Joshi et al., 2018 - Google Patents
Security vulnerabilities against fingerprint biometric systemJoshi et al., 2018
View PDF- Document ID
- 17554258605820147527
- Author
- Joshi M
- Mazumdar B
- Dey S
- Publication year
- Publication venue
- arXiv preprint arXiv:1805.07116
External Links
Snippet
The biometric system is an automatic identification and authentication system that uses unique biological traits, such as fingerprint, face, iris, voice, retina, etc. of an individual. Of all these systems, fingerprint biometric system is the most widely used because of its low cost …
- 210000000554 Iris 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
Jain et al. | Biometric authentication: System security and user privacy. | |
Natgunanathan et al. | Protection of privacy in biometric data | |
Campisi | Security and privacy in biometrics: towards a holistic approach | |
Kaur et al. | Biometric template protection using cancelable biometrics and visual cryptography techniques | |
Joshi et al. | A comprehensive security analysis of match-in-database fingerprint biometric system | |
Singh et al. | A taxonomy of biometric system vulnerabilities and defences | |
Rajeswari et al. | Multi-fingerprint unimodel-based biometric authentication supporting cloud computing | |
Uludag | Secure biometric systems | |
Matyáš et al. | Security of biometric authentication systems | |
Maltoni et al. | Securing fingerprint systems | |
Uzun et al. | Cryptographic key derivation from biometric inferences for remote authentication | |
Gobi et al. | A secured public key cryptosystem for biometric encryption | |
Takahashi et al. | Parameter management schemes for cancelable biometrics | |
Saraswathi et al. | Retinal biometrics based authentication and key exchange system | |
Ratha | Privacy protection in high security biometrics applications | |
Sapkal et al. | Biometric template protection with fuzzy vault and fuzzy commitment | |
Krivokuca | Fingerprint template protection using compact minutiae patterns | |
Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications | |
Nair et al. | TOWARDS A ROBUST FINGERPRINT AUTHENTICATION SYSTEM PROTOCOL. | |
CN112187477A (en) | Iris privacy authentication method | |
Cimato et al. | Biometrics and privacy | |
Sarkar et al. | A Review on Security Attacks in Biometric Authentication Systems | |
Sukaitis | Building a path towards responsible use of Biometrics | |
Failla | Privacy-preserving processing of biometric templates by homomorphic encryption |