Recorded on March 18, 2015
Systems integrators and end users deploying new biometric systems, as well as those testing vulnerabilities in existing systems, need to understand the risks that spoof attacks pose. Although much media attention has been focused on sensational biometric fingerprint spoofs, such as gelatin fingerprints, the true threat of fingerprint spoofing to deployed biometric systems can vary widely.
Please join Novetta Technical Consultant, Andrea Choiniere, for a discussion on selecting the appropriate fingerprint systems to use, determining whether or not systems should be supervised, and when multimodal systems should be deployed. Factors to consider during selection include the acceptable cost, time investment, and spoof vulnerability for each specific deployment.
This webinar explores the types of sensors frequently deployed for different applications and their respective vulnerabilities to spoof attacks, including the level of effort required to create a successful spoof. Examples will be drawn from two case study research efforts conducted by Novetta on:
- Spoofing capacitive fingerprint sensors
- The effects of scarring and skin grafting on fingerprint match rates
Andrea Choiniere, Novetta Technical Consultant, Novetta