[PDF][PDF] Toward reliable user authentication through biometrics

V Matyas, Z Riha - IEEE Security & Privacy, 2003 - Citeseer
Acquiring samples. During a user's first contact with the biometric system, the system collects
a biometric sample using an input device. The quality of the first sample is crucial …

Combining crypto with biometrics effectively

F Hao, R Anderson, J Daugman - IEEE transactions on …, 2006 - ieeexplore.ieee.org
We propose the first practical and secure way to integrate the iris biometric into
cryptographic applications. A repeatable binary string, which we call a biometric key, is …

Standardization of biometric template protection

S Rane - IEEE MultiMedia, 2014 - ieeexplore.ieee.org
Whether it is providing fingerprints at airport immigration desks, tagging friends on social
networking sites, or logging into a smartphone, biometrics provide a fast, convenient, and …

Attacks on biometric systems: a case study in fingerprints

U Uludag, AK Jain - Security, steganography, and …, 2004 - spiedigitallibrary.org
In spite of numerous advantages of biometrics-based personal authentication systems over
traditional security systems based on token or knowledge, they are vulnerable to attacks that …

Biometric security from an information-theoretical perspective

T Ignatenko, FMJ Willems - Foundations and Trends® in …, 2012 - nowpublishers.com
In this review, biometric systems are studied from an information theoretical point of view. In
the first part biometric authentication systems are studied. The objective of these systems is …

Secure remote authentication using biometric data

X Boyen, Y Dodis, J Katz, R Ostrovsky… - Advances in Cryptology …, 2005 - Springer
Biometric data offer a potential source of high-entropy, secret information that can be used in
cryptographic protocols provided two issues are addressed:(1) biometric data are not …

Privacy-aware biometrics: Design and implementation of a multimodal verification system

S Cimato, M Gamassi, V Piuri, R Sassi… - 2008 Annual computer …, 2008 - ieeexplore.ieee.org
A serious concern in the design and use of biometric authentication systems is the privacy
protection of the information derived from human biometric traits, especially since such traits …

Privacy–security trade-offs in biometric security systems—Part II: Multiple use case

L Lai, SW Ho, HV Poor - IEEE Transactions on information …, 2010 - ieeexplore.ieee.org
This is the second part of a two-part paper on the information theoretic study of biometric
security systems. In this paper, the performance of reusable biometric security systems, in …

Biometric attack vectors and defences

C Roberts - computers & security, 2007 - Elsevier
Much has been reported on attempts to fool biometric sensors with false fingerprints, facial
overlays and a myriad of other spoofing approaches. Other attack vectors on biometric …

Biometric template protection using universal background models: An application to online signature

EA Rua, E Maiorana, JLA Castro… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Data security and privacy are crucial issues to be addressed for assuring a successful
deployment of biometrics-based recognition systems in real life applications. In this paper, a …