Title
Biometric perils and patches
Abstract
Biometrics authentication offers many advantages over conventional authentication systems that rely on possessions or special knowledge. With conventional technology, often the mere possession of an employee ID card is proof of ID, while a password potentially can be used by large groups of colleagues for long times without change. The fact that biometrics authentication is non-repudiable (hard to refute) and, yet, convenient, is among its most important advantages. Biometrics systems, however, suffer from some inherent biometrics-specific security threats. These threats are mainly related to the use of digital signals and the need for additional input devices, though we also discuss brute-force attacks of biometrics systems. There are also problems common to any pattern recognition system. These include “wolves” and “lambs”, and a new group we call “chameleons”. An additional issue with the use of biometrics is the invasion of privacy because the user has to enroll with an image of a body part. We discuss these issues and suggest some methods for mitigating their impact.
Year
DOI
Venue
2002
10.1016/S0031-3203(01)00247-3
Pattern Recognition
Keywords
Field
DocType
Secure authentication,Threat model,Biometrics,Fingerprint,WSQ compression,Data hiding,Cancellable biometrics
Internet privacy,Authentication,Threat model,Computer security,Information hiding,Password,Possession (law),Biometrics,Mathematics,Privacy laws of the United States,Input device
Journal
Volume
Issue
ISSN
35
12
0031-3203
Citations 
PageRank 
References 
141
7.58
9
Authors
3
Search Limit
100141
Name
Order
Citations
PageRank
Ruud M. Bolle12116230.26
Jonathan H. Connell271260.10
Nalini K. Ratha3109093.04