Enhancing security and privacy in biometrics-based authentication systems

Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.

[1]  T. Parthasarathy,et al.  Development of a Mathematical Formula for the Calculation of Fingerprint Probabilities Based on Individual Characteristics , 1977 .

[2]  S. Sclove The Occurrence of Fingerprint Characteristics as a Two-Dimensional Process , 1979 .

[3]  John I. Thornton,et al.  A Critical Analysis of Quantitative Fingerprint Individuality Models , 1986 .

[4]  Thaddeus Beier,et al.  Feature-based image metamorphosis , 1992, SIGGRAPH.

[5]  B. Miller,et al.  Vital signs of identity [biometrics] , 1994, IEEE Spectrum.

[6]  Jelena Kovacevic,et al.  Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.

[7]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[8]  Christopher M. Brislawn,et al.  FBI compression standard for digitized fingerprint images , 1996, Optics & Photonics.

[9]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[10]  Robert S. Germain,et al.  Fingerprint matching using transformation parameter clustering , 1997 .

[11]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[12]  Bruce Schneier,et al.  SECURITY PITFALLS IN CRYPTOGRAPHY , 1998 .

[13]  George Wolberg,et al.  Image morphing: a survey , 1998, The Visual Computer.

[14]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[15]  Thaddeus Beier,et al.  Feature-based image metamorphosis , 1998 .

[16]  W. Gropp,et al.  Accepted for publication , 2001 .

[17]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[18]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[19]  Sharath Pankanti,et al.  Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.

[20]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[21]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .