https://www.defcon.org/images/defcon-13/dc13-presentations/D...
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.10....
> For eliminating type 2 attacks, where a previously intercepted biometric is replayed, Ratha et al. [9] proposed a challenge/response based system. A pseudo-random challenge is presented to the sensor by a secure transaction server. At that time, the sensor acquires the current biometric signal and computes the response corresponding to the challenge (for example, pixel values at locations indicated in the challenge). The acquired signal and the corresponding response are sent to the transaction server where the response is checked against the received signal for consistency. An inconsistency reveals the possibility of the resubmission attack.
Please provide evidence you have a better defense against replay attacks. Then we can go through all the other avenues of attack on biometrics...
> You're assuming all recognition algorithms of the same biometric produce the same raw template. That if I get one I can gain access on another.
The fact replay attacks are taken seriously in regards to biometrics and you arguing you cannot engage in such makes me seriously question your claims of authority on the subject matter.
> It's often frustrating to discuss things with those who clearly know little about the topic and yet declare their opinion as fact.
How many papers basically agreeing some kind of challenge is needed in addition to the biometric will you need before you change your mind?