IEEE Spectrum
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Communications of the ACM
Secure data hiding in wavelet compressed fingerprint images
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
On the Individuality of Fingerprints
IEEE Transactions on Pattern Analysis and Machine Intelligence
Sample-Based Synthesis of Talking Heads
RATFG-RTS '01 Proceedings of the IEEE ICCV Workshop on Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems (RATFG-RTS'01)
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Three measures for secure palmprint identification
Pattern Recognition
A survey of palmprint recognition
Pattern Recognition
Individual identification using personality traits
Journal of Network and Computer Applications
A false rejection oriented threat model for the design of biometric authentication systems
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A study of brute-force break-ins of a palmprint verification system
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Privacy protection in high security biometrics applications
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
Hi-index | 0.00 |
Currently there is much interest in the use of biometrics for authentication and identification applications. This has been heightened most recently because of the threat of terrorism. Biometrics authentication and identification systems offer several advantages over systems based on knowledge or possession such as unsupervised (legacy) password/PIN-based systems and supervised (legacy) passport-based systems. To optimize security it is important that biometrics authentication systems are designed to withstand different sources of attack. We identify some such threats to biometrics systems and detail issues related to the tradeoff between security and convenience. We further show how to estimate a biometrics' intrinsic security, sometimes called a biometrics' individuality, with fingerprints as an example.