Security in biometric systems

11/11/2020
by   Francesc Serratosa, et al.
0

The objective of biometric systems is to provide an identification mechanism. This identification mechanism can be used to fulfil several objectives. The most common, related to providing security to a resource, is usually authentication or detection of authorized personnel and detection of unauthorized personnel. From the technical point of view, these two objectives can be included in a single point since most functionalities are achieved by making searches of people previously identified in the database of the system in question. In the first case access is given to people entered in the database and in the second case access is given to people who are not entered in the database. Although these are the two most common attacks there are also others that we will discuss in this chapter. The structure of the chapter is as follows. The first part of the chapter gives an overview of the basic types of attacks and describes the usual protection measures (Sections 1, 2 and 3). The second part of the chapter describes several attacks that can be made on systems based on fingerprinting, face recognition, and iris recognition (Sections 4 and 5). Once the attack methodologies have been described, some specific protection measures are also discussed (Sections 4 and 5). Finally, side channel attacks and their usefulness in combination with other possible attacks are described (Section 6).

READ FULL TEXT

page 21

page 22

page 27

page 28

page 29

research
02/16/2023

Introduction to Presentation Attacks in Signature Biometrics and Recent Advances

Applications based on biometric authentication have received a lot of in...
research
11/24/2021

Introduction to Presentation Attack Detection in Iris Biometrics and Recent Advances

Iris recognition technology has attracted an increasing interest in the ...
research
03/10/2022

Attack Analysis of Face Recognition Authentication Systems Using Fast Gradient Sign Method

Biometric authentication methods, representing the "something you are" s...
research
09/12/2018

Security and Privacy Enhancement for Outsourced Biometric Identification

A lot of research has been focused on secure outsourcing of biometric id...
research
03/28/2021

Face Recognition as a Method of Authentication in a Web-Based System

Online information systems currently heavily rely on the username and pa...
research
07/29/2019

Specular- and Diffuse-reflection-based Face Liveness Detection for Mobile Devices

In light of the rising demand for biometric-authentication systems, prev...
research
09/24/2020

Lic-Sec: an enhanced AppArmor Docker security profile generator

Along with the rapid development of cloud computing technology, containe...

Please sign up or login with your details

Forgot password? Click here to reset