Open Access   Article Go Back

Bypass Mobile Lock Systems With Gelatin Artificial Fingerprint

E.A. Maro1 , M.M. Kovalchuk2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-06 , Page no. 32-36, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si6.3236

Online published on Jul 31, 2018

Copyright © E.A. Maro, M.M. Kovalchuk . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: E.A. Maro, M.M. Kovalchuk, “Bypass Mobile Lock Systems With Gelatin Artificial Fingerprint,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.06, pp.32-36, 2018.

MLA Style Citation: E.A. Maro, M.M. Kovalchuk "Bypass Mobile Lock Systems With Gelatin Artificial Fingerprint." International Journal of Computer Sciences and Engineering 06.06 (2018): 32-36.

APA Style Citation: E.A. Maro, M.M. Kovalchuk, (2018). Bypass Mobile Lock Systems With Gelatin Artificial Fingerprint. International Journal of Computer Sciences and Engineering, 06(06), 32-36.

BibTex Style Citation:
@article{Maro_2018,
author = {E.A. Maro, M.M. Kovalchuk},
title = {Bypass Mobile Lock Systems With Gelatin Artificial Fingerprint},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {06},
Issue = {06},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {32-36},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=440},
doi = {https://doi.org/10.26438/ijcse/v6i6.3236}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.3236}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=440
TI - Bypass Mobile Lock Systems With Gelatin Artificial Fingerprint
T2 - International Journal of Computer Sciences and Engineering
AU - E.A. Maro, M.M. Kovalchuk
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 32-36
IS - 06
VL - 06
SN - 2347-2693
ER -

           

Abstract

We briefly described how to bypass mobile devices lock system by using fingerprint verification. As the applying method the method of counterfeiting the fingerprint of the mobile device`s owner was chosen (direct attack). The article describes the use of the method of creating a gelatin artificial fingerprints to bypass the locking system of mobile phones. The experiment confirmed the possibility of bypassing fingerprint protection without the need for expensive tools or high-quality fingerprint samples. The artificial fingerprints were tested to unlock iPhone 6 and Meizu m5s phones. To bypass lock system the iPhone 6 with a fake fingerprint we need not more than two unlock attempts. Success rate of bypass iPhone 6 biometric lock system was 70 percent. To unlock Meizu m5s we have to moistening the artificial fingerprint, after that we bypass lock system with the first unlock attempt. Success rate of bypass Meizu m5s biometric lock system was 70 percent.

Key-Words / Index Term

Biometric security systems, Fake artificial fingerprints, Mobile fingerprint readers, Gelatin fingerprint copy

References

[1] Olaf Henniger, Dirk Scheuermann, and Thomas Kniess “On security evaluation of fingerprint recognition systems”, International Biometric Performance Conference (IBPC 2010), March. 2010.
[2] Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia “Vulnerabilities in Biometric Systems: Attacksand Recent Advances in Liveness Detection”, Proc. Spanish Workshop on Biometrics, SWB, 2007.
[3] Umut Uludag, Anil K. Jain “Attacks on Biometric Systems: A Case Study in Fingerprints”, Proceedings of SPIE - The International Society for Optical Engineering, 2004.
[4] Swapnali Mahadik, K Narayanan, D V Bhoir, Darshana Shah "Access Control System using Fingerprint Recognition", International Conference on Advances in Computing Communication and Control, pp. 306-311, 2009.
[5] A. Nagar K. Nandakumar A. K. Jain “Biometric template transformation: a security analysis”, IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, 2010.
[6] S. Yoon J. Feng A. K. Jain “Altered fingerprints: Analysis and detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34 no. 3 pp. 451-464 2012.
[7] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar “Handbook of Fingerprint Recognition”, Springer, Berlin, Germany, 2009.
[8] “Politician`s fingerprint ‘cloned from photos’ by hacker”, December 2014, http://www.bbc.com/news/technology-30623611.
[9] T. van der Putte and J. Keuning “Biometrical fingerprint recognition: don`t get your fingers burned”, Proceedings of the 4th Working Conference on Smart Card Research and Advanced Applications, pp. 289–303, 2000.
[10] A. Nagar, K. Nandakumar, and A. K. Jain “Biometric template transformation: a security analysis”, Proceedings of the SPIE, Electronic Imaging, Media Forensics and Security II, vol. 7541, San Jose, Calif, USA, January 2010.
[11] Rubal Jain and Chander Kant “Attacks on Biometric Systems: An Overview”, International Journal of Advances in Scientific Research 2015, 1(07), pp. 283-288.
[12] Galbally, J., Fierrez, J., Rodriguez-Gonzalez, J.D., Alonso-Fernandez, F., Ortega-Garcia, J., Tapiador, M. “On the vulnerability of fingerprint verification systems to fake fingerprint attacks”, Proc. of IEEE International Carnahan Conference on Security Technology. Volume 1. (2006) 130–136.
[13] E. Marasco and A. Ross “A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems”,ACM Computing Surveys, Vol. 47, No. 2, Article 28, January 2015.
[14] White Paper “Protecting Against Fingerprint Spoofing in Mobile Devices”, Synaptics Incorporated, 2016.
[15] Y. W. Ju B. H. Lee “The implementation of secure mobile biometric system”, International Journal of Bio-Science and Bio-Technology , vol. 5 no. 4 pp. 53-60 2013.
[16] Sanaa Ghouzali, Maryam Lafkih, Wadood Abdul, Mounia Mikram, Mohammed El Haziti, and Driss Aboutajdine “Trace Attack against Biometric Mobile Applications”, Mobile Information Systems, vol. 2016.
[17] Kai Cao and Anil K. Jain “Hacking Mobile Phones Using 2D Printed Fingerprints”, MSU Technical Report MSU-CSE-16-2, 2016.
[18] S. S. Arora, K. Cao, A. K. Jain, and N. G. Paulter “Design and fabrication of 3d fingerprint targets”, IEEE Transactions on Information Forensics and Security, vol. 11, pp. 2284–2297, Oct. 2016.
[19] S. S. Arora, A. K. Jain, and N. G. Paulter “3d whole hand targets: Evaluating slap and contactless fingerprint readers”, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–8, Sept 2016.
[20] S. S. Arora, A. K. Jain, and N. G. Paulter “Gold fingers: 3d targets for evaluating capacitive readers”, IEEE Transactions on Information Forensics and Security, pp. 1–1, Apr. 2017.
[21] Joshua J. Engelsma, Sunpreet S. Arora, Anil K. Jain, Nicholas G. Paulter Jr. “Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations”, IEEE Transactions on Information Forensics and Security, 2017.
[22] Yulong Zhang, Zhaofeng Chen, Hui Xue, and Tao Wei “Fingerprints On Mobile Devices: Abusing and Leaking”, Black Hat Conference, August 7, 2015.
[23] Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee “Broken Fingers:On the Usage of the Fingerprint API in Android”, Network and Distributed System Security Symposium (NDSS), February 19th, 2018.
[24] Yulong Zhang, Tao Wei “To Swipe or Not to Swipe: A Challenge for Your Fingers”, RSA conference, San Francisco, USA, 2015.