![hardware fingerprint spoofing hardware fingerprint spoofing](https://media.springernature.com/original/springer-static/image/prt%3A978-1-4899-7488-4%2F1/MediaObjects/978-1-4899-7488-4_1_Part_Fig2-68_HTML.jpg)
#HARDWARE FINGERPRINT SPOOFING ISO#
One of the major challenges facing biometric technology today is the growing threat of presentation attacks 1 1 1In ISO standard IEC 30107-1:2016(E), presentation attacks are defined as the “presentation to the biometric data capture subsystem with the goal of interfering with the operation of the biometric system”. Finally, fingerprint matching experimentsīetween images acquired from the FTIR output of RaspiReader and images acquiredįrom a COTS reader verify the interoperability of the RaspiReader with existingĬOTS optical readers. Improvement over previous methods relying only on grayscale FTIR images Usingīoth of these image streams, we extract complementary information which, whenįused together and used for spoof detection, results in marked performance The other outputs direct images of the finger in contact with the platen. One camera provides highĬontrast, frustrated total internal reflection (FTIR) fingerprint images, and Two cameras for fingerprint image acquisition. One such spoof detection technique by specially customizing RaspiReader with
![hardware fingerprint spoofing hardware fingerprint spoofing](https://www.mdpi.com/sensors/sensors-20-03379/article_deploy/html/images/sensors-20-03379-g012.png)
Spoof detection techniques involving both hardware and software. Source fingerprint reader will facilitate the exploration of novel fingerprint As such, RaspiReader provides the fingerprint researchĬommunity a seamless and simple method for quickly prototyping new ideas Our open source STL files and software, RaspiReader can be built in under one We open source an easy to assemble, spoof resistant, high resolution, opticalįingerprint reader, called RaspiReader, using ubiquitous components.