Security Of Biometric Systems

A natural question that arises in biometric recognition is which biometric system is “best” suited for a particular application. Of course, the answer to this question depends not only on technical merits and limitations of the biometric system (e.g., matching accuracy and throughput), but also on other socio-economic factors like user acceptability and system cost. However, given that all other factors are equal, one would obviously prefer a biometric system that has the least probability of failure.

[1]  H.V. Poor,et al.  Privacy-security tradeoffs in biometric security systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[2]  Julien Bringer,et al.  An Authentication Protocol with Encrypted Biometric Data , 2008, AFRICACRYPT.

[3]  John Daugman,et al.  Recognising persons by their iris patterns , 2004, Defense + Commercial Sensing.

[4]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[5]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[6]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[7]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[8]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[9]  Robert K. Rowe,et al.  Multispectral fingerprint imaging for spoof detection , 2005, SPIE Defense + Commercial Sensing.

[10]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[11]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[12]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[13]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[14]  Bo Fu,et al.  Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[16]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Tieniu Tan,et al.  Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.

[18]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[19]  Pieter H. Hartel,et al.  Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.

[20]  Pieter H. Hartel,et al.  The state of the art in abuse of biometrics , 2005 .

[21]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[22]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[23]  C. Busch,et al.  Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[24]  Pong C. Yuen,et al.  A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.

[25]  Frans M. J. Willems,et al.  Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.

[26]  Nasir D. Memon,et al.  How to Measure Biometric Information? , 2010, 2010 20th International Conference on Pattern Recognition.

[27]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[28]  Kang Ryoung Park,et al.  Fake Iris Detection by Using Purkinje Image , 2006, ICB.

[29]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[30]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[31]  A. Stoianov Cryptographically secure biometrics , 2010, Defense + Commercial Sensing.

[32]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[33]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[34]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..