Biometrics experts from Michigan State University have shown that it is possible to complete a spoof attack on fingerprint sensors simply through using a high-resolution inkjet printer.Kai Cao and Anil Jain from the MSU's department of computer science and engineering used the printer to hack a Samsung Galaxy S6 and a Huawei Honor 7's fingerprint sensor.In a quicker spoofing process than previous high-profile examples using glue or play-doh, the researchers used conductive ink – ink which conducts a charge – and special paper that is typically used for printing electronic circuits and other charge-carrying systems.Cao and Jain said: “This experiment further confirms the urgent need for anti-spoofing techniques for fingerprint recognition systems, especially for mobile devices which are being increasingly used for unlocking the phone and for payment.”The fingerprint image was achieved by scanning a finger at least 300 dots per inch (dpi), followed by reversing the image in a horizontal direction.Last month at MWC 2016, Chinese fingerprint sensor firm Vkansee used a simple modelling clay example of a spoofing attack to highlight the importance of resolution in fingerprint recognition.Vkansee used simple dental glue and then children's modelling clay to spoof an iPhone.