Search
Close this search box.

What is spoofing

Face Anti Spoofing In the recent times as biometric recognition systems increase their performance, IT Managers have to take in great consideration possible direct attack; potential intruders may gain access to the IT system by directly interacting with the system input device, like a normal user would. Such attempts are referred as spoofing attacks. Our […]

Security Vulnerabilities of a biometric system

Biometrics and Cryptography : The biometric Password   Biometrics provide a person with unique characteristics which are always there.  Can they be used as a cryptographic key?   First of all we can define  Conventional cryptography a methodology based on encryption keys, which are just bit strings long enough, usually 128 bit or more.  These […]