This publication describes processes, methods, and techniques of safeguarding biometric authentication systems from fingerprint spoof attacks. A fingerprint spoof attack occurs when a malicious party attempts to access a user’s computing device by mimicking/replicating biometric identifiers inherent to the user’s fingerprint. To prevent fingerprint spoof attacks, an improved biometric authentication protocol includes, in a first step, verifying a user’s identity and, in a second step, determining if the finger presented is alive. As a result, fingerprint spoof attacks can be rejected when it is determined that the spoof finger does not exhibit characteristics of life.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.