Title
Biometrics break-ins and band-aids
Abstract
Currently there is much interest in the use of biometrics for authentication and identification applications. This has been heightened most recently because of the threat of terrorism. Biometrics authentication and identification systems offer several advantages over systems based on knowledge or possession such as unsupervised (legacy) password/PIN-based systems and supervised (legacy) passport-based systems. To optimize security it is important that biometrics authentication systems are designed to withstand different sources of attack. We identify some such threats to biometrics systems and detail issues related to the tradeoff between security and convenience. We further show how to estimate a biometrics' intrinsic security, sometimes called a biometrics' individuality, with fingerprints as an example.
Year
DOI
Venue
2003
10.1016/S0167-8655(03)00080-1
Pattern Recognition Letters
Keywords
Field
DocType
different source,identification system,biometrics break-in,pin-based system,intrinsic security,detail issue,biometrics authentication,identification application,biometrics authentication system,passport-based system,biometrics system,biometric authentication
Internet privacy,Authentication,Computer security,Terrorism,Possession (law),Password,Biometrics,Mathematics
Journal
Volume
Issue
ISSN
24
13
Pattern Recognition Letters
Citations 
PageRank 
References 
23
1.37
6
Authors
3
Name
Order
Citations
PageRank
Nalini K. Ratha1109093.04
Jonathan H. Connell271260.10
Ruud M. Bolle32116230.26