AI creates fake fingerprints endangering smartphone fingerprint sensors: Page 2 of 2

November 23, 2018 //By Rich Pell
AI creates fake fingerprints endangering smartphone fingerprint sensors
Researchers at the New York University Tandon School of Engineering (Brooklyn, NY) have created synthetic fingerprints that are capable of spoofing smartphone fingerprint sensors.

The process, say the researchers, is yet another step toward assessing the viability of MasterPrints against real devices, which the researchers have yet to test. In addition, because these images replicate the quality of fingerprint images stored in fingerprint-accessible systems, they could potentially be used to launch a brute force attack against a secure cache of these images.

"Fingerprint-based authentication is still a strong way to protect a device or a system, but at this point, most systems don't verify whether a fingerprint or other biometric is coming from a real person or a replica," says doctoral student Philip Bontrager, lead author of a paper on the study. "These experiments demonstrate the need for multi-factor authentication and should be a wake-up call for device manufacturers about the potential for artificial fingerprint attacks."

The research has applications in fields beyond security, say the researchers. For example, the "Latent Variable Evolution" method used in to generate the synthetic fingerprints can also be used to make designs in other industries - notably game development. The technique has already been used to generate new levels in popular video games.

For more, see "DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution" (PDF)


Vous êtes certain ?

Si vous désactivez les cookies, vous ne pouvez plus naviguer sur le site.

Vous allez être rediriger vers Google.