Challenging USB fingerprint scanner security protocol: a methodology using casting agents to capture digit and latent ridge detail to enable access

نویسندگان

  • Samuel McKenna
  • Mark Butler
چکیده

Fingerprint scanners are used as a form of control with access limited to the beholder of the ridge detail. However, to what extent these devices are capable of providing that control has not been fully explored. This study tested the reliability of a fingerprint scanner in accessing enrolled fingerprint data, when faced with the challenge of fake fingerprints. Ridge detail casts were crafted from moulds, with gelatine and silicone being applied as casting agents. The second stage required participants to place fingerprints on a bottle or tile; these latent impressions were subsequently powdered using Magneta Flake. Provil, a forensic casting material was applied directly onto the powder, creating simulated fingerprints from a latent print. Each of the produced fingerprints then went through a scanning process. All materials tested were able to gain access through the participants’ enrolled data. This suggests potential unreliability of the fingerprint scanner in storing pertinent data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

A Survey on Latent Fingerprint Enhancement via Image Decomposition Techniques

The Latent fingerprints are used for criminal identification which is lifted from surfaces of objects at crime scenes play a role in identifying aspects in the crime scene investigations. Latent fingerprint images are usually of poor quality with unclear ridge structure and various overlapping patterns. Latent fingerprints, or simply latent, have been considered as cardinal evidence for identif...

متن کامل

A Framework for Reproducible Latent Fingerprint Enhancements

Photoshop processing of latent fingerprints is the preferred methodology among law enforcement forensic experts, but that appproach is not fully reproducible and may lead to questionable enhancements. Alternative, independent, fully reproducible enhancements, using IDL Histogram Equalization and IDL Adaptive Histogram Equalization, can produce better-defined ridge structures, along with conside...

متن کامل

A Robust Strucutural Fingerprint Restoration

Fast and accurate ridge detection in fingerprints is essential to each AFIS (Automatic Fingerprint Identification System). Smudged furrows and cut ridges in the image of a finger print are major problems in any AFIS. This paper investigates a new online ridge detection method that reduces the complexity and costs associated with the fingerprint identification procedure. The noise in fingerprint...

متن کامل

A Comparative Analysis of Histogram Of Gradient (HOG), Gabor Filter Bank and DCT based Feature Extraction Methods used for Fingerprint Recognition

Fingerprint recognition is one of the most reliable and popular biometric methods used for person identification. It plays a very important role in forensic and civilian applications such as criminal identification, access control, and ATM card verification. The two major approaches used for fingerprint recognition are image based and minutiae based. The widely used minutiae based representatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJBM

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2016