Description

Fingerprints have been widely used as a practical method of biometrics authentication or identification with a significant level of security. However, several spoofing methods have been used in the last

Fingerprints have been widely used as a practical method of biometrics authentication or identification with a significant level of security. However, several spoofing methods have been used in the last few years to bypass fingerprint scanners, thus compromising data security. The most common attacks occur by the use of fake fingerprint during image capturing. Imposters can build a fake fingerprint from a latent fingerprint left on items such as glasses, doorknobs, glossy paper, etc.

Reuse Permissions
  • 3.52 MB application/pdf

    Download count: 0

    Details

    Contributors
    Date Created
    • 2017
    Resource Type
  • Text
  • Collections this item is in
    Note
    • Partial requirement for: M.S., Arizona State University, 2017
      Note type
      thesis
    • Includes bibliographical references (pages 58-61)
      Note type
      bibliography
    • Field of study: Electrical engineering

    Citation and reuse

    Statement of Responsibility

    by Peng Zheng

    Machine-readable links