Biometric attack vectors and defences

نویسنده

  • Chris Roberts
چکیده

Much has been reported on attempts to fool biometric sensors with false fingerprints, facial overlays and a myriad of other spoofing approaches. Other attack vectors on biometric systems have, however, had less prominence. This paper seeks to present a broader and more practical view of biometric system attack vectors, placing them in the context of a risk-based systems approach to security and outlining defences. a 2007 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Biometric Values of Affected and Fellow Eyes in Patients with Acute Attack of Primary Angle Closure

Background: It has been estimated that 67 million people worldwide are affected with a primary glaucoma and that one-third have primary angle closure glaucoma. We aimed to determine the biometric differences between the eyes of patients with acute attack of primary angle closure and their non-involved fellow eyes. Methods: Twenty eight patients with acute attack of primary angle closure were re...

متن کامل

A Genetic Based Non-Invertible Cryptographic Key Generation From Cancelable Biometric in MANET

Mission critical applications uses mobile ad hoc network. Security is required to protect this data while transmitting in network. Biometric characteristic such as face, fingerprint, voice, iris, and retina can be potential alternative to generate a cryptographic key and enhance the security. In this paper non-invertible key generation using cancelable fingerprint is discussed. From the receive...

متن کامل

Assessing Vulnerabilities of Biometric Readers Using an Applied Defeat Evaluation Methodology

Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat ...

متن کامل

An Analytical Study on integration of Multibiometric Traits at Matching Score Level using Transformation Techniques

Biometric is one of those egressing technologies which are exploited for identifying a person on the basis of physiological and behavioral characteristic. However, unimodal biometric system faces the problem of lack of individuality, spoof attacks, non-universality, degree of freedom etc., which make these systems less precise and erroneous. In order to overcome these problems, multi biometric ...

متن کامل

Decodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms

The fuzzy commitment scheme is a cryptographic primitive that can be used to protect biometric templates. If multiple records extracted from the same biometric characteristic have been intercepted, their correspondence can be examined, i.e., cross-matching, via the decodability attack. As a countermeasure, Kelkboom et al. proposed to apply a public but record-specific permutation to the feature...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2007