Abstract
Automated biometric authentication systems help to alleviate the problems associated with existing methods of user authentication. Biometrics can improve convenience or security, or ideally both. However, security weak points will exist or will be introduced in any biometric installation, unintended by the designers of the system. These weak points will be discovered during operation of a system when the system is attacked, and the system will be attacked most successfully at the security weak points.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science+Business Media New York
About this chapter
Cite this chapter
Bolle, R.M., Connell, J.H., Pankanti, S., Ratha, N.K., Senior, A.W. (2004). Thwarting Attacks. In: Guide to Biometrics. Springer Professional Computing. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-4036-3_12
Download citation
DOI: https://doi.org/10.1007/978-1-4757-4036-3_12
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-2305-9
Online ISBN: 978-1-4757-4036-3
eBook Packages: Springer Book Archive