![hardware fingerprint spoofing hardware fingerprint spoofing](https://www.mdpi.com/sensors/sensors-20-03379/article_deploy/html/images/sensors-20-03379-g005.png)
Authentication process validates the identity of user by utilizing one (or more) of the three-authentication factor - something user knows (the PIN or password), something user has (the card or keys), or something user is (the biometrics). Several efforts have been made to develop systems that can identify and authenticate genuine users. We also present the key challenges, major issues and point out some of the salient and useful research directions.ĭue to exponential growth in digital information and communication technologies, the need and importance of robust user authentication is increasing day by day.
![hardware fingerprint spoofing hardware fingerprint spoofing](https://ars.els-cdn.com/content/image/1-s2.0-S0031320316302576-fx1.jpg)
The goal of this chapter is to provide a comprehensive overview on works in the field of spoofing and anti-spoofing with special attention to three mainly accepted biometric traits (i.e., fingerprint, face and iris) and multimodal biometric systems. Numerous techniques have been developed over the years for biometric spoofing and anti-spoofing. Since, biometric traits are overt, leading thus to a threat of them being captured, copied, and forged. The prime objective of such methods is to assure that the systems are only accessed by genuine users. The advantages of biometrics over traditional security systems have triggered large-scale deployment of biometrics as an authentic technique to determine the identity of an individual.
![hardware fingerprint spoofing hardware fingerprint spoofing](https://media.springernature.com/original/springer-static/image/prt%3A978-1-4899-7488-4%2F1/MediaObjects/978-1-4899-7488-4_1_Part_Fig2-68_HTML.jpg)
AbstractThe demand for reliable and robust person recognition systems has expanded due to intense security requirements in today's highly intertwined network society.