Definition
The security of a biometric system may be understood to be its resistance to active attacks. Such attacks may be classified as presentation attacks (spoofing), in which the appearance of the biometric sample is physically changed or replaced; biometric processing attacks, in which an understanding of the biometric algorithm is used to cause incorrect processing and decisions; software and networking vulnerabilities based on attacks against the computer and networks on which the biometric systems run; and social and presentation attacks, in which the authorities using the systems are fooled. This entry presents an overview of the techniques used for classifying and assessing these threats. Additionally, newer biometric schemes, such as cancelable biometrics and biometric encryption, that are designed to counter these security threats are reviewed.
Introduction
Security must be defined in the context of an attacker. However, biometric systems, even when not under active...
This is a preview of subscription content, log in via an institution.
References
N. Ferguson, B. Schneier, Practical Cryptography (Wiley, New York, 2003)
B. Schneier, The uses and abuses of biometrics. Commun. ACM 42, 136 (1999)
D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition (Springer, Berlin, 2003)
The Guardian (17 Nov. 2006) Cracked it!
A. Cavoukian, Privacy and biometrics, in Proceedings of the International Conference on Privacy and Personal Data Protection, Hong Kong, 1999
N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
International Committee for Information Technology Standards (INCITS), Study report on biometrics in E-authentication, technical report INCITS M1/06-0693, 2006
L. Thalheim, J. Krissler, Body check: biometric access protection devices and their programs put to the test, ct magazine, Nov 2002
S.A.C. Schuckers, Spoofing and anti-spoofing measures. Inf. Secur. Tech. Rep. 7, 56–62 (2002)
International Biometric Group, Spoof, test underway of fingerprint and iris recognition systems’ resistance to spoofing (2007), http://www.biometricgroup.com/spoof/. Accessed 7 Apr 2009
T. Matsumoto, Gummy finger and paper iris: an update, in Workshop on Information Security Research, Fukuoka, Oct 2004
International Biometric Group, Liveness detection in biometric systems, http://www.ibgweb.com/reports/public/reports/liveness.html
S.A.C. Schuckers, R. Derakhshani, S. Parthasardhi, L.A. Hornak, Liveness detection in biometric devices, in Electrical Engineering Handbook, 3rd edn. (CRC Press, 2006). Chapter 26, ISBN:084932274X
P. Coli, G.L. Marcialis, F. Roli, Vitality detection from fingerprint images: a critical survey. Adv. Biom. 4642, 722–731 (2007). Springerlink
A. Antonelli, R. Cappelli, D. Maio, D. Maltoni, Fake finger detection by skin distortion analysis. IEEE Trans. Inf. Forensics Secur. 1(3), 360–373 (2006)
L. Biel, O. Pettersson, L. Philipson, P. Wide, ECG analysis: a new approach in human identification. IEEE Trans. Instrum. Meas. 50, 808–812 (2001)
G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in Proceedings of the IEEE Symposium on the Privacy and Security, Oakland, 1998, pp. 148–157
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B. Vijaya Kumar, Biometric encryption using image processing. Proc. SPIE Int. Soc. Opt. Eng. 3314, 178–188 (1998)
A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of the IEEE International Symposium on the Information Theory, Lausanne, 2002, p. 408
T.C. Clancy, N. Kiyavash, D.J. Lin, Secure smartcard-based fingerprint authentication, in Proceedings of the ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, Berkeley, 2003, pp. 45–52
U. Uludag, S. Pankanti, S. Prabhakar, A.K. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE 92, 948–960 (2004)
A. Adler, Vulnerabilities in biometric encryption systems, in Proceedings of the AVBPA, Tarrytown. LNCS, vol. 3546 (2005), pp. 1100–1109
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this entry
Cite this entry
Adler, A., Schuckers, S. (2014). Security and Liveness, Overview. In: Li, S., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-3-642-27733-7_62-3
Download citation
DOI: https://doi.org/10.1007/978-3-642-27733-7_62-3
Received:
Accepted:
Published:
Publisher Name: Springer, Boston, MA
Online ISBN: 978-3-642-27733-7
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering