{"id":3115,"date":"2014-07-22T06:00:32","date_gmt":"2014-07-22T10:00:32","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=3115"},"modified":"2022-06-16T06:32:28","modified_gmt":"2022-06-16T10:32:28","slug":"liveness-detection-fight-biometric-spoofing","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/","title":{"rendered":"Liveness Detection to Fight Biometric Spoofing"},"content":{"rendered":"<p><span style=\"color: #000000;\"><em><strong>The following post was written by Shaon Shahnewaz, Senior Executive in our Business Development &amp; Interactive Marketing Department<\/strong><\/em><\/span><\/p>\n<p><strong><em>Should we be wary of leaving our fingerprints behind? Circumventing biometric security access by spoofing the system &#8211; is turning from science-fiction to reality.<\/em><\/strong><\/p>\n<h2>Intro<\/h2>\n<p>There have been times where we have seen in sci-fi movies that thieves are copying and spoofing biometric identification management systems to gain unauthorized access to valuable information. Extracting eyeballs, and lifting fingerprints to create rubber molds to successfully fool a biometric recognition hardware device in the movies that might look like a cool thing to do, but have you thought about the implications of it in real life? What if, for example, someone right now is trying to copy your biometric information and using it to spoof a biometric system to <strong><a href=\"https:\/\/www.m2sys.com\/blog\/financial-services\/biometric-banking-technology-can-secure-transactions\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=secure%20transactions%20anywhere\">access your bank account<\/a><\/strong>?<\/p>\n<h2>What is Spoofing?<\/h2>\n<p>Biometric spoofing is a method of fooling a biometric identification management system, where an artificial object (like a fingerprint mold made of silicon) is presented to the\u00a0<strong><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/secret-behind-choosing-the-best-biometric-scanner\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=choosing%20biometric%20scanner\">biometric scanner<\/a><\/strong> that imitates the unique biological properties of a person which the system is designed to measure, so that the system will not be able to distinguish the artifact from the real biological target.<\/p>\n<h2>Are Biometric Characteristics Private?<\/h2>\n<p>Biometric spoofing is a growing concern. We leave fingerprints everywhere in our day to day lives, so the chance of someone lifting them and copying them is real. Currently it&#8217;s only researchers that are doing spoofing and copying for testing purposes and it is not a mainstream activity&#8211;but it could be soon as more businesses and governments around the world adopt biometrics for identification management. Many people are trying to classify biometric physiological characteristics as secret, but they aren&#8217;t. Our faces and irises are visible to everyone and our voices can be recorded. Fingerprints and DNA are left everywhere we go and it&#8217;s been proved that these are real threats to be replicated for the purpose of spoofing biometric systems.<\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/cloudABIS-m2sys-blog-ad.jpg\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudABIS\u2122<\/span><\/h2>\r\n\t\t\t<h3>Web API For Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Key Features:<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Simply connect to our Biometric API to perform fast 1:N Fingerprint\/ Finger-Vein\/ Iris Recognition<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=Liveness+Detection+to+Fight+Biometric+Spoofing&amp;utm_medium=CloudABIS&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<h2>Biometric Deployment Risks with Spoofing<\/h2>\n<p>Like any other security technology, biometrics has inherent weaknesses that can potentially compromise the security of a system. Susceptibility to spoofing attacks is just one of them. The implication of a biometric device\u2019s susceptibility to spoofing attacks includes:<\/p>\n<ul>\n<li>Artificial objects being used to mount attacks against existing enrollments in order to gain unauthorized access to the resources protected by the biometric system.<\/li>\n<li>Artificial objects being used to authenticate thus fraudulently associating an audit trail with an unwitting individual.<\/li>\n<li>Artificial objects being used to enroll in a biometric system and then delegating these objects across multiple individuals, undermining the integrity of the entire system.<\/li>\n<li>An individual may repudiate transactions associated with his account or enrollment &#8211; claiming instead that they are the result of attacks \u2013 due to the inability of the biometric system to ensure liveness detection.<\/li>\n<\/ul>\n<h2>What\u2019s the Solution?<\/h2>\n<p>Academic and industry experts have been researching methods to counter the threat of physical spoofing of biometric samples. In particular, various <strong>liveness detection<\/strong> methods have been conceived and implemented in some devices. Liveness detection is defined as <strong><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/reliable-biometric-modality\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=most%20reliable%20biometric\">biometric hardware devices<\/a><\/strong> that have the ability to look beyond the surface of the skin and can discriminate between the features of live skin and copies of those features in a fraction of a second. However, as every man made solution can be defeated, efforts to enhance and improve liveness detection remain a work in progress.<\/p>\n<p>Recently our researchers here at <strong><a title=\"M2SYS Technology\" href=\"https:\/\/www.m2sys.com\" target=\"_blank\" rel=\"noopener noreferrer\">M2SYS Technology<\/a><\/strong> developed a &#8220;smart&#8221; <a title=\"Link to M2-FuseID smart finger scanner web page\" href=\"https:\/\/www.m2sys.com\/m2-fuseid-multimodal-fingerprint-finger-vein-reader.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>biometric finger scanner<\/strong> <\/a>named M2-FuseID\u2122, which is capable of distinguishing fingerprints made of artificial objects from a live fingerprint. The liveness detection technology they have introduced for this is among the most sophisticated in the world. Our researchers have \u00a0designed the M2-FuseID\u2122 \u201csmart\u201d finger scanner by including \u00a0an extra liveness detection finger vein sensor just beside the regular fingerprint sensor in this advanced fingerprint reader. This advanced sensor can measure the liveness of the finger veins by identifying the presence of a live blood flow to detect whether the object it\u2019s scanning for fingerprints is artificial or a real finger.<\/p>\n<h2>Benefits of Adopting a Liveness Detection System with <a title=\"M2-FuseID\u2122\" href=\"https:\/\/www.m2sys.com\/m2-fuseid-multimodal-fingerprint-finger-vein-reader.htm\" target=\"_blank\" rel=\"noopener noreferrer\">M2-FuseID\u2122<\/a><\/h2>\n<p>Our M2-FuseID\u2122 smart fingerprint device with sophisticated liveness detection helps to minimize the risk against spoofing in the following manner:<\/p>\n<ul>\n<li>It simultaneously looks at and beneath the skin surface for live blood flow in the veins of the finger.<\/li>\n<li>Protects against fake and spoofed fingerprints.<\/li>\n<li>Provides protection from published and unpublished finger copying methods.<\/li>\n<li>Adaptable against future spoof threats.<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>Although biometric authentication devices can be susceptible to spoofing attacks, different anti-spoofing techniques can be developed and implemented that may significantly raise the level of difficulty of such attacks. Our <strong><a title=\"M2-FuseID\u2122\" href=\"https:\/\/www.m2sys.com\/m2-fuseid-multimodal-fingerprint-finger-vein-reader.htm\" target=\"_blank\" rel=\"noopener noreferrer\">M2-FuseID\u2122<\/a><\/strong>reader with advanced liveness detection identifies the individual being scanned as alive or fake in fingerprint biometric security systems. It has all the potential to enhance security, reliability, and effectiveness of a biometric system and protect against unauthorized access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following post was written by Shaon Shahnewaz, Senior Executive in our Business Development &amp; Interactive Marketing Department Should we<\/p>\n","protected":false},"author":3,"featured_media":16119,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"liveness detection","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Biometric ID systems are being deployed with more advanced technological biometric hardware featuring sophisticated livness detection.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[472,39,6,230,428],"class_list":["post-3115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-anti-spoofing","tag-biometric","tag-biometrics","tag-fingerprint-biometrics","tag-liveness-detection"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Liveness Detection to Fight Biometric Spoofing - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"Biometric ID systems are being deployed with more advanced technological biometric hardware featuring sophisticated livness detection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Liveness Detection to Fight Biometric Spoofing - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Biometric ID systems are being deployed with more advanced technological biometric hardware featuring sophisticated livness detection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-22T10:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-16T10:32:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/07\/6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16\"},\"headline\":\"Liveness Detection to Fight Biometric Spoofing\",\"datePublished\":\"2014-07-22T10:00:32+00:00\",\"dateModified\":\"2022-06-16T10:32:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/\"},\"wordCount\":900,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"anti-spoofing\",\"biometric\",\"biometrics\",\"fingerprint biometrics\",\"liveness detection\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/\",\"name\":\"Liveness Detection to Fight Biometric Spoofing - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2014-07-22T10:00:32+00:00\",\"dateModified\":\"2022-06-16T10:32:28+00:00\",\"description\":\"Biometric ID systems are being deployed with more advanced technological biometric hardware featuring sophisticated livness detection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Liveness Detection to Fight Biometric Spoofing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Liveness Detection to Fight Biometric Spoofing - Digital Transformation of Government Services","description":"Biometric ID systems are being deployed with more advanced technological biometric hardware featuring sophisticated livness detection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/","og_locale":"en_US","og_type":"article","og_title":"Liveness Detection to Fight Biometric Spoofing - Digital Transformation of Government Services","og_description":"Biometric ID systems are being deployed with more advanced technological biometric hardware featuring sophisticated livness detection.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2014-07-22T10:00:32+00:00","article_modified_time":"2022-06-16T10:32:28+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/07\/6.jpg","type":"image\/jpeg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16"},"headline":"Liveness Detection to Fight Biometric Spoofing","datePublished":"2014-07-22T10:00:32+00:00","dateModified":"2022-06-16T10:32:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/"},"wordCount":900,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["anti-spoofing","biometric","biometrics","fingerprint biometrics","liveness detection"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/","name":"Liveness Detection to Fight Biometric Spoofing - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2014-07-22T10:00:32+00:00","dateModified":"2022-06-16T10:32:28+00:00","description":"Biometric ID systems are being deployed with more advanced technological biometric hardware featuring sophisticated livness detection.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/liveness-detection-fight-biometric-spoofing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Liveness Detection to Fight Biometric Spoofing"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Matt Gibson","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3115"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=3115"}],"version-history":[{"count":10,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3115\/revisions"}],"predecessor-version":[{"id":16121,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3115\/revisions\/16121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16119"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=3115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=3115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=3115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}