Not for General Distribution: to Be Published

نویسنده

  • Stephanie A. C. Schuckers
چکیده

Introduction Biometric devices have been suggested for use in applications from access to personal computers, automated teller machines, credit card transactions, electronic transactions to access control for airports, nuclear facilities, and border control. Given this diverse array of potential applications, biometric devices have the potential to provide additional security over traditional security means such as passwords, keys, signatures, picture identification, etc. While biometrics may improve security, biometric systems also have vulnerabilities. System vulnerabilities include attacks at the biometric sensor level, replay attacks on the data communication stream, and attacks on the database, among others [1]. This chapter will focus on the vulnerability of attacks at the sensor level, including the spoof attack or use of an artificial biometric sample to gain unauthorized access. Several recent highly publicized articles which reported on the spoofing vulnerabilities will be described, in addition to spoofing research performed in my laboratory at West Virginia University. Finally, anti-spoofing measures which can be implemented to minimize the risk of an attack will be summarized. Spoofing Background Attacks at a biometric sensor level can be divided into several scenarios [2]. Attacks can include forcibly compelling a registered user to verify/identify, presenting a registered deceased person or dismembered body part, using a genetic clone, and introduction of fake biometric samples or spoofing. Several of these scenarios are described below and potential solutions apply to most. Attacks using force and genetic clones are the exception. For attacks using force, this risk exists with currently used security measures. Things used to minimize risk include cameras, " panic " buttons, alarms, etc. In the case of genetic clones, in most cases, biometric samples still differ between individuals, even identical twins. However, the algorithm may not be robust enough to distinguish these differences. DNA is an exception, where clones would be identical; however, DNA has not been developed at this point for use in a verification/identification scenario. Before spoofing is described in more detail, it may be helpful to discuss how the false accept ratio, a typical assessment measure of biometric devices, is related to spoofing. A false accept is when a submitted sample is incorrectly matched to an template enrolled by another user [3]. This only refers to a zero effort attempt, i.e., an unauthorized user making an attempt with their own biometric to gain access to a system. If the false accept ratio is kept low, then the probability of specific …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bibliometric analysis and thematic distribution of occupational safety books in Iran

Background and Objective: Occupational safety is an important and significant issue that helps maintain the health and safety of employees and prevent occupational accidents and injuries. Therefore, the present study was conducted with the aim of reviewing and analyzing books related to occupational safety. Materials and methods: The current research employed a descriptive and bibliometric met...

متن کامل

Improved Univariate Microaggregation for Integer Values

Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. The problem of producing useful protected datasets is addressed in multiple computational priva...

متن کامل

میزان مطابقت دایره‌المعارف‌های فارسی کودکان و نوجوانان منتشرشده بین سال‌های 1385-1390 با معیارهای ارزیابی کتاب مرجع

Purpose: In this article, we aimed at the evaluation of children and young adult's Persian encyclopedias, published during 2006-2011, with reference works evaluation criteria. Methodology: Evaluative research method was used for directing research. The population of study was 150 titles of published encyclopedias. The tool for evaluation was a researcher-made checklist that gathered through li...

متن کامل

بررسی توزیع نیروی انسانی متخصص دربیمارستان‌های دانشگاه علوم پزشکی تهران

Background and Aim: Today, healthcare system is exposed to inappropriate human resources distribution challenges in all over the world. So far there is not an appropriate policy for human resources distribution in Iran. This deficiency may cause several problems for providing healthcare services. This research was aimed to determine the situation of human resources distribution among Tehran Uni...

متن کامل

Analysis of Socio-economic Factors Affecting Poverty and Health Inequalities During the Years 2011-2015

Introduction: Currently social problems are among the most important issues in Iran that have been occupying the minds of experts and academics. The consequences of social problems would affect individuals and society and can even threaten social security. In this regard, in 2012 the Second National Conference of Social Problems was held by the Iranian Sociological Association. It had accepted ...

متن کامل

Letter to Editor

Dear Editor-in-chief of the Journal of Surgery and Trauma An article titled: (Evaluation of the results of direct laryngoscopy of patients with larynx and hypopharynx signs and lesions in ENT specialized medical centers of Birjand city) Which was published by Mr. Mofaateh et al. In issue No. 1-2, Volume 4-2016 (1), Thanks and respect to the cherished writers, a few points are worth mentioning:...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002