Problem Statement
Build a solution that shall enable authentication using fingerprint, such as the one available on some of the smart phones that is able to determine fake or real fingerprint.
Today, passwords are commonplace across all platforms and conceivably all websites. However, it can be tough to remember such complicated passwords, let alone for so many different websites. For this reason, you can create a project that shows a graphical password strategy. By doing so, the user will be able to create passwords in the form of graphical presentations that follow a specific pattern, which they may then use to log in to the system.
PS Number: PSCBS008
Domain Bucket: Cyber Security
Category: Software
Dataset : NA
To detect whether the fingerprint used for biometric authentication is true or fake is the goal of this problem statement. Many government and business organisations use biometric access control systems to make sure that only people with the proper authorization can use a facility, equipment, or application. False synthetic fingerprints that have been artificially shaped and are remarkably close to real fingerprints are used by dishonest people and hostile actors to try to take advantage of such systems.

Background of the Problem
Passwords are now widely used on all platforms, including theoretically all websites. To remember such complex passwords, let alone ones for so many different websites, might be challenging. You can therefore make a project that displays a graphical password approach. The user can then use these passwords to log in to the system. They can accomplish this by creating passwords in the form of graphical presentations that follow a particular pattern.
Objective
The objective of this problem statement is to determine if the fingerprint applied as part of biometric authentication is real or artificial Biometric access control systems are widely deployed at various government as well as private organisations, for ensuring that only authorized individuals are able to access a facility, device or application Unscrupulous individuals and hostile actors try to abuse such systems by using fake artificially molded synthetic fingerprints that are very similar to the actual fingerprint.
Summary
Fingerprint biometrics can be used to authenticate a person based on matching the data within a system, or it can be used as a method of identity verification to ensure that a person is who they say they are. Fingerprint biometrics can add an extra layer of security over password and token security measures.