Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems

نویسندگان

  • Masashi Une
  • Akira Otsuka
  • Hideki Imai
چکیده

This paper will propose a wolf attack probability (WAP ) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strengh estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm is turned out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern matching algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold values.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems

In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a “wolf” to a biometric authentication system without the knowledge...

متن کامل

A new framework for constructing matching algorithms secure against the wolf attack in biometric authentication systems

In [4], we proposed a theoretical framework to construct matching algorithms for any biometric authentication systems. In this paper, we will introduce the results in [4] and add some comments on the accuracy (FAR and FRR) of our proposed matching algorithms (Lemma 6, 7, 8). Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

A Study of Liveness Detection in Face Biometric Systems

“Biometrics” refers to the technologies that measure and analyze human body characteristics for security purposes. The need of privacy and security in our daily life leads to this new area. Biometric systems have more accuracy when compared to traditional methods (password, key etc). It identifies and verifies the identity of a person based on one or more physiological and behavioral characteri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007