Weitere Kapitel dieses Buchs durch Wischen aufrufen
Authenticating the identity of users is a critical issue in information security. Biometrics is known for recognizing users based on their physiological or behavioral traits as identifiers and these cannot be easily stolen unlike passwords or ID cards. Biometrics could be employed as the primary means for authentication, called user identification, as well as a complementary (secondary) method for authentication, known as user verification. Biometric traits that cannot be easily forged and are supposedly unique for each user can form the basis of techniques for user identification. Biometric traits need not be unique for each user, but, can be used to validate whether a user is whom he/she claims to be form the basis for user verification techniques. The first half of the chapter describes several biometric techniques used for identification and verification and compares them with respect to different operating parameters. In addition, the different components (constituent blocks) of a biometric system and the performance metrics used to analyze the effectiveness of biometric systems are also discussed. The second half of the chapter focuses on the security aspects of biometric systems, especially spoofing attacks and a solution to enhance the security and effectiveness through multi-biometric systems.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Chandra Murty, P. S. R., Sreenivasa Reddy, E., & Ramesh Babu, I. (2009). Iris recognition system using fractal dimensions of Haar patterns. International Journal of Signal Processing, Image Processing and Pattern Recognition, 2(3), 75–84.
Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143. CrossRef
Sabena, F., Dehghantanha, A., & Seddon, A. P. (2010). A review of vulnerabilities in identity management using biometrics. In Proceedings of the 2nd international conference on future networks (pp. 42–49). Sanya, Hainan, China.
Feng, J., & Jain, A. K. (2009). FM model based fingerprint reconstruction from minutiae template. In Proceedings of the 3rd international conference on advances in biometrics (pp. 544–553). Alghero, Italy.
Li, S. Z., & Jain, A. K. (2015). Encyclopedia of biometrics (2nd ed.). New York: Springer. CrossRef
Cao, K., & Jain, A. K. (2015). Learning fingerprint reconstruction: From minutiae to image. IEEE Transactions on Information Forensics and Security, 10(1), 104–117. CrossRef
Solanke, S. B., & Deshmukh, R. R. (2016). Biometrics: Iris recognition system: A study of promising approaches for secured authentication. In Proceedings of the 3rd international conference on computing for sustainable global development (pp. 811–814). New Delhi, India.
Al-Khazzar, A., & Savage, N. (2011). Biometric identification using user interactions with virtual worlds. In Proceedings of the 11th international conference on trust, security and privacy in computing and communications (pp. 517–524). Changsha, China.
Zuo, J., & Schmid, N. A. (2013). Adaptive quality-based performance prediction and boosting for iris authentication: Methodology and its illustration. IEEE Transactions on Information Forensics and Security, 8(6), 1051–1060. CrossRef
Chen, W.-K., Lee, J.-C., Han, W.-Y., Shih, C.-K., & Chang, K.-C. (2013). Iris recognition based on bi-dimensional empirical model decomposition and fractal dimension. Information Sciences, 221, 439–451. CrossRef
Singh, Y. N., & Singh, S. K. (2013). A taxonomy of biometric system vulnerabilities and defenses. International Journal of Biometrics, 5(2), 137–159. CrossRef
Kostyuk, N., Cole, P., Meghanathan, N., Isokpehi, R., & Cohly, H. (2011). Gas discharge visualization: An imaging and modeling tool for medical biometrics. International Journal of Biomedical Imaging, 2011, 196460. 7 pages. CrossRef
Yampolskiy, R. V. (2008). Mimicry attack on strategy-based behavioral biometric. In Proceedings of the 5th international conference on information technology: New generations (pp. 916–921). Las Vegas, NV, USA.
Akrivopoulou, C. M., & Garipidis, N. (2013). Digital democracy and the impact of technology on governance and politics: New globalized practices. Hershey, PA: IGI-Global. CrossRef
- Biometric Systems for User Authentication
- Chapter 18