Abstract | ||
---|---|---|
Currently there is much interest in the use of biometrics for authentication and identification applications. This has been heightened most recently because of the threat of terrorism. Biometrics authentication and identification systems offer several advantages over systems based on knowledge or possession such as unsupervised (legacy) password/PIN-based systems and supervised (legacy) passport-based systems. To optimize security it is important that biometrics authentication systems are designed to withstand different sources of attack. We identify some such threats to biometrics systems and detail issues related to the tradeoff between security and convenience. We further show how to estimate a biometrics' intrinsic security, sometimes called a biometrics' individuality, with fingerprints as an example. |
Year | DOI | Venue |
---|---|---|
2003 | 10.1016/S0167-8655(03)00080-1 | Pattern Recognition Letters |
Keywords | Field | DocType |
different source,identification system,biometrics break-in,pin-based system,intrinsic security,detail issue,biometrics authentication,identification application,biometrics authentication system,passport-based system,biometrics system,biometric authentication | Internet privacy,Authentication,Computer security,Terrorism,Possession (law),Password,Biometrics,Mathematics | Journal |
Volume | Issue | ISSN |
24 | 13 | Pattern Recognition Letters |
Citations | PageRank | References |
23 | 1.37 | 6 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Nalini K. Ratha | 1 | 1090 | 93.04 |
Jonathan H. Connell | 2 | 712 | 60.10 |
Ruud M. Bolle | 3 | 2116 | 230.26 |