National Conference on Advances in Computing |
Foundation of Computer Science USA |
NCAC2015 - Number 7 |
December 2015 |
Authors: Samruddhi S. Kulkarni, Hemprasad Y. Patil |
cf956f10-1629-496a-897b-607fe7d85ee0 |
Samruddhi S. Kulkarni, Hemprasad Y. Patil . Survey on Fingerprint Spoofing, Detection Techniques and Databases. National Conference on Advances in Computing. NCAC2015, 7 (December 2015), 30-33.
In biometrics, Fingerprint is widely used in identification of individual's identity. Biometric recognition is leading technology for identification and security systems. Fingerprint has unique identification among all other biometric modalities. Use of the fingerprints as biometric characteristics is extensively used and developed for fingerprint recognition in forensic, civilian and commercial applications. This paper presents the brief data about fingerprint spoofing which encompasses misuse caused by the attackers. Fingerprint spoofing detection attributes to the investigation of the finger characteristics to ensure whether the finger is spoofed or live. The various spoofing types are explained and there detection techniques are introduced with three commonly used databases.