Is a fake detection test necessary for all applications?
No. In practice, forgers must overcome further hurdles beyond the biometric authentication. The following examples should illustrate: • At home, one uses fingerprint authentication for access to the internet, so remembering or writing down a password is not necessary. A burglar will not have enough time to copy the appropriate finger. Naturally, he could take the entire PC including the authentication setting mode, and at his leisure make copies of the collected fingerprints (although searching for passwords would be much easier). In the meantime, however, the victim would notice the theft and change the password for internet access activated by fingerprint. • Again, take the case of fingerprint authentication for internet access. Further family members could gain access to an online account (e.g., a bank) via a finger copy. “Unfortunately” all transactions are documented and the foul play would be discovered, rendering this type of unauthorized access not worth while. Essentially more