{"id":7635,"date":"2017-12-07T08:53:13","date_gmt":"2017-12-07T13:53:13","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=7635"},"modified":"2025-12-08T01:54:08","modified_gmt":"2025-12-08T06:54:08","slug":"biometric-authentication-can-deceived","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/","title":{"rendered":"Biometric Authentication &#8211; Can It Be Deceived?"},"content":{"rendered":"<p>Nowadays, biometrics seems to be used in various ways. From checking attendance through a gadget to verifying information through the phone, biometrics has become a means of authenticating and securing your identity from potential intrusion of privacy and identification. This technology ensures that it is you who is recognized and not some other person.<\/p>\n<p>However, as our technology advances, so do those who want to intrude your personal information for their own specific ends. This situation begs the question, can biometric authentication be deceived?<\/p>\n<h2>What is Biometrics?<\/h2>\n<p>Biometrics is defined as the analysis of a person&#8217;s characteristics. It uses biological traits such as fingerprints in order to recognize and verify the identity of a person. Other distinguishing human features that could be used in biometrics include the hand geometry, <strong><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/iris-recognition-vs-retina-scanning-what-are-the-differences\/\">retina and iris<\/a><\/strong> patterns, earlobe geometry, DNA, and voice waves.<br \/>\nThis technology may be beneficial for control or surveillance, among others. Since an individual is unique from each other, their physical traits will serve as their distinct passcodes that ideally guarantees security from theft or mistaken identity.<\/p>\n<p>The distinct traits of the individual are recorded in a database. When authentication is required, the technology compares the newly received information with the records in the database. If both information match, then the identity is confirmed.<\/p>\n<p>Aside from being used to verify identity, biometrics is an increasingly popular method to ensure home security. A biometric authentication is an essential tool in smart home technology, a modern device that would keep your houses secured from intruders. Only specific persons, who have their information recorded in a database, could enter the house. Unauthorized persons without an authenticated biometric cannot enter your home.<\/p>\n<p>Biometric authentication is also significant in securing your phones from potential theft. Since your fingerprint is distinct, your smartphones will not open unless you press your finger on it. This way, other people will not be able to access your phone.<\/p>\n<p>Indeed, biometrics has been a significant tool for identity and security. Yet, it should be noted that even biometric authentication has its own limitation.<\/p>\n<h2>Biometric authentication could be deceived<\/h2>\n<p>Whether it be through<strong> <a href=\"https:\/\/www.m2sys.com\/m2-s-fingerprint-scanner\/\">fingerprinting<\/a><\/strong>, voice recognition, or retina and iris detection, biometric authentication could be fooled.<\/p>\n<p>Primarily, fingerprints could be replicated using silicone. People may copy them from the prints that have been left on surfaces that you have touched. When using the silicone which contains your fingerprint, your identity could be recognized without your knowing it.<\/p>\n<p>In the case of<strong> <a href=\"https:\/\/www.m2sys.com\/m2-auto-tilt-iris-recognition-camera\/\">iris scanners<\/a><\/strong>, hackers could just take a photo of the iris using a camera set in night mode. The photo is then printed on paper. To deceive the machine ever more, a wet contact lens is placed over the picture of the iris to mimic the roundness of the eyes.<\/p>\n<p>More skilled hackers could use a software-based recognition tool to produce an iris code. This code is altered using a genetic algorithm to create a near identical template of the iris. The image is then printed on to a contact lens.<\/p>\n<p>Additionally, since voice could be captured and mimicked quickly, it could pose a problem for biometrics where voice recognition is used for authentication.<\/p>\n<h2>Necessity albeit the limitation<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7639\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/biometric-fingerprint.png\" alt=\"biometric-fingerprint\" width=\"602\" height=\"387\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/biometric-fingerprint.png 602w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/biometric-fingerprint-300x193.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><br \/>\nBiometric authentication sure has limitations, especially considering the fact that it could be deceived. However, proper care and attention could diminish the deceit caused by hackers and identity thieves.<\/p>\n<p>Biometrics is a significant advancement over the use of conventional passwords that would authenticate an individual. We hope that future developments would help lessen the limitations of biometric technology.<\/p>\n<p>Guest Authors Bio: Irina is a certified specialist in advertising and public relations, journalist. For over two years I have specialized in design issues in various fields (interior design, web design, and graphic design).<\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/cloudscanr-application-for-biometric-device-integration-with-web-service\/?utm_source=biometric%20deceived&amp;utm_medium=CloudScanr&amp;utm_campaign=Blog-DisplayAds\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7445 size-full\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/07\/CloudScanr-1.png\" alt=\"CloudScanr\" width=\"728\" height=\"90\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/07\/CloudScanr-1.png 728w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/07\/CloudScanr-1-300x37.png 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/07\/CloudScanr-1-606x75.png 606w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nowadays, biometrics seems to be used in various ways. From checking attendance through a gadget to verifying information through the<\/p>\n","protected":false},"author":398,"featured_media":16204,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometric authentication","_yoast_wpseo_title":"Biometric Authentication - Can It Be Deceived? M2SYS","_yoast_wpseo_metadesc":"Biometric Authentication is becoming popular day by day across the world. But some people are concern about the security of this system.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-7635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Authentication - Can It Be Deceived? M2SYS<\/title>\n<meta name=\"description\" content=\"Biometric Authentication is becoming popular day by day across the world. But some people are concern about the security of this system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Authentication - Can It Be Deceived? M2SYS\" \/>\n<meta property=\"og:description\" content=\"Biometric Authentication is becoming popular day by day across the world. But some people are concern about the security of this system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-07T13:53:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T06:54:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\"},\"headline\":\"Biometric Authentication &#8211; Can It Be Deceived?\",\"datePublished\":\"2017-12-07T13:53:13+00:00\",\"dateModified\":\"2025-12-08T06:54:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/\"},\"wordCount\":626,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/\",\"name\":\"Biometric Authentication - Can It Be Deceived? M2SYS\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2017-12-07T13:53:13+00:00\",\"dateModified\":\"2025-12-08T06:54:08+00:00\",\"description\":\"Biometric Authentication is becoming popular day by day across the world. But some people are concern about the security of this system.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometric Authentication &#8211; Can It Be Deceived?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Authentication - Can It Be Deceived? M2SYS","description":"Biometric Authentication is becoming popular day by day across the world. But some people are concern about the security of this system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Authentication - Can It Be Deceived? M2SYS","og_description":"Biometric Authentication is becoming popular day by day across the world. But some people are concern about the security of this system.","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2017-12-07T13:53:13+00:00","article_modified_time":"2025-12-08T06:54:08+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/9.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0"},"headline":"Biometric Authentication &#8211; Can It Be Deceived?","datePublished":"2017-12-07T13:53:13+00:00","dateModified":"2025-12-08T06:54:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/"},"wordCount":626,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/","name":"Biometric Authentication - Can It Be Deceived? M2SYS","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2017-12-07T13:53:13+00:00","dateModified":"2025-12-08T06:54:08+00:00","description":"Biometric Authentication is becoming popular day by day across the world. But some people are concern about the security of this system.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-authentication-can-deceived\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometric Authentication &#8211; Can It Be Deceived?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"m2bloghorayra","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7635"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=7635"}],"version-history":[{"count":15,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7635\/revisions"}],"predecessor-version":[{"id":17246,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7635\/revisions\/17246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16204"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=7635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=7635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=7635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}