Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 3 - Volume 3
Biometrics break-ins and band-aids
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Online Palmprint Identification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Fisherpalms based palmprint recognition
Pattern Recognition Letters
IEEE Transactions on Pattern Analysis and Machine Intelligence
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Competitive Coding Scheme for Palmprint Verification
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 1 - Volume 01
A study of identical twins' palmprints for personal verification
Pattern Recognition
Characterization of palmprints by wavelet signatures via directional context modeling
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Hi-index | 0.00 |
Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has led to the development of palmprint systems and their use in several real applications. Biometric systems are not, however, invulnerable. The potential attacks including replay and brute-force attacks have to be analyzed before they are massively deployed in real applications. With this in mind, this paper will consider brute-force break-ins directed against palmprint verification systems.