JOURNAL ARTICLE

Spoofing: are the hackers beating biometrics?

Tim Ring

Year: 2015 Journal:   Biometric Technology Today Vol: 2015 (7)Pages: 5-9   Publisher: Elsevier BV

Abstract

The spoofing of high profile fingerprint ID systems on Apple and Samsung smartphones has dented the credibility of biometrics authentication checks. We look at the latest spoofing attacks and defences and examine whether people can still trust biometric security.

Keywords:
Spoofing attack Biometrics Hacker Computer security Credibility Fingerprint (computing) Authentication (law) Internet privacy Computer science Political science Law

Metrics

12
Cited By
2.37
FWCI (Field Weighted Citation Impact)
0
Refs
0.91
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Biometrics Evaluation Under Spoofing Attacks

Ivana ChingovskaAndré AnjosSébastien Marcel

Journal:   IEEE Transactions on Information Forensics and Security Year: 2014 Vol: 9 (12)Pages: 2264-2276
BOOK-CHAPTER

Spoofing methods in hand-based biometrics

Martin DrahanskýOndřej KanichMichal Dvořák

Institution of Engineering and Technology eBooks Year: 2018 Pages: 367-398
BOOK-CHAPTER

Improving Gait Biometrics under Spoofing Attacks

Abdenour HadidMohammad GhahramaniJohn BustardMark Nixon

Lecture notes in computer science Year: 2013 Pages: 1-10
JOURNAL ARTICLE

Beating the system - hackers, phreakers and electronic spies

Journal:   Computer Law & Security Report Year: 1991 Vol: 7 (1)Pages: 48-48
JOURNAL ARTICLE

Beating the hackers - US report discusses protection techniques

Journal:   Computer Fraud & Security Bulletin Year: 1987 Vol: 9 (7)Pages: 13-14
© 2026 ScienceGate Book Chapters — All rights reserved.