. 925-940, Apr. 2013.   DOI
11 R. Thai, "Fingerprint Image Enhancement and Minutiae Extraction," Ph. D. Thesis, School of Computer Science and Software Engineering, The University of Western Australia, 2003.
12 R. Cappelli, D. Maio and A. Lumini, "Fingerprint Image Reconstruction from Standard Templates," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 9, Sept. 2007.
13 Y. Zhang, P. Xia, J. Luo, Z. Ling, B. Liu and X. Fu, "Fingerprint Attack against Touch-enabled Devices," In Proc. of the second ACM workshop on Security and privacy in smartphones and mobile devices, pp. 57-68, Oct. 2012.
14 S. Greenberg, M. Aladjem, D. Kogan and I. Dimitrov, "Fingerprint Image Enhancement Using Filtering Techniques," In Proc. of the 15th International Conference on Pattern Recognition, pp. 3-7, Sept. 2000.
15 K. Zuiderveld, "Contrast Limited Adaptive Histogram Equalization," Graphics Gems IV, Academic Press Professional, Inc., pp.474-485, 1994.
16 L. Hong, A. Jain, "Fingerprint Image Enhancement," Automatic Fingerprint Recognition Systems, pp. 127-143, 2004.
17 D.G. Lowe, "Object Recognition from Local Scale-Invariant Features," In Proc. of the Seventh IEEE International Conference on Computer Vision, vol. 2, pp. 1150-1157, Sept. 1999.
18 D.G. Lowe, "Distinctive Image Features from Scale-Invariant Keypoints," International Journal of Computer Vision, vol. 60, no. 2, pp. 91-110, Nov. 2004.   DOI
19 R. Vazan, "SourceAFIS," http://www.sourceafis.org/blog/.