True identity put to test

August 2016 Editor's Choice, Access Control & Identity Management, Integrated Solutions

Technology related to physical security systems has made great leaps forward, yet traditional authentication methods such as locks and keys, PINs, and cards are still widely used. These methods increase the risk of credential breach where credentials are passed to others or are lost or stolen, ultimately leading to a compromise in security.

Biometric authentication can easily resolve such problems, drastically enhancing security and the credibility of personal authentication by forcing the use of true identity and preventing people from authenticating themselves using someone else’s credentials.

The advantages provided by biometric technology have allowed for quick adoption by security markets. Among the biometric technologies, fingerprint technology offers the most flexibility with cost benefits that enable its adoption into various applications. Today, fingerprint is the most flexible and reliable method with higher recognition rates than other biometric technologies such as iris, facial, and vein recognition.

However, there is a growing concern with regards to the use of fake fingerprints, since fingerprint residue can easily be captured off of things that we touch in our daily lives. If we do not pay enough attention, somebody can capture and replicate your fingerprints and use them for malicious purposes.

Fake fingerprints and spoofing

Fake fingerprints are made from materials like clay, gelatine, silicone and rubber. Authenticating with these fake fingerprints is called ‘spoofing’. After the release of the iPhone 5S and the introduction of a built-in fingerprint sensor, contests to crack the device’s fingerprint scanner have been held with many hackers joining the competitions and several IT magazines reporting on the vulnerability of fingerprint sensors against fake fingerprints. Numerous videos have recently been uploaded onto YouTube about hackers that have breached the security by making fake fingerprints from Play-Doh, gelatine, silicone, rubber and the likes – including explanations on how to make these fake fingerprints.

What is the solution?

Suprema’s Live Finger Detection (LFD) technology is based on the analysis of the dynamic and static image characteristics of fake fingers and how they can be distinguished from those of live fingers. Using an advanced analysis algorithm, abnormalities are detected in the dynamic changing patterns of fingerprint images and several static features of liveness or unnaturalness of fingers, clearly distinguishing fake fingers from live fingers.

Dynamic changing pattern analysis

As fingers gradually make contact with the sensor surface, live fingers naturally demonstrate changes in patterns of area, intensity, and movement, but fake fingers produce unnatural changing patterns of separated areas, partially dark areas, distorted boundary shape, and a large movement in the core part. By detecting these abnormalities in dynamic changing patterns from continuous analysis of fingerprint images, fake fingers are distinguished from live fingers. Specifically, this method is very effective in rejecting fake fingers made from hard materials such as paper, film, clay, and hard rubber.

Liveness feature analysis

In fingerprint images, there are several localised features which reveal the liveness of fingers: pore distribution, ridge sharpness, regularity of ridge-valley boundary, amongst others. These localised liveness features are normally too small and elaborate to be copied by simple and soft faking materials such as silicon, rubber and gelatine. Since Suprema’s high performance imaging sensor can capture high quality fingerprint images, various local liveness features are easily distinguished by our advanced analysis algorithm.

Unnaturalness feature analysis

Usually, it is very hard to make a perfect fake finger and almost every fake finger cannot avoid revealing its unnaturalness – unnatural sharp boundaries, too many white blobs or too large black blobs within a fingerprint area, abnormal peaks in histogram distribution and so on. By observing the mixture of various unnaturalness features, numerous fake fingers are effectively rejected.

Liveness Decision Engine

Suprema’s newly developed Liveness Decision Engine (LDE) can effectively prevent spoofing. It detects fake fingerprints with a technology called Dual Light Source Imaging which utilises infrared rays and a white light.

The LDE can block fake fingerprints made from paper, film, glue, rubber, clay and silicon by comparing images obtained with white lights and infrared rays.

The new OP5 sensor applied to Suprema’s recently released fingerprint readers has reduced distortion and improved contrast uniformity, and features an Adaptive Gain Control algorithm and a proximity sensor, which enables the sensor to detect fake fingerprints made from paper, film, glue, rubber, clay and silicon all together.

For more information contact Suprema, +27 (0)11 784 3952, enquiry@suprema.co.za, www.suprema.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Mining (Industry) Risk Management & Resilience
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Risk Management & Resilience
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Risk Management & Resilience
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Risk Management & Resilience
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...