Skip to main content
Erschienen in:
Buchtitelbild

2014 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Nesli Erdoğmuş, Sébastien Marcel

Erschienen in: Handbook of Biometric Anti-Spoofing

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Excerpt

In a well-designed system, biometric security ensures that only authorized persons can access to the protected facility or information, because it assesses a person’s most unique physical and behavioural features that can be practically sensed by devices and interpreted by computers. It is also convenient as the users need to carry or remember identification data is eliminated. Mainly driven by the biometrics passports that are currently in use in many countries, more and more biometric-enabled applications are used in daily life. However, despite a stimulating and rapidly growing market, a crucial security issue is still to be considered by concerning parties: vulnerability to attacks, in other words, attempts to subvert and circumvent the system. …

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lyons M (1994) Napoleon Bonaparte and the legacy of the French Revolution. Macmillan, London Lyons M (1994) Napoleon Bonaparte and the legacy of the French Revolution. Macmillan, London
4.
Zurück zum Zitat Paullin CO, Wright JK (1932) Atlas of the historical geography of the united states. Carnegie Institution of Washington, Washington Paullin CO, Wright JK (1932) Atlas of the historical geography of the united states. Carnegie Institution of Washington, Washington
5.
Zurück zum Zitat Herley C (2009) So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Workshop on new security paradigms workshop, ACM pp 133–144 Herley C (2009) So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Workshop on new security paradigms workshop, ACM pp 133–144
6.
Zurück zum Zitat Information security survey (2003). In: Infosecurity Europe Information security survey (2003). In: Infosecurity Europe
7.
Zurück zum Zitat Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. Audio-and video-based biometric person authentication. Springer, Berlin Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. Audio-and video-based biometric person authentication. Springer, Berlin
8.
Zurück zum Zitat Jain AK, Ross AA (2011) Security of biometric systems. Introduction to biometrics. Springer, Berlin, pp 259–306 Jain AK, Ross AA (2011) Security of biometric systems. Introduction to biometrics. Springer, Berlin, pp 259–306
9.
Zurück zum Zitat Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002) Impact of artificial gummy fingers on fingerprint systems. In: Electronic imaging 2002, international society for optics and photonics, pp 275–289 Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002) Impact of artificial gummy fingers on fingerprint systems. In: Electronic imaging 2002, international society for optics and photonics, pp 275–289
10.
Zurück zum Zitat Duc NM, Minh BQ (2009) Your face is not your password face authentication bypassing lenovo-asus-toshiba. Black Hat Briefings Duc NM, Minh BQ (2009) Your face is not your password face authentication bypassing lenovo-asus-toshiba. Black Hat Briefings
15.
Zurück zum Zitat Huang X, Ti C, zhen Hou Q, Tokuta A, Yang R (2013) An experimental study of pupil constriction for liveness detection. In: IEEE workshop on applications of computer vision (WACV), pp 252–258. doi:10.1109/WACV.2013.6475026 Huang X, Ti C, zhen Hou Q, Tokuta A, Yang R (2013) An experimental study of pupil constriction for liveness detection. In: IEEE workshop on applications of computer vision (WACV), pp 252–258. doi:10.​1109/​WACV.​2013.​6475026
16.
Zurück zum Zitat Rattani A, Poh N, Ross A (2013) A bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. In: International workshop on information forensics and security (WIFS), IEEE. pp 37–42 Rattani A, Poh N, Ross A (2013) A bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. In: International workshop on information forensics and security (WIFS), IEEE. pp 37–42
Metadaten
Titel
Introduction
verfasst von
Nesli Erdoğmuş
Sébastien Marcel
Copyright-Jahr
2014
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-6524-8_1

Neuer Inhalt