{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:30:59Z","timestamp":1743103859169,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020018"},{"type":"electronic","value":"9783642020025"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02002-5_4","type":"book-chapter","created":{"date-parts":[[2009,5,13]],"date-time":"2009-05-13T12:20:10Z","timestamp":1242217210000},"page":"57-69","source":"Crossref","is-referenced-by-count":21,"title":["Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin"],"prefix":"10.1007","author":[{"given":"Claude","family":"Barral","sequence":"first","affiliation":[]},{"given":"Assia","family":"Tria","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/11608288_30","volume-title":"Advances in Biometrics","author":"A. Antonelli","year":"2005","unstructured":"Antonelli, A., Cappelli, R., Maio, D., Maltoni, D.: A new approach to fake finger detection based on skin distortion. In: Zhang, D., Jain, A.K. (eds.) ICB 2005. LNCS, vol.\u00a03832, pp. 221\u2013228. Springer, Heidelberg (2005)"},{"key":"4_CR2","unstructured":"Fingerprint\u00a0Duplication Archive. How to duplicate your fingerprints, www.journalofaestheticsandprotest.org\/4\/fingerprint\/fingerprint.pdf (last access, 2008\/06\/15)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Barral, C., Vaudenay, S.: A protection scheme for moc-enabled smart cards. In: IEEE - Biometric Consortium Conference, 2006 Biometrics Symposium: Special Session on Research at the (2006)","DOI":"10.1109\/BCC.2006.4341632"},{"key":"4_CR4","unstructured":"Chaos\u00a0Computer Club. How to fake fingerprints? http:\/\/www.ccc.de\/biometrie\/fingerabdruck_kopieren.xml?language=en (last access, 2008\/06\/15)"},{"key":"4_CR5","series-title":"IFIP Conference Proceedings","volume-title":"Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, CARDIS 2000","year":"2000","unstructured":"Domingo-Ferrer, J., Chan, D., Watson, A. (eds.): Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, CARDIS 2000, Bristol, UK, September 20-22. IFIP Conference Proceedings, vol.\u00a0180. Kluwer, Dordrecht (2000)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Hachez, G., Koeune, F., Quisquater, J.-J.: Biometrics, Access Control, Smart Cards: A not so simple combination. In: Domingo-Ferrer, et al. (eds.) [5], pp. 273\u2013288","DOI":"10.1007\/978-0-387-35528-3_16"},{"key":"4_CR7","unstructured":"Innovatrics. Id_demo, http:\/\/www.innovatrics.com\/products\/iddemo\/ (last access, 2008\/06\/15)"},{"key":"4_CR8","unstructured":"International Business Machines Corp. The consideration of data security in a computer environment. IBM, Data Processing Division (1968)"},{"key":"4_CR9","volume-title":"Biometrics - Personal Identification in Networked Society","author":"A. Jain","year":"1999","unstructured":"Jain, A., Bolle, R., Pankanti, S.: Biometrics - Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TPAMI.2007.250596","volume":"29","author":"A.K. Jain","year":"2007","unstructured":"Jain, A.K., Chen, Y., Demirkus, M.: Pores and ridges: High-resolution fingerprint matching using level 3 features. IEEE Trans. Pattern Anal. Mach. Intell.\u00a029(1), 15\u201327 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Jia, J., Cai, L., Zhang, K., Chen, D.: A new approach to fake finger detection based on skin elasticity analysis. In: Lee, Li (eds.) [12], pp. 309\u2013318","DOI":"10.1007\/978-3-540-74549-5_33"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Biometrics","year":"2007","unstructured":"Lee, S.-W., Li, S.Z. (eds.): ICB 2007. LNCS, vol.\u00a04642. Springer, Heidelberg (2007)"},{"key":"4_CR13","unstructured":"Mainguet, J.-F.: http:\/\/pagesperso-orange.fr\/fingerchip\/biometrics\/types\/fingerprint_sensors.htm (last access, 2008\/06\/15)"},{"issue":"4","key":"4_CR14","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/S0167-739X(99)00064-3","volume":"16","author":"J.-F. Mainguet","year":"2000","unstructured":"Mainguet, J.-F., P\u00e9gulu, M., Harris, J.B.: Fingerprint recognition based on silicon chips. Future Generation Comp. Syst.\u00a016(4), 403\u2013415 (2000)","journal-title":"Future Generation Comp. Syst."},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1007\/3-540-36178-2_36","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"T. Matsumoto","year":"2002","unstructured":"Matsumoto, T.: Gummy and conductive silicone rubber fingers. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 574\u2013575. Springer, Heidelberg (2002)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial gummy fingers on fingerprint systems. In: Optical Security and Counterfeit Deterrence Techniques IV, proceedings of SPIE, vol.\u00a04677, pp. 275\u2013289 (2002)","DOI":"10.1117\/12.462719"},{"key":"4_CR17","unstructured":"NEUROtechnology. Verifinger sdk, http:\/\/www.neurotechnology.com\/vf_sdk.html (last access, 2008\/06\/15)"},{"issue":"3","key":"4_CR18","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TSMCC.2005.848192","volume":"35","author":"S.T.V. Parthasaradhi","year":"2005","unstructured":"Parthasaradhi, S.T.V., Derakhshani, R., Hornak, L.A., Schuckers, S.A.C.: Time-series detection of perspiration as a liveness test in fingerprint devices. IEEE Transactions on Systems, Man, and Cybernetics, Part C\u00a035(3), 335\u2013343 (2005)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C"},{"key":"4_CR19","unstructured":"The Register. Get your german interior minister\u2019s fingerprint here, http:\/\/www.theregister.co.uk\/2008\/03\/30\/german_interior_minister_fingerprint_appropriated\/ (last access, 2008\/06\/15)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Rowe, R.K.: Biometrics based on multispectral skin texture. In: Lee, Li (eds.) [12], pp. 1144\u20131153","DOI":"10.1007\/978-3-540-74549-5_119"},{"key":"4_CR21","unstructured":"Sandstr\u00f6m, M.: Liveness detection in fingerprint recognition systems. Master thesis, Link\u00f6ping university, Sweden (2004)"},{"key":"4_CR22","unstructured":"Schuckers, S.: Clarkson university engineer outwits high-tech fingerprint fraud, http:\/\/www.yubanet.com\/cgi-bin\/artman\/exec\/view.cgi\/38\/28878 (last access, 2008\/06\/15)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"van der Putte, T., Keuning, J.: Biometrical fingerprint recognition: Don\u2019t get your fingers burned. In: Domingo-Ferrer, et al. (eds.) [5], pp. 289\u2013306","DOI":"10.1007\/978-0-387-35528-3_17"}],"container-title":["Lecture Notes in Computer Science","Formal to Practical Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02002-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:45:25Z","timestamp":1558302325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02002-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020018","9783642020025"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02002-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}