Enhancing security and privacy in biometrics-based authentication systems

  • Authors:
  • N. K. Ratha;J. H. Connell;R. M. Bolle

  • Affiliations:
  • IBM Research Division, Thomas J. Watson Research Center, 30 Saw Mill River Road, Hawthorne, New York;IBM Research Division, Thomas J. Watson Research Center, 30 Saw Mill River Road, Hawthorne, New York;IBM Research Division, Thomas J. Watson Research Center, 30 Saw Mill River Road, Hawthorne, New York

  • Venue:
  • IBM Systems Journal - End-to-end security
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.