A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems

  • Yoshihiro Kojima
  • Rie Shigetomi
  • Manabu Inuma
  • Akira Otsuka
  • Hideki Imai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5707)

Abstract

We propose a matching algorithm secure against the wolf attack in one-to-one biometric authentications. Our proposed algorithm embeds a wolf-judgement function in a traditional matching algorithm. We show that our proposed algorithm is accurate and secure. Moreover we remark that our proposed algorithm is efficient in a framework proposed by Inuma, Otsuka, and Imai [1].

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Inuma, M., Otsuka, A., Imai, H.: Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. In: ICB, pp. 806–815 (2009)Google Scholar
  2. 2.
    Une, M., Otsuka, A., Imai, H.: Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems. IEICE Transactions on Information and Systems 91(5), 1380–1389 (2008)CrossRefGoogle Scholar
  3. 3.
    Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial Gummy Fingers on Fingerprint Systems. In: Proceedings of SPIE, vol. 4677, pp. 275–289 (2002)Google Scholar
  4. 4.
    Ratha, N., Connell, J., Bolle, R.: Enhancing Security and Privacy in Biometricsbased Authentication Systems. IBM systems journal 40(3), 614–634 (2001)CrossRefGoogle Scholar
  5. 5.
    Miura, N., Nagasaka, A., Miyatake, T.: Feature Extraction of Finger Vein Patterns Based on Iterative Line Tracking and Its Application to Personal Identification. Systems and Computers in Japan 35(7) (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Yoshihiro Kojima
    • 1
  • Rie Shigetomi
    • 1
    • 2
  • Manabu Inuma
    • 1
    • 2
  • Akira Otsuka
    • 1
    • 2
  • Hideki Imai
    • 1
    • 2
  1. 1.Graduate School of Science and EngineeringChuo UniversityTokyoJapan
  2. 2.Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST)TokyoJapan

Personalised recommendations