Abstract
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strengh estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm is turned out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern matching algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold values.
Chapter PDF
References
International Organization for Standardization (ISO), International Electrotechnical Commission (IEC): ISO/IEC CD 19792: Information technology – Security techniques – Security evaluation of biometrics (2006)
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial ’Gummy’ Fingers on Fingerprint Systems. In: Optical Security and Counterfeit Deterrence Techniques IV, Proc. SPIE, vol. 4677, pp. 275–289 (2002)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
Miura, N., Nagasaka, A., Miyatake, M.: Feature Extraction of Finger Vein Patterns Based on Iterative Line Tracking and its Application to Personal Identification. IEICE Trans. Inf. & Syst (Japanese edn.) J-86-D-II, 678–687 (2003)
Doddington, G., Liggett, W., Martin, A., Przybocki, M., Reynolds, D.: SHEEP, GOATS, LAMBS and WOLVES: A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation. In: Proc. ICSLP, vol. 98, pp. 1351–1354 (1998)
Daugman, J.: How Iris Recognition Works. IEEE Trans. Circuits and Syst. Video Technology 14, 21–30 (2004)
Daugman, J.: Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons. Proc. IEEE 94, 1927–1935 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Une, M., Otsuka, A., Imai, H. (2007). Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. In: Lee, SW., Li, S.Z. (eds) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science, vol 4642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74549-5_42
Download citation
DOI: https://doi.org/10.1007/978-3-540-74549-5_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74548-8
Online ISBN: 978-3-540-74549-5
eBook Packages: Computer ScienceComputer Science (R0)