Abstract
Vulnerability evaluation of various biometric systems should be conducted and its results should be available to potential users.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Jain, K.: Introduction to biometrics, in Biometrics: Personal Identification in Networked Society, The Kluwer Academic, International Series in Engineering and Computer Science, Jain, A. K., Bolle, R. and Pankanti, S. eds., Vol. 479, Chapter 1, pp. 1–41, 1999.
Matsumoto, T., Matsumoto, T., Yamada, K., and Hoshino, S.: Impact of Artificial “Gummy Fingers” on Fingerprint Systems, Optical Security and Counterfeit Deterrence Techniques IV, Rudolf L. van Renesse, editor, Proceedings of SPIE Vol. 4677, SPIE-The International Society for Optical Engineering, pp. 275–289, 2002.
Endo, Y. and Matsumoto, T.: Can we make artificial fingers that fool fingerprint systems?-Part W-, Proc. of IPSJ for Computer Security Symposium, 2002.
Matsumoto, T.: What will you do if you find a particular weakness of a security technology?, Journal of IEICE, Vol. 84, No. 3, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Matsumoto, T. (2002). Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis. In: Zheng, Y. (eds) Advances in Cryptology — ASIACRYPT 2002. ASIACRYPT 2002. Lecture Notes in Computer Science, vol 2501. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36178-2_36
Download citation
DOI: https://doi.org/10.1007/3-540-36178-2_36
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00171-3
Online ISBN: 978-3-540-36178-7
eBook Packages: Springer Book Archive