Please enable JavaScript.
Coggle requires JavaScript to display documents.
Fingerprint (Attacks (Attacking the communications (To do this,
…
Fingerprint
-
-
Using artifacts
- For RF >>no need
- For capacitance scanners: attacker
breathe or blow across the surface of the imager, or use a thin walled
plastic bag with water in it laid on the imager.
- For an optical device: done by shining bright lights into the camera, or by covering the platen with a hand, darkening it sufficiently to
simulate a finger placement.
- Remove the artifact
- Require the biometric system not to accept same print twice in a row
- Use alive-and-well detection
Mitigating this attack:
- make the fallback as strong as possible
- assign a token and password for fallback
-
Pattern-based
› Template size is not important
› The speed is important.
› The application does not require high throughput
Hybrid algorithm
› Template size is not important
› Faster matching is required than enrollment
› The application has high throughput
-
-