Advertisement

Biometric System Security

  • Andy Adler

Keywords

Face Image Biometric System Biometric Feature Biometric Template Biometric Information 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    A. Adler. Sample Images can be Independently Restored from Face Recognition Templates. In Proceedings of Canadian Conference on Electrical and Computer Engineering, volume 2, pages 1163–1166, Montreal, Canada, May 2003.Google Scholar
  2. 2.
    A Adler, R Youmaran, and S Loyka. Information content of biometric features. In Proceedings of Biometrics Consortium Conference, Washington DC, USA, 2005.Google Scholar
  3. 3.
    Andy Adler. Images can be Regenerated from Quantized Biometric Match Score Data. In Proceedings Canadian Conference on Electrical and Computer Engineering, pages 469–472, Niagara Falls, Canada, May 2004.Google Scholar
  4. 4.
    Andy Adler. Vulnerabilities in biometric encryption systems. In Proceedings of AVBPA, volume 3546, pages 1100–1109, 2005.Google Scholar
  5. 5.
    BioAPI Consortium. Bioapi specification version 1.1, 2001.Google Scholar
  6. 6.
    X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith. Secure remote authentication using biometric data. In Advances in Cryptology (EUROCRYPT), 2005.Google Scholar
  7. 7.
    A. Cavoukian. Privacy and Biometrics. In Proceedings of International Conference on Privacy and Personal Data Protection, Hong Kong, China, 1999.Google Scholar
  8. 8.
    T. Clancy, D. Lin, and N. Kiyavash. Secure Smartcard-Based Fingerprint Authentication. In Proceedings of ACM SIGMM Workshop on Biometric Methods and Applications, pages 45–52, Berkley, USA, November 2003.Google Scholar
  9. 9.
    B. Cukic and N. Bartlow. Threats and Countermeasures. In Proceedings of Biometrics Consortium Conference, Washington DC, USA, 2005.Google Scholar
  10. 10.
    J. Daugman. The importance of being random: Statistical principles of iris recognition. Pattern Recognition, 36:279–291, 2003.CrossRefGoogle Scholar
  11. 11.
    G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta. On enabling secure applications through ofi-line biometric identification. In Proceedings of the IEEE Symposium on Privacy and Security, pages 148–157, 1998.Google Scholar
  12. 12.
    G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta. On the relation of error correction and cryptography to an ofiine biometric based identification scheme. In Proceedings of International Workshop on Coding and Cryptography (WCC’99), pages 129–138, 1999.Google Scholar
  13. 13.
    G. Doddington, W. Liggett, A. Martin, N. Przybocki, and D. Reynolds. Sheep, Goats, Lambs and Wolves: An Analysis of Individual Difierences in Speaker Recognition Performance. In Proceedings of the International Conference on Auditory-Visual Speech Processing, Sidney, Australia, 1998.Google Scholar
  14. 14.
    Y. Dodis, L. Reyzin, and A. Smith. Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints. In Proceedings of Eurocrypt’04, 2004.Google Scholar
  15. 15.
    N. Ferguson and B. Schneier. Practical Cryptography. John Wiley & Sons, NJ, USA, 2003.Google Scholar
  16. 16.
    M. Golfarelli, D. Maio, and D. Maltoni. On the Error-Reject Tradeofi in Biometric Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):786–796, July 1997.CrossRefGoogle Scholar
  17. 17.
    International Biometric Group. Generating images from templates, 2002.Google Scholar
  18. 18.
    F. Hao, R. Anderson, and J. Daugman. Combining cryptography with biometrics efiectively. Technical Report UCAM-CL-TR-640, University of Cambridge, Cambridge, UK, 2005.Google Scholar
  19. 19.
    C. Hill. Risk of Masquerade Arising from the Storage of Biometrics. B.s. thesis, Austrailian National University, 2001.Google Scholar
  20. 20.
    InterNational Committee for Information Technology Standards (INCITS). Study report on biometrics in e-authentication. Technical Report Technical Report INCITS M1/06-0693, 2006.Google Scholar
  21. 21.
    International Labour Organization. Biometric testing campaign report (addendum to part i), 2005.Google Scholar
  22. 22.
    ISO. Standing document 2, version 5 – harmonized biometric vocabulary. Technical Report Technical Report ISO/IEC JTC 1/SC 37 N 1480, 2006.Google Scholar
  23. 23.
    A. Juels and M. Sudan. A fuzzy vault schem. In Proceedings of the IEEE International Symposium on Information Theory, page 408, 2002.Google Scholar
  24. 24.
    D. Kundur, C-Y. Lin, and H. Yu. Special Issue on Enabling Security Technologies for Digital Rights Management. In Proceedings of IEEE, volume 92, pages 879–882, 2004.Google Scholar
  25. 25.
    J-P. Linnartz and P. Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Proceedings of the International Conference on Audio-and Video-Based Biometric Person Authentication (AVBPA) in LNCS, volume 2688, pages 393–402, Guiford, UK, 2003.Google Scholar
  26. 26.
    D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar. Handbook of Fingerprint Recognition. Springer-Verlag, 2003.Google Scholar
  27. 27.
    F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel. Cryptographic Key Generation from Voice. In Proceedings of IEEE Symposium on Security and Privacy, pages 202–213, Oakland, USA, May 2001.Google Scholar
  28. 28.
    A. P. Moore, R. J. Ellison, and R. C. Linger. Attack modeling for information security and survivability. Technical Report Technical Report CMU/SEI-2001TN-001, Carnegie Mellon University, Pittsburgh, PA, USA, 2001.Google Scholar
  29. 29.
    E. M. Newton, L. Sweeney, and B. Malin. Preserving privacy by de-identifying face images. IEEE Transactions on Knowledge Data Engineering, 17:232–243, 2005.CrossRefGoogle Scholar
  30. 30.
    S. Pankanti, S. Prabhakar, and A. K. Jain. On the Individuality of Fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(8):1010–1025, August 2002.CrossRefGoogle Scholar
  31. 31.
    P. S. Penev and L. Sirovich. The Global Dimensionality of Face Space. In Proceedings of 4th IEEE International Conference on Automatic Face and Gesture Recognition, pages 264–270, Grenoble, France, 2000.Google Scholar
  32. 32.
    N. K. Ratha, J. H. Connell, and R. M. Bolle. Cancelable Biometrics . In Proceedings of Biometric Consortium Conference, 2000.Google Scholar
  33. 33.
    N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40:614–634, 2001.CrossRefGoogle Scholar
  34. 34.
    N. K. Ratha, J. H. Connell, R. M. Bolle, and S. Chikkerur. Cancelable Biometrics: A Case Study in Fingerprints. In Proceedings of IEEE International Conference Pattern Recognition, volume 4, pages 370–373, Hong Kong, China, August 2006.Google Scholar
  35. 35.
    A. Ross, J. Shah, and A. K. Jain. Towards Reconstructing Fingerprints from Minutiae Points. In Proceedings of SPIE Conference on Biometric Technology for Human Identification II, volume 5779, pages 68–80, Orlando, USA, 2005.Google Scholar
  36. 36.
    M. B. Salter. Passports, Mobility, and Security: How smart can the border befi International Studies Perspectives, 5:71–91, 2004.CrossRefGoogle Scholar
  37. 37.
    M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla. Cancelable biometric filters for face recognition . In Proceedings of the International Conference on Pattern Recognition, pages 922–925, 2004.Google Scholar
  38. 38.
    B. Schneier. Attack Trees. Dr. Dobb’s Journal, 1999.Google Scholar
  39. 39.
    B. Schneier. The Uses and Abuses of Biometrics. Communications of the ACM, 42(8):, 1999.Google Scholar
  40. 40.
    C. Soutar, R. Gilroy, and A. Stoianov. Biometric System Performance and Security . In Proceedings of the IEEE Workshop on Automatic Identification Advanced Technologies, 1999.Google Scholar
  41. 41.
    C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar. Biometric Encryption using image processing. In Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques II, volume 3314, pages 178–188, 1998.Google Scholar
  42. 42.
    C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar. Biometric Encryption: enrollment and verification procedures. In Proceedings of SPIE, Optical Pattern Recognition IX, volume 3386, pages 24–35, 1998.Google Scholar
  43. 43.
    The Guardian. Cracked it, 17 November 2006.Google Scholar
  44. 44.
    C. Tilton. Biometrics in E-Authentication: Threat Model. In Proceedings of the Biometrics Consortium Conference, Baltimore, MD, USA, 2006.Google Scholar
  45. 45.
    G. Tomko. Privacy Implications of Biometrics -A Solution in Biometric Encryption. In Proceedings of the 8th Annual Conference on Computers, Freedom and Privacy, Austin, TX, USA, 1998.Google Scholar
  46. 46.
    U. Uludag and A.K. Jain. Attacks on Biometric Systems: A Case Study in Fingerprints. In Proceedings of SPIE Conference on Security, Seganography and Watermarking of Multimedia Contents VI, pages 622–633, San Jose, USA, January 2004.Google Scholar
  47. 47.
    U. Uludag, S. Pankanti, and A. K. Jain. Fuzzy Vault for Fingerprints. In Proceedings of Fifth International Conference on Audio-and Video-based Biometric Person Authentication, pages 310–319, Rye Town, USA, July 2005.Google Scholar
  48. 48.
    U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain. Biometric Cryptosystems: Issues and Challenges. Proceedings of the IEEE, Special Issue on Multimedia Security for Digital Rights Management, 92(6):948–960, June 2004.Google Scholar
  49. 49.
    J. Wayman. The cotton ball problem. In Proceedings of Biometrics Consortium Conference, Washington DC, USA, 2004.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Andy Adler
    • 1
  1. 1.Systems and Computer Engineering Carleton UniversityOttawa

Personalised recommendations