Toli et al., 2015 - Google Patents
Provoking security: Spoofing attacks against crypto-biometric systemsToli et al., 2015
View PDF- Document ID
- 3938108679916804821
- Author
- Toli C
- Preneel B
- Publication year
- Publication venue
- 2015 World Congress on Internet Security (WorldCIS)
External Links
Snippet
Over the past decade, the trustworthiness of biometrics during authentication, and mostly, verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. In terms of spoofing, a non-colluding honest entity tries to fake somebody …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dasgupta et al. | Advances in user authentication | |
Jain | Biometric recognition: how do I know who you are? | |
Dinca et al. | The fall of one, the rise of many: a survey on multi-biometric fusion methods | |
Uludag et al. | Attacks on biometric systems: a case study in fingerprints | |
Kaur et al. | Biometric template protection using cancelable biometrics and visual cryptography techniques | |
Ahmad et al. | Technical issues and challenges of biometric applications as access control tools of information security | |
Matyas Jr et al. | A biometric standard for information management and security | |
Xiao | Security issues in biometric authentication | |
Singh et al. | A taxonomy of biometric system vulnerabilities and defences | |
Matyáš et al. | Security of biometric authentication systems | |
Maltoni et al. | Securing fingerprint systems | |
Habibu et al. | Assessment of vulnerabilities of the biometric template protection mechanism | |
Toli et al. | Provoking security: Spoofing attacks against crypto-biometric systems | |
Ratha | Privacy protection in high security biometrics applications | |
Ashish et al. | Biometric Temp | |
Oluwadamilola et al. | An improved authentication system using hybrid of biometrics and cryptography | |
Toli | Secure and Privacy-Preserving Biometric Systems | |
Choudhry et al. | Security and privacy issues in ai-based biometric systems | |
Toli et al. | A Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks | |
Cimato et al. | Biometrics and privacy | |
Nabil et al. | Threats models on biometri systems: A comparative study | |
Emmanuel et al. | Vulnerability of Biometric Authentication System | |
Jain et al. | Signal processing for biometric systems [DSP Forum] | |
Furnell | Biometric Technology and User Identity | |
Menakadevi et al. | Biometric System Attacks-A Case Study |