Joshi et al., 2020 - Google Patents
A comprehensive security analysis of match-in-database fingerprint biometric systemJoshi et al., 2020
- Document ID
- 5449782353935811883
- Author
- Joshi M
- Mazumdar B
- Dey S
- Publication year
- Publication venue
- Pattern Recognition Letters
External Links
Snippet
The match-in-database fingerprint biometric system has emerged as the most widely used human identification and authentication method in public and private sectors due to its high efficiency, low-cost, and ease of use. This paper provides an exhaustive insight into the …
- 238000004458 analytical method 0 title description 26
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Joshi et al. | A comprehensive security analysis of match-in-database fingerprint biometric system | |
Jain et al. | Biometric authentication: System security and user privacy. | |
Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
Jain et al. | Biometrics: a tool for information security | |
Uludag et al. | Attacks on biometric systems: a case study in fingerprints | |
US20100174914A1 (en) | System and method for traceless biometric identification with user selection | |
Matyas Jr et al. | A biometric standard for information management and security | |
AU2007264675A1 (en) | System and method for traceless biometric identification | |
Singh et al. | A taxonomy of biometric system vulnerabilities and defences | |
Rajeswari et al. | Multi-fingerprint unimodel-based biometric authentication supporting cloud computing | |
Maltoni et al. | Securing fingerprint systems | |
Matyáš et al. | Security of biometric authentication systems | |
Uludag | Secure biometric systems | |
Sabena et al. | A review of vulnerabilities in identity management using biometrics | |
Ratha | Privacy protection in high security biometrics applications | |
Sabater | Biometrics as password alternative | |
Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications | |
Zibran | Biometric authentication: The security issues | |
Emmanuel et al. | Vulnerability of Biometric Authentication System | |
Sukaitis | Building a path towards responsible use of Biometrics | |
Sondrol | Possible Attacks on Match-In-Database Fingerprint Authentication | |
Jain et al. | Security of biometric systems | |
Yliana et al. | Vulnerability of Biometric Protection | |
Habibu | Development of secured algorithm to enhance the privacy and security template of biometric technology | |
Omotosho | An Efficient Biometric Template Transformation Protection Technique Using Residue Number System |