IEEE Transactions on Pattern Analysis and Machine Intelligence
EURASIP Journal on Advances in Signal Processing
Multibiometric systems: fusion strategies and template security
Multibiometric systems: fusion strategies and template security
Integrating Palmprint and Fingerprint for Identity Verification
NSS '09 Proceedings of the 2009 Third International Conference on Network and System Security
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Multimodal Biometrics -- Sources, Architecture and Fusion Techniques: An Overview
ISBAST '12 Proceedings of the 2012 International Symposium on Biometrics and Security Technologies
A touch of money [biometric authentication systems]
IEEE Spectrum
Hi-index | 0.00 |
Biometrics have long been used for various applications in the areas like access control to facilities and computers, criminal identification, border security, access to nuclear power plant, identity authentication in network environment, airport security, and issue of passports or driver licenses, forensic and medical databases. As biometric finds its applications in several high security areas providing security to biometric template is of utmost importance. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. Biometrics also leaks personal information to the attacker. Nevertheless, biometric systems are prone to a variety of attacks. The stored biometric template attack is the most severe of all the attacks. Biometric templates cannot be reissued on spoofing. Therefore, apart from security; biometric templates should be imparted with revocability. No single template protection method reported in recent years is capable of satisfying the diversity, revocability, security and performance requirements.