This has been taken to be fact for about a decade.<p>Has anyone ever replicated this? CCC presenters have a tendency to, exaggerate, a little.<p>The only presentation given on this topic, at CCC, demonstrated an attack against fingerprint readers where a fingerprint was reconstructed from imagery, cast into a physical fake finger, and then authenticated against itself. Not that a fingerprint was reconstructed from imagery and authenticated against a scan of the actual finger.<p>I can totally botch a reconstruction of a fingerprint based on some blurry imagery such that it looks like the number six side of a die, load the reconstruction into a fingerprint reader, and then authenticate against a gelatin finger with an imprint of six pips on it but I cannot say that I have reconstructed THE fingerprint.