Skip to content

Towards realistic fingerprint presentation attacks: The ScreenSpoof method


Using mobile devices, people leave latent fingerprints on the screen that can be photographed and used as a mold to fabricate high-quality spoofs. In this paper, we analysed the threat level of realistic attacks using snapshot pictures of latent fingerprints against presentation attack detection systems. Our evaluation compares a semi-consensual acquisition, given by a voluntary pressure of the finger on the screen, with a completely non-consensual one, given by the normal use of the device.

AUTHORS Roberto Casula; Marco Micheletto; Giulia OrrùGian Luca MarcialisFabio Roli

DOI 10.1016/j.patrec.2022.09.002

Published in: Pattern Recognition Letters, Volume 171