[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Joshi et al., 2018 - Google Patents

Security vulnerabilities against fingerprint biometric system

Joshi et al., 2018

View PDF
Document ID
17554258605820147527
Author
Joshi M
Mazumdar B
Dey S
Publication year
Publication venue
arXiv preprint arXiv:1805.07116

External Links

Snippet

The biometric system is an automatic identification and authentication system that uses unique biological traits, such as fingerprint, face, iris, voice, retina, etc. of an individual. Of all these systems, fingerprint biometric system is the most widely used because of its low cost …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Joshi et al. Security vulnerabilities against fingerprint biometric system
Jain et al. Biometric authentication: System security and user privacy.
Natgunanathan et al. Protection of privacy in biometric data
Campisi Security and privacy in biometrics: towards a holistic approach
Kaur et al. Biometric template protection using cancelable biometrics and visual cryptography techniques
Joshi et al. A comprehensive security analysis of match-in-database fingerprint biometric system
Singh et al. A taxonomy of biometric system vulnerabilities and defences
Rajeswari et al. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing
Uludag Secure biometric systems
Matyáš et al. Security of biometric authentication systems
Maltoni et al. Securing fingerprint systems
Uzun et al. Cryptographic key derivation from biometric inferences for remote authentication
Gobi et al. A secured public key cryptosystem for biometric encryption
Takahashi et al. Parameter management schemes for cancelable biometrics
Saraswathi et al. Retinal biometrics based authentication and key exchange system
Ratha Privacy protection in high security biometrics applications
Sapkal et al. Biometric template protection with fuzzy vault and fuzzy commitment
Krivokuca Fingerprint template protection using compact minutiae patterns
Bayly et al. Fractional biometrics: safeguarding privacy in biometric applications
Nair et al. TOWARDS A ROBUST FINGERPRINT AUTHENTICATION SYSTEM PROTOCOL.
CN112187477A (en) Iris privacy authentication method
Cimato et al. Biometrics and privacy
Sarkar et al. A Review on Security Attacks in Biometric Authentication Systems
Sukaitis Building a path towards responsible use of Biometrics
Failla Privacy-preserving processing of biometric templates by homomorphic encryption