메뉴 건너뛰기




Volumn 5, Issue 2, 2013, Pages 137-159

A taxonomy of biometric system vulnerabilities and defences

Author keywords

authentication; biometrics; defences; security; template protection; vitality measures; vulnerabilities

Indexed keywords

AUTHENTICATION; TAXONOMIES;

EID: 84877275048     PISSN: 17558301     EISSN: 1755831X     Source Type: Journal    
DOI: 10.1504/IJBM.2013.052964     Document Type: Article
Times cited : (28)

References (57)
  • 1
    • 0141539639 scopus 로고    scopus 로고
    • Sample images can be independently restored from the face recognition templates'
    • Montral, QC, Canada
    • Adler, A. (2003) 'Sample images can be independently restored from the face recognition templates', Proc. Can. Conf. Elect. Comput. Eng. (CCECE), Montral, QC, Canada, pp.1163-1166.
    • (2003) Proc. Can. Conf. Elect. Comput. Eng. (CCECE) , pp. 1163-1166
    • Adler, A.1
  • 5
    • 0036887662 scopus 로고    scopus 로고
    • Biometric perils and patches'
    • Bolle, R.M., Connell, J.H. and Ratha, N.K. (2002) 'Biometric perils and patches', Pattern Recognition, Vol. 35, No. 12, pp.2727-2738.
    • (2002) Pattern Recognition , vol.35 , Issue.12 , pp. 2727-2738
    • Bolle, R.M.1    Connell, J.H.2    Ratha, N.K.3
  • 6
    • 34347337657 scopus 로고    scopus 로고
    • Audiovisual speech synchrony measure: Application to biometrics'
    • Article ID 70186
    • Bredin, H. and Chollet, G. (2007) 'Audiovisual speech synchrony measure: application to biometrics', EURASIP Journal on Advances in Signal Processing, Article ID 70186, pp.1-11.
    • (2007) EURASIP Journal on Advances in Signal Processing , pp. 1-11
    • Bredin, H.1    Chollet, G.2
  • 9
    • 33645837429 scopus 로고    scopus 로고
    • High security iris verification system based on random secret integration'
    • Chin, C.S., Jin, A.T.B. and Ling, D.N.C. (2006) 'High security iris verification system based on random secret integration', Computer Vision and Image Understanding, Vol. 102, pp.169-177.
    • (2006) Computer Vision and Image Understanding , vol.102 , pp. 169-177
    • Chin, C.S.1    Jin, A.T.B.2    Ling, D.N.C.3
  • 12
    • 0002736715 scopus 로고    scopus 로고
    • Recognizing persons by their iris patterns: Countermeasures against subterfuge
    • in Jain, A.K., Bolle, R. and Pankanti, S. (Eds.) Kluwer, Cambridge University, Cambridge
    • Daugman, J. (1999) 'Recognizing persons by their iris patterns: countermeasures against subterfuge', in Jain, A.K., Bolle, R. and Pankanti, S. (Eds.): Biometrics: Personal Identification in Networked Society, Kluwer, Cambridge University, Cambridge.
    • (1999) Biometrics: Personal Identification in Networked Society
    • Daugman, J.1
  • 14
    • 80052791591 scopus 로고    scopus 로고
    • A high performance fingerprint liveness detection method based on quality related features'
    • Galbally, J., Alonso-Fernandez, F., Fierrez, J. and Ortega-Garcia, J. (2012) 'A high performance fingerprint liveness detection method based on quality related features', Future Generation Computer Systems, Vol. 28, No. 1, pp.311-321.
    • (2012) Future Generation Computer Systems , vol.28 , Issue.1 , pp. 311-321
    • Galbally, J.1    Alonso-Fernandez, F.2    Fierrez, J.3    Ortega-Garcia, J.4
  • 17
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from online handwritten signatures'
    • Hao, F. and Chan, C.W. (2002) 'Private key generation from online handwritten signatures', Information Management & Computer Security, Vol. 10, No. 2, pp.159-164.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2 , pp. 159-164
    • Hao, F.1    Chan, C.W.2
  • 18
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • DOI 10.1109/TC.2006.138
    • Hao, F., anderson, R. and Daugman, J. (2006) 'Combining crypto with biometrics effectively', IEEE Trans. on Computers, Vol. 55, No. 9, pp.1081-1088. (Pubitemid 44263808)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 19
    • 0003019863 scopus 로고
    • Speaker verification using randomized phrase prompting'
    • Higgins, A., Bahler, L. and Porter, J. (1991) 'Speaker verification using randomized phrase prompting', Digital Signal Process., Vol. 1, pp.89-106.
    • (1991) Digital Signal Process. , vol.1 , pp. 89-106
    • Higgins, A.1    Bahler, L.2    Porter, J.3
  • 20
    • 84877261740 scopus 로고
    • Guide to quality control'
    • 2nd ed., White Plains, New York
    • Ishikawa, K. (1986) 'Guide to quality control', Asian Productivity Organization, 2nd ed., White Plains, New York.
    • (1986) Asian Productivity Organization
    • Ishikawa, K.1
  • 23
    • 0036350106 scopus 로고    scopus 로고
    • A fuzzy vault scheme'
    • Lausanne, Switzerland, 408p
    • Juels, A. and Sudan, M. (2002) 'A fuzzy vault scheme', ISIT 2002, Lausanne, Switzerland, 408p.
    • (2002) ISIT , vol.2002
    • Juels, A.1    Sudan, M.2
  • 24
    • 33845545401 scopus 로고    scopus 로고
    • Detector for recognizing the living character of a finger in a fingerprint recognizing apparatus'
    • Kallo, P., Kiss, I., Podmaniczky, A. and Talosi, J. (2001) 'Detector for recognizing the living character of a finger in a fingerprint recognizing apparatus', Dermo Corporation, U.S. Patent No. 6,175,64.
    • (2001) Dermo Corporation, U.S. Patent No. , vol.6 , Issue.175 , pp. 64
    • Kallo, P.1    Kiss, I.2    Podmaniczky, A.3    Talosi, J.4
  • 27
    • 33845540206 scopus 로고    scopus 로고
    • Anti-fraud biometric sensor that accurately detects blood flow'
    • US Patent #5, 737
    • Lapsley, P., Less, J., Pare, D. and Hoffman, N. (1998) 'Anti-fraud biometric sensor that accurately detects blood flow', SmartTouch, LLC, US Patent #5,737,439.
    • (1998) SmartTouch, LLC , pp. 439
    • Lapsley, P.1    Less, J.2    Pare, D.3    Hoffman, N.4
  • 30
    • 79959265863 scopus 로고    scopus 로고
    • An evaluation of indirect attacks and countermeasures in fingerprint verification systems'
    • Martinez-Diaz, M., Fierrez, J., Galbally, J. and Ortega-Garcia, J. (2011) 'An evaluation of indirect attacks and countermeasures in fingerprint verification systems', Pattern Recognition Letters, Vol. 32, No. 12, pp.1643-1651.
    • (2011) Pattern Recognition Letters , vol.32 , Issue.12 , pp. 1643-1651
    • Martinez-Diaz, M.1    Fierrez, J.2    Galbally, J.3    Ortega-Garcia, J.4
  • 31
    • 37549029284 scopus 로고    scopus 로고
    • Artificial fingers and irises: Importance of vulnerability analysis'
    • London
    • Matsumoto, T. (2004) 'Artificial fingers and irises: importance of vulnerability analysis', Proc. 7th Int'l. Biometrics Conference, London.
    • (2004) Proc. 7th Int'l. Biometrics Conference
    • Matsumoto, T.1
  • 32
    • 84877297119 scopus 로고    scopus 로고
    • Assessing the security of advanced biometric systems: Finger, vein and iris'
    • London
    • Matsumoto, T. (2007) 'Assessing the security of advanced biometric systems: finger, vein and iris', Proc. 10th Int'l. Biometrics Conference, London.
    • (2007) Proc. 10th Int'l. Biometrics Conference
    • Matsumoto, T.1
  • 35
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • DOI 10.1109/JPROC.2003.819611, Electronic Textiles: A Platform for Pervasive Computing
    • O'Gorman, L. (2003) 'Comparing passwords, tokens, and biometrics for user authentication', Proceedings of the IEEE, Vol. 91 No. 12, pp.2021-2040. (Pubitemid 40890781)
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 37
    • 0032045780 scopus 로고    scopus 로고
    • The FERET database and evaluation procedure for face-recognition algorithms
    • PII S026288569700070X
    • Phillips, P.J., Wechsler, H., Huang, J. and Rauss, P.J. (1998) 'the FERET database and evaluation procedure for face recognition algorithms', Image and Vision Computing Journal, Vol. 16, No. 5, pp.295-306. (Pubitemid 128393579)
    • (1998) Image and Vision Computing , vol.16 , Issue.5 , pp. 295-306
    • Phillips, P.J.1    Wechsler, H.2    Huang, J.3    Rauss, P.J.4
  • 41
    • 33846817469 scopus 로고    scopus 로고
    • Biometric attack vectors and defenses'
    • Roberts, C. (2007) 'Biometric attack vectors and defenses', Computers and Security, Vol. 26, No. 1, pp.14-25.
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 14-25
    • Roberts, C.1
  • 42
    • 85024264226 scopus 로고    scopus 로고
    • The uses and abuses of biometrics'
    • Schneier, B. (1999) 'the uses and abuses of biometrics', Communication to ACM, Vol. 42, No. 8, 136p.
    • (1999) Communication to ACM , vol.42 , Issue.8
    • Schneier, B.1
  • 46
    • 79951771128 scopus 로고    scopus 로고
    • Correlation-based classification of heartbeats for individual identification'
    • Springer
    • Singh, Y.N. and Gupta, P. (2011) 'Correlation-based classification of heartbeats for individual identification', Journal of Soft Computing, Vol. 15, No. 3, pp.449-460, Springer.
    • (2011) Journal of Soft Computing , vol.15 , Issue.3 , pp. 449-460
    • Singh, Y.N.1    Gupta, P.2
  • 48
    • 84892162179 scopus 로고    scopus 로고
    • Bioelectrical signals as emerging biometrics: Issues and challenges'
    • Article ID 712032 doi:10.5402/2012/712032
    • Singh, Y.N. and Singh, S.K. (2012) 'Bioelectrical signals as emerging biometrics: issues and challenges', ISRN Signal Processing, Article ID 712032, 13p, doi:10.5402/2012/712032.
    • (2012) ISRN Signal Processing
    • Singh, Y.N.1    Singh, S.K.2
  • 49
    • 84865577334 scopus 로고    scopus 로고
    • Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system'
    • Singh, Y.N., Singh, S.K. and Gupta, P. (2012) 'Fusion of electrocardiogram with unobtrusive biometrics: an efficient individual authentication system', Pattern Recognition Letters, Vol. 33, pp.1932-1941.
    • (2012) Pattern Recognition Letters , vol.33 , pp. 1932-1941
    • Singh, Y.N.1    Singh, S.K.2    Gupta, P.3
  • 51
    • 70449095873 scopus 로고    scopus 로고
    • Secure speech template protection in speaker verification system'
    • Teoh, A.B.J. and Chong, L.Y. (2010) 'Secure speech template protection in speaker verification system', Speech Communication, Vol. 52, pp.150-163.
    • (2010) Speech Communication , vol.52 , pp. 150-163
    • Teoh, A.B.J.1    Chong, L.Y.2
  • 52
    • 38349055942 scopus 로고    scopus 로고
    • Biometric liveness detection'
    • Toth, B. (2005) 'Biometric liveness detection', Information Security Bulletin, Vol. 10, pp.291-297.
    • (2005) Information Security Bulletin , vol.10 , pp. 291-297
    • Toth, B.1
  • 54
    • 12344281169 scopus 로고    scopus 로고
    • US Department Of Transportation ( Report AV-1998-1123
    • US Department of Transportation (1998) 'Audit report: advance automation system', Report AV-1998-113.
    • (1998) Audit report: advance automation system'
  • 56
    • 71149090310 scopus 로고    scopus 로고
    • Sorted index numbers for privacy preserving face recognition'
    • Article ID 260148
    • Wang, Y. and Hatzinakos, D. (2009) 'Sorted index numbers for privacy preserving face recognition', EURASIP Journal on Advances in Signal Processing, Article ID 260148, pp.1-16.
    • (2009) EURASIP Journal on Advances in Signal Processing , pp. 1-16
    • Wang, Y.1    Hatzinakos, D.2
  • 57
    • 34948888840 scopus 로고    scopus 로고
    • Biometrics: Easy to steal, hard to regain identity'
    • Watson, A. (2007) 'Biometrics: easy to steal, hard to regain identity', Nature, Vol. 449, 535p.
    • (2007) Nature , vol.449
    • Watson, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.