2016
DOI: 10.1504/ijbm.2016.077826
|View full text |Cite
|
Sign up to set email alerts
|

Challenging USB fingerprint scanner security protocol: a methodology using casting agents to capture digit and latent ridge detail to enable access

Abstract: Fingerprint scanners are used as a form of control with access limited to the beholder of the ridge detail. However, to what extent these devices are capable of providing that control has not been fully explored. This study tested the reliability of a fingerprint scanner in accessing enrolled fingerprint data, when faced with the challenge of fake fingerprints. Ridge detail casts were crafted from moulds, with gelatine and silicone being applied as casting agents. The second stage required participants to plac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…One cannot alter an already designed security set up of system device unless the user gets physical access to it [11]. Therefore, in case a thief get access to your phone the thief may be motivated to use a fake silicon finger, to trick the fingerprint reader unlock the phone and retrieve all interest information stored on the memory of the phone [12].…”
Section: Utilizing Technology For Authenticationmentioning
confidence: 99%
“…One cannot alter an already designed security set up of system device unless the user gets physical access to it [11]. Therefore, in case a thief get access to your phone the thief may be motivated to use a fake silicon finger, to trick the fingerprint reader unlock the phone and retrieve all interest information stored on the memory of the phone [12].…”
Section: Utilizing Technology For Authenticationmentioning
confidence: 99%