Inside risks: the uses and abuses of biometrics
Communications of the ACM
Biometrical fingerprint recognition: don't get your fingers burned
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Evaluating Liveness by Face Images and the Structure Tensor
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
High security Iris verification system based on random secret integration
Computer Vision and Image Understanding
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
An analysis of data corruption in the storage stack
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
EURASIP Journal on Advances in Signal Processing
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Biometrics Method for Human Identification Using Electrocardiogram
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Secure speech template protection in speaker verification system
Speech Communication
Sorted index numbers for privacy preserving face recognition
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Correlation-based classification of heartbeats for individual identification
Soft Computing - A Fusion of Foundations, Methodologies and Applications - Special issue on Digital Information Forensics
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Artificial finger detection by spectrum analysis
International Journal of Biometrics
Fake fingerprint detection by odor analysis
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Fake finger detection by skin distortion analysis
IEEE Transactions on Information Forensics and Security
Time-series detection of perspiration as a liveness test in fingerprint devices
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A high performance fingerprint liveness detection method based on quality related features
Future Generation Computer Systems
Pattern Recognition Letters
Hi-index | 0.00 |
The interest in biometric technology is received much attention in the recent years. However, the security issue still persists the main challenge for the reliable functioning of biometric-based authentication systems. Much has been reported on the vulnerabilities of biometric systems that breach the security and user privacy. We present a high-level classification of biometric system vulnerabilities and discuss the defence techniques of these vulnerabilities. We present a multidimensional threat environment of the biometric systems that includes faults, failures and security attacks. A framework of biometric security attacks on man-machine model is presented and the system vulnerabilities are represented using Ishikawa's diagram. The provable defence techniques such as biometric vitality detection and biometric template protection are critically evaluated, in particular, a classification of current state-of-the-art of vitality detection techniques of commonly used biometrics is proposed. Our main contributions include: 1 propose a taxonomy of biometric system vulnerabilities; 2 present a framework of biometric security attacks using man-machine model; 3 representation of vulnerabilities using Ishikawa's diagram; 4 an evaluation of defence techniques of these vulnerabilities.