AST Digital Magazine October 2017 Digital-Oct | Page 48
Volume 17
October 2017 Edition
Fingerprints are left on numerous surfaces and it
is possible to readily acquire a latent fingerprint in
under 60 seconds using a variety of known meth-
ods (e.g., lift tape, cyanoacrylate fuming, photog-
raphy).
Once latent prints are captured and digitized,
fingerprint molds and fake fingerprints are read-
ily produced using household materials such as
gelatin, latex paint and modeling clay.
Uncooperative Attack Process
1. Lift latent print via tape, photo, or fuming
2. Digitize image and create mold via acetate,
PCB etching, or 3D printed mold
3. Create spoofs
4. Execute spoof attack
Solutions for Enhanced Security
(Fingerprint software with spoof and liveness detection pre-
vent fraud using fake fingerprints in mobile payments. Cour-
tesy of Precise Biometrics and YouTube)
Courtesy of Precise Biometrics
Precise Biometrics’ solutions and services for
mitigating spoof-related risks, such as fake fin-
gers, are designed to protect fingerprint
sensors and lower the risk for fraud.
Their spoof and liveness detection soft-
ware further increases security of finger-
print authentication and our additional
products and services improves the spoof
detection capabilities of fingerprint tech-
nology.
The following products and services are
available:
Spoof and liveness detection software
Precise Biometrics’ Spoof and liveness
detection software identifies a fake fin-
gerprint by analyzing several fundamen-
tal image differences between a live fin-
gerprint image, and one from a spoof.
The benefits of having a software-
based solution are:
48