Biometric data can be easily obtained directly from a person, online, or through existing databases and then used to create spoofing Attack. The presentation of a biometric spoof (e.g. a facial image or video of a person on a tablet or a fake silicone or gelatin fingerprint) to a biometric sensor may be detected by Presentation Attack Detection.