Not for General Distribution: to Be Published
نویسنده
چکیده
Introduction Biometric devices have been suggested for use in applications from access to personal computers, automated teller machines, credit card transactions, electronic transactions to access control for airports, nuclear facilities, and border control. Given this diverse array of potential applications, biometric devices have the potential to provide additional security over traditional security means such as passwords, keys, signatures, picture identification, etc. While biometrics may improve security, biometric systems also have vulnerabilities. System vulnerabilities include attacks at the biometric sensor level, replay attacks on the data communication stream, and attacks on the database, among others [1]. This chapter will focus on the vulnerability of attacks at the sensor level, including the spoof attack or use of an artificial biometric sample to gain unauthorized access. Several recent highly publicized articles which reported on the spoofing vulnerabilities will be described, in addition to spoofing research performed in my laboratory at West Virginia University. Finally, anti-spoofing measures which can be implemented to minimize the risk of an attack will be summarized. Spoofing Background Attacks at a biometric sensor level can be divided into several scenarios [2]. Attacks can include forcibly compelling a registered user to verify/identify, presenting a registered deceased person or dismembered body part, using a genetic clone, and introduction of fake biometric samples or spoofing. Several of these scenarios are described below and potential solutions apply to most. Attacks using force and genetic clones are the exception. For attacks using force, this risk exists with currently used security measures. Things used to minimize risk include cameras, " panic " buttons, alarms, etc. In the case of genetic clones, in most cases, biometric samples still differ between individuals, even identical twins. However, the algorithm may not be robust enough to distinguish these differences. DNA is an exception, where clones would be identical; however, DNA has not been developed at this point for use in a verification/identification scenario. Before spoofing is described in more detail, it may be helpful to discuss how the false accept ratio, a typical assessment measure of biometric devices, is related to spoofing. A false accept is when a submitted sample is incorrectly matched to an template enrolled by another user [3]. This only refers to a zero effort attempt, i.e., an unauthorized user making an attempt with their own biometric to gain access to a system. If the false accept ratio is kept low, then the probability of specific …
منابع مشابه
Bibliometric analysis and thematic distribution of occupational safety books in Iran
Background and Objective: Occupational safety is an important and significant issue that helps maintain the health and safety of employees and prevent occupational accidents and injuries. Therefore, the present study was conducted with the aim of reviewing and analyzing books related to occupational safety. Materials and methods: The current research employed a descriptive and bibliometric met...
متن کاملImproved Univariate Microaggregation for Integer Values
Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. The problem of producing useful protected datasets is addressed in multiple computational priva...
متن کاملمیزان مطابقت دایرهالمعارفهای فارسی کودکان و نوجوانان منتشرشده بین سالهای 1385-1390 با معیارهای ارزیابی کتاب مرجع
Purpose: In this article, we aimed at the evaluation of children and young adult's Persian encyclopedias, published during 2006-2011, with reference works evaluation criteria. Methodology: Evaluative research method was used for directing research. The population of study was 150 titles of published encyclopedias. The tool for evaluation was a researcher-made checklist that gathered through li...
متن کاملبررسی توزیع نیروی انسانی متخصص دربیمارستانهای دانشگاه علوم پزشکی تهران
Background and Aim: Today, healthcare system is exposed to inappropriate human resources distribution challenges in all over the world. So far there is not an appropriate policy for human resources distribution in Iran. This deficiency may cause several problems for providing healthcare services. This research was aimed to determine the situation of human resources distribution among Tehran Uni...
متن کاملAnalysis of Socio-economic Factors Affecting Poverty and Health Inequalities During the Years 2011-2015
Introduction: Currently social problems are among the most important issues in Iran that have been occupying the minds of experts and academics. The consequences of social problems would affect individuals and society and can even threaten social security. In this regard, in 2012 the Second National Conference of Social Problems was held by the Iranian Sociological Association. It had accepted ...
متن کاملLetter to Editor
Dear Editor-in-chief of the Journal of Surgery and Trauma An article titled: (Evaluation of the results of direct laryngoscopy of patients with larynx and hypopharynx signs and lesions in ENT specialized medical centers of Birjand city) Which was published by Mr. Mofaateh et al. In issue No. 1-2, Volume 4-2016 (1), Thanks and respect to the cherished writers, a few points are worth mentioning:...
متن کامل