Skip to main content

Biometric Vulnerabilities: Overview

  • Living reference work entry
  • Latest version View entry history
  • First Online:
Encyclopedia of Biometrics

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Biometric testing campaign report (addendum to part i), Technical report, International Labour Organization, Geneva, 2005, http://www.ilo.org/public/english/dialogue/sector/papers/maritime/sid-test-report2.pdf

  2. Cracked it! The Guardian, 17 Nov 2006, http://www.guardian.co.uk/idcards/story/0,,1950229,00.html

  3. B. Cukic, N. Barlow, Threats and countermeasures, in Biometrics Consortium Conference, Washington, DC, 2005

    Google Scholar 

  4. G. Doddington, W. Liggett, A. Martin, N. Przybocki, D. Reynolds, Sheep, goats, lambs and wolves: an analysis of individual differences in speaker recognition performance, in Proceedings of the International Conference on Auditory-Visual Speech Processing, Sydney, 1998

    Google Scholar 

  5. N. Ferguson, B. Schneier, Practical Cryptography. Wiley, Hoboken (2003)

    Google Scholar 

  6. Generating images from templates, Technical report, 2002, http://www.ibgweb.com/reports/public/reports/templates_images.html

  7. InterNational Committee for Information Technology Standards (INCITS), Study report on biometrics in e-authentication, technical report incits m1/06-0693. Technical report, 2006 http://www.incits.org/tc_home/m1htm/2006docs/m1060693.pdf

  8. ISO, Standing document 2, version 5 – harmonized biometric vocabulary. Technical report, 2006. Technical report ISO/IEC JTC 1/SC 37 N 1480

    Google Scholar 

  9. ISO/IEC Working Draft 30107, Information technology – anti-spoofing and liveness detection. ISO/IEC JTC 1/SC 37 Biometrics

    Google Scholar 

  10. A.K. Jain, A. Nagar, K. Nandakumar, Biometric template security. EURASIP J. Adv. Signal Process. Article ID 579416, 17pp (2008)

    Google Scholar 

  11. D. Kundur, C.-Y. Lin, B. Macq, H. Yu, Special issue on enabling security technologies for digital rights management, in Proceedings of the IEEE, vol. 92, 2004, pp. 879–882

    Google Scholar 

  12. Liveness detection in biometric systems, Technical report, 2002, http://www.ibgweb.com/reports/public/reports/liveness.html

  13. T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of artificial “gummy” fingers on fingerprint systems. 4677 (2002) Proceedings of SPIE

    Google Scholar 

  14. A.P. Moore, R.J. Ellison, R.C. Linger, Attack modeling for information security and survivability. Technical report, Carnegie Mellon University, Pittsburgh, 2001

    Google Scholar 

  15. N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)

    Article  Google Scholar 

  16. P.E. Ross, Loser: passport to nowhere. IEEE Spectr. 42, 54–55 (2005)

    Article  Google Scholar 

  17. M.B. Salter, Passports, mobility, and security: how smart can the border be? Int. Stud. Perspect. 5, 71–91 (2004)

    Article  Google Scholar 

  18. B. Schneier, Attack trees. Dr. Dobb’s J. 24, 21–29 (1999)

    Google Scholar 

  19. B. Tan, S. Schuckers, Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise. Pattern Recognit. 43(8), 2845–2857 (2010)

    Article  MATH  Google Scholar 

  20. L. Thalheim, J. Krissler, Body check: biometric access protection devices and their programs put to the test. c’t Magazine, Nov 2002, http:www.heise.de/ct/english/02/11/114/

  21. C. Tilton, Biometrics in e-authentication: threat model, in Biometrics Consortium Conference, Baltimore, 2006, http://www.biometrics.org/bc2006/presentations/Wed_Sep_20/Session_III/Biometrics_and_EAuth/20_Tilton_e-auth_threat.pdf

  22. U. Uludag, A.K. Jain, Attacks on biometric systems: a case study in fingerprints, in Proceedings of SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, 2004, pp. 622–633

    Google Scholar 

  23. S. Yoon, J. Feng, A.K. Jain, Altered fingerprints: analysis and detection. IEEE Trans. Pattern Anal. Mach. Intell. 34(3), 451–464 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andy Adler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this entry

Cite this entry

Adler, A., Schuckers, S.A.C. (2014). Biometric Vulnerabilities: Overview. In: Li, S., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-3-642-27733-7_65-3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27733-7_65-3

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Online ISBN: 978-3-642-27733-7

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Chapter history

  1. Latest

    Biometric Vulnerabilities: Overview
    Published:
    26 July 2014

    DOI: https://doi.org/10.1007/978-3-642-27733-7_65-3

  2. Original

    Biometric Vulnerabilities: Overview
    Published:
    16 May 2014

    DOI: https://doi.org/10.1007/978-3-642-27733-7_65-2