Advertisement

Thwarting Attacks

  • Ruud M. Bolle
  • Jonathan H. Connell
  • Sharath Pankanti
  • Nalini K. Ratha
  • Andrew W. Senior
Chapter
Part of the Springer Professional Computing book series (SPC)

Abstract

Automated biometric authentication systems help to alleviate the problems associated with existing methods of user authentication. Biometrics can improve convenience or security, or ideally both. However, security weak points will exist or will be introduced in any biometric installation, unintended by the designers of the system. These weak points will be discovered during operation of a system when the system is attacked, and the system will be attacked most successfully at the security weak points.

Keywords

Authentication Protocol Replay Attack Impersonation Attack Authentication System Biometric System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2004

Authors and Affiliations

  • Ruud M. Bolle
    • 1
  • Jonathan H. Connell
    • 1
  • Sharath Pankanti
    • 1
  • Nalini K. Ratha
    • 1
  • Andrew W. Senior
    • 1
  1. 1.IBM T.J. Watson Research CenterHawthorneUSA

Personalised recommendations