Biometrical fingerprint recognition: don't get your fingers burned
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Score normalization in multimodal biometric systems
Pattern Recognition
An on-line signature verification system based on fusion of local and global information
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
A novel image hash algorithm resistant to print-scan
Signal Processing
On the vulnerability of face verification systems to hill-climbing attacks
Pattern Recognition
Vulnerability assessment of fingerprint matching based on time analysis
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Hi-index | 0.00 |
A general hill-climbing attack algorithm based on Bayesian adaption is presented. The approach uses the scores provided by the matcher to adapt a global distribution computed from a development set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system over the 330 users of the MCYT database. The results show a very high efficiency of the hill-climbing algorithm, which successfully bypassed the system for over 95% of the attacks.