Biometrics break-ins and band-aids

  • Authors:
  • Nalini K. Ratha;Jonathan H. Connell;Ruud M. Bolle

  • Affiliations:
  • IBM Thomas J. Watson Research Center, 19 Skyline Drive, Hawthorne, NY;IBM Thomas J. Watson Research Center, 19 Skyline Drive, Hawthorne, NY;IBM Thomas J. Watson Research Center, 19 Skyline Drive, Hawthorne, NY

  • Venue:
  • Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Currently there is much interest in the use of biometrics for authentication and identification applications. This has been heightened most recently because of the threat of terrorism. Biometrics authentication and identification systems offer several advantages over systems based on knowledge or possession such as unsupervised (legacy) password/PIN-based systems and supervised (legacy) passport-based systems. To optimize security it is important that biometrics authentication systems are designed to withstand different sources of attack. We identify some such threats to biometrics systems and detail issues related to the tradeoff between security and convenience. We further show how to estimate a biometrics' intrinsic security, sometimes called a biometrics' individuality, with fingerprints as an example.