References
Biometric testing campaign report (addendum to part i), Technical report, International Labour Organization, Geneva, 2005, http://www.ilo.org/public/english/dialogue/sector/papers/maritime/sid-test-report2.pdf
Cracked it! The Guardian, 17 Nov 2006, http://www.guardian.co.uk/idcards/story/0,,1950229,00.html
B. Cukic, N. Barlow, Threats and countermeasures, in Biometrics Consortium Conference, Washington, DC, 2005
G. Doddington, W. Liggett, A. Martin, N. Przybocki, D. Reynolds, Sheep, goats, lambs and wolves: an analysis of individual differences in speaker recognition performance, in Proceedings of the International Conference on Auditory-Visual Speech Processing, Sydney, 1998
N. Ferguson, B. Schneier, Practical Cryptography. Wiley, Hoboken (2003)
Generating images from templates, Technical report, 2002, http://www.ibgweb.com/reports/public/reports/templates_images.html
InterNational Committee for Information Technology Standards (INCITS), Study report on biometrics in e-authentication, technical report incits m1/06-0693. Technical report, 2006 http://www.incits.org/tc_home/m1htm/2006docs/m1060693.pdf
ISO, Standing document 2, version 5 – harmonized biometric vocabulary. Technical report, 2006. Technical report ISO/IEC JTC 1/SC 37 N 1480
ISO/IEC Working Draft 30107, Information technology – anti-spoofing and liveness detection. ISO/IEC JTC 1/SC 37 Biometrics
A.K. Jain, A. Nagar, K. Nandakumar, Biometric template security. EURASIP J. Adv. Signal Process. Article ID 579416, 17pp (2008)
D. Kundur, C.-Y. Lin, B. Macq, H. Yu, Special issue on enabling security technologies for digital rights management, in Proceedings of the IEEE, vol. 92, 2004, pp. 879–882
Liveness detection in biometric systems, Technical report, 2002, http://www.ibgweb.com/reports/public/reports/liveness.html
T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of artificial “gummy” fingers on fingerprint systems. 4677 (2002) Proceedings of SPIE
A.P. Moore, R.J. Ellison, R.C. Linger, Attack modeling for information security and survivability. Technical report, Carnegie Mellon University, Pittsburgh, 2001
N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
P.E. Ross, Loser: passport to nowhere. IEEE Spectr. 42, 54–55 (2005)
M.B. Salter, Passports, mobility, and security: how smart can the border be? Int. Stud. Perspect. 5, 71–91 (2004)
B. Schneier, Attack trees. Dr. Dobb’s J. 24, 21–29 (1999)
B. Tan, S. Schuckers, Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise. Pattern Recognit. 43(8), 2845–2857 (2010)
L. Thalheim, J. Krissler, Body check: biometric access protection devices and their programs put to the test. c’t Magazine, Nov 2002, http:www.heise.de/ct/english/02/11/114/
C. Tilton, Biometrics in e-authentication: threat model, in Biometrics Consortium Conference, Baltimore, 2006, http://www.biometrics.org/bc2006/presentations/Wed_Sep_20/Session_III/Biometrics_and_EAuth/20_Tilton_e-auth_threat.pdf
U. Uludag, A.K. Jain, Attacks on biometric systems: a case study in fingerprints, in Proceedings of SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, 2004, pp. 622–633
S. Yoon, J. Feng, A.K. Jain, Altered fingerprints: analysis and detection. IEEE Trans. Pattern Anal. Mach. Intell. 34(3), 451–464 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this entry
Cite this entry
Adler, A., Schuckers, S.A.C. (2014). Biometric Vulnerabilities: Overview. In: Li, S., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-3-642-27733-7_65-3
Download citation
DOI: https://doi.org/10.1007/978-3-642-27733-7_65-3
Received:
Accepted:
Published:
Publisher Name: Springer, Boston, MA
Online ISBN: 978-3-642-27733-7
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering
Publish with us
Chapter history
-
Latest
Biometric Vulnerabilities: Overview- Published:
- 26 July 2014
DOI: https://doi.org/10.1007/978-3-642-27733-7_65-3
-
Original
Biometric Vulnerabilities: Overview- Published:
- 16 May 2014
DOI: https://doi.org/10.1007/978-3-642-27733-7_65-2