Privacy and Security Assessment of Biometric Systems

The goal of this chapter is then to present a privacy and security-based assessment methodology to be used to evaluate and compare biometric systems.

[1]  Christophe Rosenberger,et al.  Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[2]  Masaki Hashiyada,et al.  Development of biometric DNA ink for authentication security. , 2004, The Tohoku journal of experimental medicine.

[3]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[4]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[5]  Anil K. Jain,et al.  Beyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features , 2009, ICB.

[6]  Julian Fiérrez,et al.  Bayesian Hill-Climbing Attack and Its Application to Signature Verification , 2007, ICB.

[7]  Assia Tria,et al.  Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin , 2009, Formal to Practical Security.

[8]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[9]  Julian Fiérrez,et al.  Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[10]  Despina Polemi,et al.  Application of Multi-criteria Analysis for the Creation of a Risk Assessment Knowledgebase for Biometric Systems , 2004, ICBA.

[11]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[12]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[13]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[14]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[15]  Bart Preneel,et al.  Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[16]  Václav Matyás,et al.  Biometric authentication - security and usability , 2002, Communications and Multimedia Security.

[17]  Julian Fiérrez,et al.  On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm , 2012, CIARP.

[18]  Sébastien Marcel,et al.  On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..

[19]  Christophe Rosenberger,et al.  Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[20]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[21]  Andy Adler,et al.  Biometric System Security , 2008 .

[22]  Julian Fiérrez,et al.  An evaluation of indirect attacks and countermeasures in fingerprint verification systems , 2011, Pattern Recognit. Lett..

[23]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[24]  Shan Juan Xie,et al.  New Trends and Developments in Biometrics , 2012 .

[25]  Jean-Luc Dugelay,et al.  On the vulnerability of face recognition systems to spoofing mask attacks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[26]  Christophe Rosenberger,et al.  Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[27]  Christophe Rosenberger,et al.  An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates , 2013, Comput. Secur..

[28]  Douglas A. Reynolds,et al.  SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .

[29]  Julian Fiérrez,et al.  Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.

[30]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[31]  Alessandra Lumini,et al.  An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..

[32]  Artur Rot IT Risk Assessment: Quantitative and Qualitative Approach , 2008 .

[33]  Ann Cavoukian,et al.  Biometric Encryption Chapter from the Encyclopedia of Biometrics , 2009 .

[34]  Ton van der Putte,et al.  Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.

[35]  Julian Fiérrez,et al.  Author's Personal Copy Future Generation Computer Systems a High Performance Fingerprint Liveness Detection Method Based on Quality Related Features , 2022 .

[36]  Sharath Pankanti,et al.  Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[37]  Marina Blanton,et al.  On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting , 2011, Proceedings of the International Conference on Security and Cryptography.