AST Digital Magazine October 2017 Digital-Oct | Page 48

Volume 17 October 2017 Edition Fingerprints are left on numerous surfaces and it is possible to readily acquire a latent fingerprint in under 60 seconds using a variety of known meth- ods (e.g., lift tape, cyanoacrylate fuming, photog- raphy). Once latent prints are captured and digitized, fingerprint molds and fake fingerprints are read- ily produced using household materials such as gelatin, latex paint and modeling clay. Uncooperative Attack Process 1. Lift latent print via tape, photo, or fuming 2. Digitize image and create mold via acetate, PCB etching, or 3D printed mold 3. Create spoofs 4. Execute spoof attack Solutions for Enhanced Security (Fingerprint software with spoof and liveness detection pre- vent fraud using fake fingerprints in mobile payments. Cour- tesy of Precise Biometrics and YouTube) Courtesy of Precise Biometrics Precise Biometrics’ solutions and services for mitigating spoof-related risks, such as fake fin- gers, are designed to protect fingerprint sensors and lower the risk for fraud. Their spoof and liveness detection soft- ware further increases security of finger- print authentication and our additional products and services improves the spoof detection capabilities of fingerprint tech- nology. The following products and services are available: Spoof and liveness detection software Precise Biometrics’ Spoof and liveness detection software identifies a fake fin- gerprint by analyzing several fundamen- tal image differences between a live fin- gerprint image, and one from a spoof. The benefits of having a software- based solution are: 48