Biometric perils and patches

被引:210
作者
Bolle, RM [1 ]
Connell, JH [1 ]
Ratha, NK [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Exploratory Comp Vis Grp, Yorktown Hts, NY 10598 USA
关键词
secure authentication; threat model; biometrics; fingerprint; WSQ compression; data hiding; cancellable biometrics;
D O I
10.1016/S0031-3203(01)00247-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometrics authentication offers many advantages over conventional authentication systems that rely on possessions or special knowledge. With conventional technology, often the mere possession of an employee ID card is proof of ID, while a password potentially can be used by large groups of colleagues for long times without change. The fact that biometrics authentication is non-repudiable (hard to refute) and, yet, convenient, is among its most important advantages. Biometrics systems, however, suffer from some inherent biometrics-specific security threats. These threats are mainly related to the use of digital signals and the need for additional input devices, though we also discuss brute-force attacks of biometrics systems. There are also problems common to any pattern recognition system. These include "wolves" and "lambs", and a new group we call "chameleons". An additional issue with the use of biometrics is the invasion of privacy because the user has to enroll with an image of a body part. We discuss these issues and suggest some methods for mitigating their impact. (C) 2002 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.
引用
收藏
页码:2727 / 2738
页数:12
相关论文
共 16 条
  • [1] BOLLE RM, 2001, P 1 INT WORKSH PATT, P2
  • [2] HIGH CONFIDENCE VISUAL RECOGNITION OF PERSONS BY A TEST OF STATISTICAL INDEPENDENCE
    DAUGMAN, JG
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1993, 15 (11) : 1148 - 1161
  • [3] Doddington G., 1998, P 5 INT C SPOK LANG, P1351
  • [4] Dorai C, 2000, PROC CVPR IEEE, P320, DOI 10.1109/CVPR.2000.854824
  • [5] Biometric identification
    Jain, A
    Hong, L
    Pankanti, S
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (02) : 90 - 98
  • [6] An identity-authentication system using fingerprints
    Jain, AK
    Hong, L
    Pankanti, S
    Bolle, R
    [J]. PROCEEDINGS OF THE IEEE, 1997, 85 (09) : 1365 - 1388
  • [7] MAIO D, 2000, FVC2000 U BOL
  • [8] VITAL SIGNS OF IDENTITY
    MILLER, B
    [J]. IEEE SPECTRUM, 1994, 31 (02) : 22 - 30
  • [9] OSTERBURG JW, 1977, J AM STAT ASSOC, V72, P772
  • [10] Real-time matching system for large fingerprint databases
    Ratha, NK
    Karu, K
    Chen, SY
    Jain, AK
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1996, 18 (08) : 799 - 813