Skip to main content

Security and Liveness, Overview

  • Living reference work entry
  • First Online:
  • 188 Accesses

Definition

The security of a biometric system may be understood to be its resistance to active attacks. Such attacks may be classified as presentation attacks (spoofing), in which the appearance of the biometric sample is physically changed or replaced; biometric processing attacks, in which an understanding of the biometric algorithm is used to cause incorrect processing and decisions; software and networking vulnerabilities based on attacks against the computer and networks on which the biometric systems run; and social and presentation attacks, in which the authorities using the systems are fooled. This entry presents an overview of the techniques used for classifying and assessing these threats. Additionally, newer biometric schemes, such as cancelable biometrics and biometric encryption, that are designed to counter these security threats are reviewed.

Introduction

Security must be defined in the context of an attacker. However, biometric systems, even when not under active...

This is a preview of subscription content, log in via an institution.

References

  • N. Ferguson, B. Schneier, Practical Cryptography (Wiley, New York, 2003)

    Google Scholar 

  • B. Schneier, The uses and abuses of biometrics. Commun. ACM 42, 136 (1999)

    Article  Google Scholar 

  • D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition (Springer, Berlin, 2003)

    MATH  Google Scholar 

  • The Guardian (17 Nov. 2006) Cracked it!

    Google Scholar 

  • A. Cavoukian, Privacy and biometrics, in Proceedings of the International Conference on Privacy and Personal Data Protection, Hong Kong, 1999

    Google Scholar 

  • N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)

    Article  Google Scholar 

  • International Committee for Information Technology Standards (INCITS), Study report on biometrics in E-authentication, technical report INCITS M1/06-0693, 2006

    Google Scholar 

  • L. Thalheim, J. Krissler, Body check: biometric access protection devices and their programs put to the test, ct magazine, Nov 2002

    Google Scholar 

  • S.A.C. Schuckers, Spoofing and anti-spoofing measures. Inf. Secur. Tech. Rep. 7, 56–62 (2002)

    Article  Google Scholar 

  • International Biometric Group, Spoof, test underway of fingerprint and iris recognition systems’ resistance to spoofing (2007), http://www.biometricgroup.com/spoof/. Accessed 7 Apr 2009

  • T. Matsumoto, Gummy finger and paper iris: an update, in Workshop on Information Security Research, Fukuoka, Oct 2004

    Google Scholar 

  • International Biometric Group, Liveness detection in biometric systems, http://www.ibgweb.com/reports/public/reports/liveness.html

  • S.A.C. Schuckers, R. Derakhshani, S. Parthasardhi, L.A. Hornak, Liveness detection in biometric devices, in Electrical Engineering Handbook, 3rd edn. (CRC Press, 2006). Chapter 26, ISBN:084932274X

    Google Scholar 

  • P. Coli, G.L. Marcialis, F. Roli, Vitality detection from fingerprint images: a critical survey. Adv. Biom. 4642, 722–731 (2007). Springerlink

    Google Scholar 

  • A. Antonelli, R. Cappelli, D. Maio, D. Maltoni, Fake finger detection by skin distortion analysis. IEEE Trans. Inf. Forensics Secur. 1(3), 360–373 (2006)

    Article  Google Scholar 

  • L. Biel, O. Pettersson, L. Philipson, P. Wide, ECG analysis: a new approach in human identification. IEEE Trans. Instrum. Meas. 50, 808–812 (2001)

    Article  Google Scholar 

  • G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in Proceedings of the IEEE Symposium on the Privacy and Security, Oakland, 1998, pp. 148–157

    Google Scholar 

  • C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B. Vijaya Kumar, Biometric encryption using image processing. Proc. SPIE Int. Soc. Opt. Eng. 3314, 178–188 (1998)

    Google Scholar 

  • A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of the IEEE International Symposium on the Information Theory, Lausanne, 2002, p. 408

    Google Scholar 

  • T.C. Clancy, N. Kiyavash, D.J. Lin, Secure smartcard-based fingerprint authentication, in Proceedings of the ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, Berkeley, 2003, pp. 45–52

    Google Scholar 

  • U. Uludag, S. Pankanti, S. Prabhakar, A.K. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE 92, 948–960 (2004)

    Article  Google Scholar 

  • A. Adler, Vulnerabilities in biometric encryption systems, in Proceedings of the AVBPA, Tarrytown. LNCS, vol. 3546 (2005), pp. 1100–1109

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andy Adler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this entry

Cite this entry

Adler, A., Schuckers, S. (2014). Security and Liveness, Overview. In: Li, S., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-3-642-27733-7_62-3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27733-7_62-3

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Online ISBN: 978-3-642-27733-7

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics