| Literature DB >> 31459951 |
Veasna Soum1, Sooyoung Park1, Albertus Ivan Brilian1, Yunpyo Kim1, Madeline Y Ryu2, Taler Brazell2, F John Burpo2, Kevin Kit Parker3,2, Oh-Sun Kwon1, Kwanwoo Shin1.
Abstract
A spoof fingerprint was fabricated on paper and applied for a spoofing attack to unlock a smartphone on which a capacitive array of sensors had been embedded with a fingerprint recognition algorithm. Using an inkjet printer with an ink made of carbon nanotubes (CNTs), we printed a spoof fingerprint having an electrical and geometric pattern of ridges and furrows comparable to that of the real fingerprint. With this printed spoof fingerprint, we were able to unlock a smartphone successfully; this was due to the good quality of the printed CNT material, which provided electrical conductivities and structural patterns similar to those of the real fingerprint. This result confirms that inkjet-printing CNTs to fabricate a spoof fingerprint on paper is an easy, simple spoofing route from the real fingerprint and suggests a new method for outputting the physical ridges and furrows on a two-dimensional plane.Entities:
Year: 2019 PMID: 31459951 PMCID: PMC6648154 DOI: 10.1021/acsomega.9b00936
Source DB: PubMed Journal: ACS Omega ISSN: 2470-1343
Figure 1Schematic illustrations: (a) printing of spoof fingerprints on paper and (b) spoofing attack using the printed fingerprint on a representative fingerprint sensor device.
Figure 2(a) Dispersed CNT ink for inkjet printing and (b) SEM image of CNTs, showing their lengths (l) and diameters (d).
Figure 3(a) Mimic design of fingerprint patterns and a printed image of the CNT pattern. (b) SEM image showing the surface morphologies of the CNT pattern/printing paper (left) and high-magnification SEM image of the CNTs (right).
Figure 4Properties of printed CNT patterns as a function of printings: (a) total area of the printed patterns, (b) surface profiles, and (c) electrical surface sheet resistance vs number of printings.
Figure 5Imaging process for generating a copy of a fingerprint by printing. Fingerprint images obtained after (a) scanning and flipping horizontally and (b) adjusting the contrast. (c) Higher-magnification image of the printed fingerprint.
Figure 6Characterization of the printed fingerprint: (a) total area of the printed fingerprint pattern vs the number of printings, (b) widths of a ridge and a furrow of the printed fingerprint pattern vs the number of printings, and (c) surface profiles of the ridges and the furrows of the printed fingerprint for various numbers of printings.
Figure 7Spoofing attack to unlock a smartphone by using a printed paper-based fingerprint and mechanism through which a printed paper-based fingerprint sends the electronic signals necessary to unlock the fingerprint sensor.