{"title":"生物识别干扰器:防止偷拍指纹而不给用户带来不便","authors":"Tateo Ogane, I. Echizen","doi":"10.1109/BTAS.2017.8272705","DOIUrl":null,"url":null,"abstract":"As fingerprint authentication technology becomes more advanced, it is being used in a growing range of personal devices such as PCs and smartphones. On the other hand, it has been pointed out that digital cameras can be used to capture people's fingerprints remotely, leaving them at risk of illegal log-ins or identity theft. This article shows how photographs can be processed to facilitate illegal fingerprint authentication. To prevent this from happening, we also propose a method that defeats the use of surreptitious photography to replicate fingerprints from photographs while still allowing contact-based fingerprint sensors to respond normally. We have verified that an implementation of the proposed method called Biometric Jammer can be worn to effectively prevent the illegal acquisition of fingerprints by surreptitious photography without inconveniencing the user or preventing the use of legitimate fingerprint authentication devices.","PeriodicalId":372008,"journal":{"name":"2017 IEEE International Joint Conference on Biometrics (IJCB)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users\",\"authors\":\"Tateo Ogane, I. Echizen\",\"doi\":\"10.1109/BTAS.2017.8272705\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As fingerprint authentication technology becomes more advanced, it is being used in a growing range of personal devices such as PCs and smartphones. On the other hand, it has been pointed out that digital cameras can be used to capture people's fingerprints remotely, leaving them at risk of illegal log-ins or identity theft. This article shows how photographs can be processed to facilitate illegal fingerprint authentication. To prevent this from happening, we also propose a method that defeats the use of surreptitious photography to replicate fingerprints from photographs while still allowing contact-based fingerprint sensors to respond normally. We have verified that an implementation of the proposed method called Biometric Jammer can be worn to effectively prevent the illegal acquisition of fingerprints by surreptitious photography without inconveniencing the user or preventing the use of legitimate fingerprint authentication devices.\",\"PeriodicalId\":372008,\"journal\":{\"name\":\"2017 IEEE International Joint Conference on Biometrics (IJCB)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Joint Conference on Biometrics (IJCB)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BTAS.2017.8272705\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Joint Conference on Biometrics (IJCB)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BTAS.2017.8272705","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Biometric Jammer: Preventing surreptitious fingerprint photography without inconveniencing users
As fingerprint authentication technology becomes more advanced, it is being used in a growing range of personal devices such as PCs and smartphones. On the other hand, it has been pointed out that digital cameras can be used to capture people's fingerprints remotely, leaving them at risk of illegal log-ins or identity theft. This article shows how photographs can be processed to facilitate illegal fingerprint authentication. To prevent this from happening, we also propose a method that defeats the use of surreptitious photography to replicate fingerprints from photographs while still allowing contact-based fingerprint sensors to respond normally. We have verified that an implementation of the proposed method called Biometric Jammer can be worn to effectively prevent the illegal acquisition of fingerprints by surreptitious photography without inconveniencing the user or preventing the use of legitimate fingerprint authentication devices.