Biometric attack vectors and defences

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric attack vectors and defences

Much has been reported on attempts to fool biometric sensors with false fingerprints, facial overlays and a myriad of other spoofing approaches. Other attack vectors on biometric systems have, however, had less prominence. This paper seeks to present a broader and more practical view of biometric system attack vectors, placing them in the context of a risk-based systems approach to security and...

متن کامل

Plant Defences Against Herbivore and Insect Attack

The story of Adam and Eve links eating a forbidden fruit with death in the cycle of human existence (Genesis 3:1– 24). Indeed, to avoid poisoning, herbivores and omnivores such as humans must be cautious in choosing which plants and plant parts to eat. A prevailing hypothesis is that the nearly ubiquitous antiherbivore metabolites in plants were selected by coevolution with herbivores. Likewise...

متن کامل

Biometric Cryptosystem based Energy Attack Analysis

Biometric cryptosystem provides a seamless connection between the biometrics and traditional password, and it represents a new development in the next generation cryptography. Even if the biometric cryptosystem is secure in algorithmic design, it may still be vulnerable to side-channel attack due to the physical leakage. To assess the possible side-channel attack on biometric cryptosystem, a se...

متن کامل

The Biometric Values of Affected and Fellow Eyes in Patients with Acute Attack of Primary Angle Closure

Background: It has been estimated that 67 million people worldwide are affected with a primary glaucoma and that one-third have primary angle closure glaucoma. We aimed to determine the biometric differences between the eyes of patients with acute attack of primary angle closure and their non-involved fellow eyes. Methods: Twenty eight patients with acute attack of primary angle closure were re...

متن کامل

How to Attack Biometric Systems in Your Spare Time

Biometric systems were proposed and developed to provide a better and stronger factor of authentication. Such systems authenticate individuals based on physical and behavioral traits such as fingerprints, iris, face, palm print, hand geometry, voice, etc. The use of biometric traits to replace existing passwords or as access keys has proven to be highly secure against physical attacks. It is a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2007

ISSN: 0167-4048

DOI: 10.1016/j.cose.2006.12.008