IEEE Spectrum
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Communications of the ACM
Secure data hiding in wavelet compressed fingerprint images
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
IEEE Transactions on Pattern Analysis and Machine Intelligence
From Scores to Face Templates: A Model-Based Approach
IEEE Transactions on Pattern Analysis and Machine Intelligence
Embedded biometric data for a secure authentication watermarking
SPPR'07 Proceedings of the Fourth conference on IASTED International Conference: Signal Processing, Pattern Recognition, and Applications
EURASIP Journal on Advances in Signal Processing
A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication
Computational Intelligence and Security
Advances in fingerprint modeling
Image and Vision Computing
Template Protection for On-Line Signature-Based Recognition Systems
Biometrics and Identity Management
Direct Attacks Using Fake Images in Iris Verification
Biometrics and Identity Management
Ridgelet-based fake fingerprint detection
Neurocomputing
Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection
International Journal of Information and Computer Security
Feature fusion using Gabor filters and cooccurrence probabilities for fingerprint antispoofing
International Journal of Intelligent Systems Technologies and Applications
Robust palmprint verification using 2D and 3D features
Pattern Recognition
On the vulnerability of face verification systems to hill-climbing attacks
Pattern Recognition
Embedded biometric data for a secure authentication watermarking
SPPRA '07 Proceedings of the Fourth IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
Biometric template protection in multimodal authentication systems based on error correcting codes
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Pitfall of the detection rate optimized bit allocation within template protection and a remedy
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
An evaluation of direct attacks using fake fingers generated from ISO templates
Pattern Recognition Letters
A novel image hiding approach based on correlation analysis for secure multimodal biometrics
Journal of Network and Computer Applications
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Vitality detection in fingerprint identification
WSEAS Transactions on Information Science and Applications
Fighting coercion attacks in key generation using skin conductance
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Biometric Hash algorithm for dynamic handwriting embedded on a java card
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
A new approach to fake finger detection based on skin distortion
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Secure fingerprint matching with external registration
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Biometric recognition: how do i know who you are?
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
Secure and efficient transmissions of fingerprint images for embedded processors
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Robustness of biometric gait authentication against impersonation attack
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Evaluation of biometric systems: a study of users' acceptance and satisfaction
International Journal of Biometrics
Spiral cube for biometric template protection
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Security analysis of key binding biometric cryptosystems
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Bayesian hill-climbing attack and its application to signature verification
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Fast computation of the performance evaluation of biometric systems: Application to multibiometrics
Future Generation Computer Systems
Securing Fingerprint Images Through PSO Based Robust Facial Watermarking
International Journal of Information Security and Privacy
A taxonomy of biometric system vulnerabilities and defences
International Journal of Biometrics
Pattern Recognition Letters
Biometric template protection with DCT-based watermarking
Machine Vision and Applications
Hi-index | 0.01 |
In recent years there has been exponential growth in the use of biometrics for user authentication applications because biometrics-based authentication offers several advantages over knowledge and possession-based methods such as password/PIN-based systems. However, it is important that biometrics-based authentication systems be designed to withstand different sources of attacks on the system when employed in security-critical applications. This is even more important for unattended remote applications such as e-commerce. In this paper we outline the potential security holes in a biometrics-based authentication scheme, quantify the numerical strength of one method of fingerprint matching, then discuss how to combat some of the remaining weaknesses.