Security issues in biometric authentication

User authentication is fundamental to the protection of information systems. It is the first and most critical link in the security chain that restricts access to system and data resources to legitimate users only. The advantages of using biometrics to verify a person's identity over using passwords or tokens have been broadly presented. However, recent research has revealed that biometric technologies can be defeated with low-tech and cheap materials. This presents a new challenge at a time when people are encouraged to use biometrics as a means to enhance network security. Since biometrics are not secrets, there exists a risk of them being captured, copied, and forged. In this paper, the biometric authentication's vulnerability to various attacks is analyzed, and efforts to defeat the spoofing attacks are presented. In particular, multimodal biometric fusion approaches are presented to counteract security threats.

[1]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[2]  D. Reynolds,et al.  Authentication gets personal with biometrics , 2004, IEEE Signal Processing Magazine.

[3]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[4]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[5]  Arun Ross,et al.  Multibiometric systems , 2004, CACM.

[6]  Francine J. Prokoski Disguise Detection And Identification Using Infrared Imagery , 1983, Other Conferences.

[7]  Ton van der Putte,et al.  Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.

[8]  X. Zhang,et al.  Automatic speechreading with application to speaker verification , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[9]  R. K. Rowe A Multispectral Sensor for Fingerprint Spoof Detection , 2005 .

[10]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[11]  Paul Reid,et al.  Biometrics for Network Security , 2003 .

[12]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[13]  Seong G. Kong,et al.  Fusion of Visual and Thermal Signatures with Eyeglass Removal for Robust Face Recognition , 2004, 2004 Conference on Computer Vision and Pattern Recognition Workshop.

[14]  Chris J. Hill,et al.  Risk of Masquerade Arising from the Storage of Biometrics , 2001 .

[15]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..