System for and method of securing fingerprint biometric systems against fake-finger spoofing
First Claim
1. A biometric secured system comprising:
- a fingerprint sensor for capturing fingerprint image data; and
a spoof detection module programmed to determine a spoof probability from a combination of metrics derived from the fingerprint image data.
6 Assignments
0 Petitions
Accused Products
Abstract
A biometric secured system grants a user access to a host system by classifying a fingerprint used to verify or authorize the user to the system as real or fake. The classification is based on a probability that fingerprint image data corresponds to characteristics that reliably identify the finger as real. The system includes a fingerprint sensor for capturing fingerprint image data coupled to a spoof detection module. In one embodiment, the spoof detection module is programmed to determine spoof probability based on a combination of metrics that include, among other metrics, pixel gray level average and the variance of pixels corresponding to a fingerprint ridge, pixel gray level average and the variance of pixels corresponding to a fingerprint valley, density of sweat pores, and density of sweat streaks, to name a few metrics.
185 Citations
40 Claims
-
1. A biometric secured system comprising:
-
a fingerprint sensor for capturing fingerprint image data; and
a spoof detection module programmed to determine a spoof probability from a combination of metrics derived from the fingerprint image data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A spoof detection module comprising:
-
a metric calculator programmed to receive fingerprint image data and calculate a combination of multiple metrics; and
classifier logic programmed to receive the multiple metrics and determine a spoof probability based on the combination of the multiple metrics. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of determining the similarity of a finger to human skin, comprising:
-
capturing fingerprint image data; and
determining a spoof probability that the finger is real based on a combination of metrics derived from the fingerprint image data. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification