Biometric attack vectors and defences
نویسنده
چکیده
Much has been reported on attempts to fool biometric sensors with false fingerprints, facial overlays and a myriad of other spoofing approaches. Other attack vectors on biometric systems have, however, had less prominence. This paper seeks to present a broader and more practical view of biometric system attack vectors, placing them in the context of a risk-based systems approach to security and outlining defences. a 2007 Elsevier Ltd. All rights reserved.
منابع مشابه
The Biometric Values of Affected and Fellow Eyes in Patients with Acute Attack of Primary Angle Closure
Background: It has been estimated that 67 million people worldwide are affected with a primary glaucoma and that one-third have primary angle closure glaucoma. We aimed to determine the biometric differences between the eyes of patients with acute attack of primary angle closure and their non-involved fellow eyes. Methods: Twenty eight patients with acute attack of primary angle closure were re...
متن کاملA Genetic Based Non-Invertible Cryptographic Key Generation From Cancelable Biometric in MANET
Mission critical applications uses mobile ad hoc network. Security is required to protect this data while transmitting in network. Biometric characteristic such as face, fingerprint, voice, iris, and retina can be potential alternative to generate a cryptographic key and enhance the security. In this paper non-invertible key generation using cancelable fingerprint is discussed. From the receive...
متن کاملAssessing Vulnerabilities of Biometric Readers Using an Applied Defeat Evaluation Methodology
Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat ...
متن کاملAn Analytical Study on integration of Multibiometric Traits at Matching Score Level using Transformation Techniques
Biometric is one of those egressing technologies which are exploited for identifying a person on the basis of physiological and behavioral characteristic. However, unimodal biometric system faces the problem of lack of individuality, spoof attacks, non-universality, degree of freedom etc., which make these systems less precise and erroneous. In order to overcome these problems, multi biometric ...
متن کاملDecodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms
The fuzzy commitment scheme is a cryptographic primitive that can be used to protect biometric templates. If multiple records extracted from the same biometric characteristic have been intercepted, their correspondence can be examined, i.e., cross-matching, via the decodability attack. As a countermeasure, Kelkboom et al. proposed to apply a public but record-specific permutation to the feature...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 26 شماره
صفحات -
تاریخ انتشار 2007