<P> Fingerprint sensors can be found on mobile devices . The fingerprint sensor is used to unlock the device and authorize actions, like money and file transfers, for example . It can be used to prevent a device from being used by an unauthorized person . </P> <P> This is one of the most highly recognised and acceptable biometrics in corporate surroundings . This verification has been taken one step further by capturing the signature while taking into account many parameters revolving around this like the pressure applied while signing, the speed of the hand movement and the angle made between the surface and the pen used to make the signature . This system also has the ability to learn from users as signature styles vary for the same user . Hence by taking a sample of data, this system is able to increase its own accuracy . </P> <P> Iris recognition involves the device scanning the retina of the subject and then cross referencing that to data stored on the database . It is one of the most secure forms of authentication, as while fingerprints can be left behind on surfaces, iris prints are extremely hard to be stolen . Iris recognition is widely applied by organisations dealing with the masses, one being the Aadhar identification carried out by the Indian government to keep records of its population . The reason for this is that iris recognition makes use of iris prints of humans, which hardly evolve during one's lifetime and are extremely stable . </P> <P> Biometric spoofing is a method of fooling a biometric identification management system, where a counterfeit mold is presented in front of the biometric scanner . This counterfeit mold emulates the unique biometric attributes of an individual so as to confuse the system between the artifact and the real biological target and gain access to sensitive data / materials . </P>

Explain any five biometric devices in 3 lines