This publication describes processes, methods, and techniques of safeguarding biometric authentication systems from fingerprint spoof attacks. A fingerprint spoof attack occurs when a malicious party attempts to access a user’s computing device by mimicking/replicating biometric identifiers inherent to the user’s fingerprint. To prevent fingerprint spoof attacks, an improved biometric authentication protocol includes, in a first step, verifying a user’s identity and, in a second step, determining if the finger presented is alive. As a result, fingerprint spoof attacks can be rejected when it is determined that the spoof finger does not exhibit characteristics of life.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Sammoura, Firas and Bussat, Jean-Marie, "Safeguarding Biometric Authentication Systems from Fingerprint Spoof Attacks", Technical Disclosure Commons, (December 16, 2019)