Fingerprints have been widely used as a practical method of biometrics authentication or identification with a significant level of security. However, several spoofing methods have been used in the last few years to bypass fingerprint scanners, thus compromising data security. The most common attacks occur by the use of fake fingerprint during image capturing. Imposters can build a fake fingerprint from a latent fingerprint left on items such as glasses, doorknobs, glossy paper, etc.
Download count: 0
- Partial requirement for: M.S., Arizona State University, 2017Note typethesis
- Includes bibliographical references (pages 58-61)Note typebibliography
- Field of study: Electrical engineering