Skip to content. | Skip to navigation

Personal tools


You are here: Home / Sponsors / Performance & vulnerability analysis for Touch ID

Performance & vulnerability analysis for Touch ID

Touch ID is a seamless way to use your fingerprint as a passcode. With just a touch of the Home button of the iPhone 5S, the Touch ID sensor quickly reads your fingerprint and automatically unlocks your phone. But how reliable and how secure is it?

The first effort in biometric spoofing can be traced back to the 1920s and was executed by Wehde and Beffel, who used his knowledge in photography and engraving to generate gummy fingers from latent prints. Using forensic techniques the latent fingerprint was highlighted and a photograph taken. That picture was later used to engrave a copper plate that could be used to leave false latent fingerprints on objects.

From the state-of-the-art, we can infer that this fingerprint spoofing attacks are feasible and many systems are highly vulnerable to it. Nevertheless, there is no scientific evidence regarding to what extent a large set of general purpose manufactured synthetic samples can break the security of standard commercial systems.

In this study, we aim to analyse the recognition performance of Touch ID sensor on iPhone 5S and measure how vulnerable it is against various spoofing attacks.


Apply for affiliateship!

Filed under:

Help us to push the boundaries of biometrics technology

  • Fund research activities such as data collections, biometrics competitions, etc.
  • Donate to the center to support the infrastructure
  • Make in-kind contribuitons
This is themeComment