{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T04:03:34Z","timestamp":1748145814691,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031893629","type":"print"},{"value":"9783031893636","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-89363-6_1","type":"book-chapter","created":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:57:18Z","timestamp":1748073438000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hacking Mobile Biometrics with\u00a0the\u00a0Photograph of\u00a0a\u00a0Fingerprint"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7625-1643","authenticated-orcid":false,"given":"Sarah","family":"Dill","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0886-6521","authenticated-orcid":false,"given":"Joseph","family":"Hommel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8425-1916","authenticated-orcid":false,"given":"Justin","family":"Kennedy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7996-6267","authenticated-orcid":false,"given":"Vaughn","family":"Woerpel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8330-045X","authenticated-orcid":false,"given":"Justin","family":"Pelletier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"Bhartiya, N., Jangid, N., Jannu, S.: Biometric authentication systems: security concerns and solutions. In: 2018 3rd International Conference for Convergence in Technology (I2CT), pp.\u00a01\u20136 (2018). https:\/\/doi.org\/10.1109\/I2CT.2018.8529435","DOI":"10.1109\/I2CT.2018.8529435"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"104801","DOI":"10.1109\/ACCESS.2020.3000044","volume":"8","author":"R Garcia-Martin","year":"2020","unstructured":"Garcia-Martin, R., Sanchez-Reillo, R.: Vein biometric recognition on a smartphone. IEEE Access 8, 104801\u2013104813 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3000044","journal-title":"IEEE Access"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Goicoechea-Telleria, I., Garcia-Peral, A., Husseis, A., Sanchez-Reillo, R.: Presentation attack detection evaluation on mobile devices: simplest approach for capturing and lifting a latent fingerprint. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp.\u00a01\u20135 (2018). https:\/\/doi.org\/10.1109\/CCST.2018.8585605","DOI":"10.1109\/CCST.2018.8585605"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Han, H., Koshimoto, Y.: Characteristics of thermal-type fingerprint sensor. In: Kumar, B.V., Prabhakar, S., Ross, A.A. (eds.) Biometric Technology for Human Identification V. vol.\u00a06944, p. 69440P. International Society for Optics and Photonics, SPIE (2008). https:\/\/doi.org\/10.1117\/12.777024","DOI":"10.1117\/12.777024"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Han, Y., Ryu, C., Moon, J., Kim, H., Choi, H.: A study on evaluating the uniqueness of fingerprints using statistical analysis. In: Park, C.S., Chee, S. (eds.) Information Security and Cryptology \u2013 ICISC 2004, pp. 467\u2013477. Springer, Heidelberg (2005)","DOI":"10.1007\/11496618_34"},{"key":"1_CR6","doi-asserted-by":"publisher","unstructured":"Hosseini, S.: Fingerprint vulnerability: a survey. In: 2018 4th International Conference on Web Research (ICWR), pp. 70\u201377 (2018). https:\/\/doi.org\/10.1109\/ICWR.2018.8387240","DOI":"10.1109\/ICWR.2018.8387240"},{"issue":"2","key":"1_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MC.2010.38","volume":"43","author":"AK Jain","year":"2010","unstructured":"Jain, A.K., Feng, J., Nandakumar, K.: Fingerprint matching. Computer 43(2), 36\u201344 (2010). https:\/\/doi.org\/10.1109\/MC.2010.38","journal-title":"Computer"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Jiang, X., Yau, W.Y.: Fingerprint minutiae matching based on the local and global structures. In: Proceedings 15th International Conference on Pattern Recognition, ICPR 2000, vol.\u00a02, pp. 1038\u20131041 (2000). https:\/\/doi.org\/10.1109\/ICPR.2000.906252","DOI":"10.1109\/ICPR.2000.906252"},{"key":"1_CR9","unstructured":"Kant, C., Nath, R.: Reducing process-time for fingerprint identification system. Int. J. Biometric Bioinf. 3 (2009)"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Knezovi\u0107, M., \u017dagar, M., Delija, D., Sirovatka, G., Mo\u017enik, D.: Implementation of biometric verification of a fingerprint whose image is taken from a glass surface. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO), pp. 1183\u20131188 (2023). https:\/\/doi.org\/10.23919\/MIPRO57284.2023.10159796","DOI":"10.23919\/MIPRO57284.2023.10159796"},{"issue":"2","key":"1_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1080\/02670844.2016.1258449","volume":"34","author":"M Belhadjamor","year":"2018","unstructured":"Belhadjamor, M., El Mansori, M., Belghith, S., Mezlini, S.: Anti-fingerprint properties of engineering surfaces: a review. Surf. Eng. 34(2), 85\u2013120 (2018). https:\/\/doi.org\/10.1080\/02670844.2016.1258449","journal-title":"Surf. Eng."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Mitra, S., Gofman, M.: Biometrics in a Data Driven World: Trends, Technologies, and Challenges. Chapman and Hall\/CRC (2016)","DOI":"10.1201\/9781315317083"},{"key":"1_CR13","unstructured":"Papamitrou, S.: The effects of latent print development on cell phones. J. Forensic Ident. 70(2), 163\u2013170 (2020). Copyright International Association for Identification Apr-Jun 2020; Last updated - 07 Oct 2020"},{"issue":"6","key":"1_CR14","doi-asserted-by":"publisher","first-page":"7412","DOI":"10.1109\/JSEN.2021.3051975","volume":"21","author":"C Peng","year":"2021","unstructured":"Peng, C., Chen, M., Jiang, X.: Under-display ultrasonic fingerprint recognition with finger vessel imaging. IEEE Sens. J. 21(6), 7412\u20137419 (2021). https:\/\/doi.org\/10.1109\/JSEN.2021.3051975","journal-title":"IEEE Sens. J."},{"issue":"2","key":"1_CR15","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/2.820040","volume":"33","author":"P Phillips","year":"2000","unstructured":"Phillips, P., Martin, A., Wilson, C., Przybocki, M.: An introduction evaluating biometric systems. Computer 33(2), 56\u201363 (2000). https:\/\/doi.org\/10.1109\/2.820040","journal-title":"Computer"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Qiu, L.: Fingerprint sensor technology. In: 2014 9th IEEE Conference on Industrial Electronics and Applications, pp. 1433\u20131436 (2014). https:\/\/doi.org\/10.1109\/ICIEA.2014.6931393","DOI":"10.1109\/ICIEA.2014.6931393"},{"issue":"2","key":"1_CR17","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1111\/1556-4029.14908","volume":"67","author":"M Saguy","year":"2022","unstructured":"Saguy, M., Almog, J., Cohn, D., Champod, C.: Proactive forensic science in biometrics: novel materials for fingerprint spoofing. J. Forensic Sci. 67(2), 534\u2013542 (2022)","journal-title":"J. Forensic Sci."},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Schneider, J.K.: Ultrasonic fingerprint sensors. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics: Sensors, Algorithms and Systems, pp. 63\u201374. Springer, London (2008). https:\/\/doi.org\/10.1007\/978-1-84628-921-7_4","DOI":"10.1007\/978-1-84628-921-7_4"},{"issue":"3","key":"1_CR19","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/S0379-0738(00)00465-5","volume":"120","author":"G Sodhi","year":"2001","unstructured":"Sodhi, G., Kaur, J.: Powder method for detecting latent fingerprints: a review. Forensic Sci. Int. 120(3), 172\u2013176 (2001)","journal-title":"Forensic Sci. Int."},{"issue":"1","key":"1_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/4.654945","volume":"33","author":"M Tartagni","year":"1998","unstructured":"Tartagni, M., Guerrieri, R.: A fingerprint sensor based on the feedback capacitive sensing scheme. IEEE J. Solid-State Circuits 33(1), 133\u2013142 (1998). https:\/\/doi.org\/10.1109\/4.654945","journal-title":"IEEE J. Solid-State Circuits"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Waghmare, S., Chatterjee, M., Varma, S.L.: Authentication system for android smartphones. Int. J. Comput. Appl. 87(5) (2014)","DOI":"10.5120\/15204-3602"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Xia, P., Luo, J., Ling, Z., Liu, B., Fu, X.: Fingerprint attack against touch-enabled devices. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012, pp. 57\u201368. Association for Computing Machinery, New York (2012). https:\/\/doi.org\/10.1145\/2381934.2381947","DOI":"10.1145\/2381934.2381947"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-89363-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:57:20Z","timestamp":1748073440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-89363-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031893629","9783031893636"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-89363-6_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubrovnik","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdf2c.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}