A Review on Biometrics Security Breaches and Remedies
Abstract
Keywords
Full Text:
PDFReferences
Nissan Moradoff, “Biometrics: Proliferation and constraints to emerging and new technologies”, Security Journal advances online publication, March 2009.
Emmanuel Opara, Mohammad Rob, Vance Etnyre, “Biometric and Systems Security: An Overview of End-to-End Security System”, Communications of IIMA, Vol. 6, Issue 2, pp. 53-58 2006.
Macro Faundez-zanuy, “Biometric Security Technology”, IEEE A&E Systems Magazines, Vol. 21, No. 6, pp. 15-22, June 2006.
White paper, “An Introduction to biometrics”, Motorola, pp. 1-11, Aug. 2006.
NK Ratha, JH Connell, RM Bolle, “Enhancing Security and privacy in Biometric-based authentication systems”, IBM System Journal (3)
Nalin K. Ratha, Jonathan H. Connell, Ruud M. Bolle, “Biometrics break-ins and band-aids”, Pattern Recognition Letters, Vol. 24, pp. 2105-2113, 2003.
Biometric Personal Identification in Networked Society, J.L.Wayman, “Technical Testing and evaluation of Biometric devices”, Chapter 17, Kulwer Publisher, 1999.
Bartlow Nick, Cukic Bojan, “The vulnerabilities of biometric systems- An intergrated look and old and new ideas”, Technical Report, West Virginia University, 2005.
Bartlow Nick, Cukic Bojan, “Biometric System threats and countermeasures:a risk based approach”, Biometric Consortium Conference, Sep 2005.
Anil K. Jain, Arun Ross, Sharath Pankanti, “Biometrics: A Tool for Information Security”, IEEE Trans. On Information Forensics and Security, Vol. 1, No.2, pp. 125-143, June 2006.
Ahmed Obied, “How to Attack Biometric Systems in Your Spare Time”, Non refereed paper, Nov 2009.
Sitalakshmi Venkatraman, “An adaptive framework for Biometric Systems”, IEEE International Conference on Computer Engineering and Technology, pp. 371-375, 2009.
Chris Roberts, “Biometric attack vectors and defences”, Computer and Security Journal, vol. 26, pp.14-25, 2007.
“Biometric Security Concerns”, UK Government Biometrics Working Group (BWG), V1.0, Sep 2003, www.cesg.gov.uk.
Roman V. Yampolskiy, “Mimicry attack on Strategy-Based Behavioral Biometric”, IEEE Fifth International Conference on Information Technology: New Generations, pp. 916-921, 2008.
Martin Drahansky, Dana Lodrova, “Liveness Detection for Biometric Systems Based on Papillary Lines”, IEEE International Conference on Information Security and Assurance, pp. 439-444, 2008.
M. Drahansky, “Experiments with Skin Resistance and Temperature for Liveness Detection”, IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1075-1079, 2008.
Parvathi Ambalakat, “Security of Biometric Authentication Systems”, 21st Computer Science seminar, SA1-T1, pp. 1-7, 2005.
Macros Faundez-Zanuy, “On the Vulnerability of Biometric Security Systems”, IEEE A&E Systems Magazine,pp. 3-8, June 2004.
Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K. Jain, “Biometric Cryptosystems: Issues and Challenges”, Proceeding of IEEE, Vol. 92, No. 6, pp. 948-960, June 2004.
Ann Cavoukian, Alex stoianov, “Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy”, Ph.D Research work , March 2007.
Junhui He, Shaohua Tang, Tingting Wu, “On the Security of Steganographic Techniques”, IEEE CS Congress on Image and Signal Processing, pp. 716-719, 2008.
Chander Kant, Rajender Nath, Sheetal Chaudhary, “Biometric Security using Steganography”, International Journal of Security, Vol. 2, Issue 1, pp. 1-5, 2009.
Zang Li, Zhou Ping-ping, Qian Gong-bin, Ji Zhen, “Image Watermarking with optimum Capacity”, IEEE, 5th International Conference on Visual Information Engineering, VIE2008, pp. 117-123, 2008.
Zhang Fan, Zhang Hongbin, “Capacity and Reliability of digital watermarking”, IEEE International Conference on the Business of Electronic Product Reliability and Liability, pp.162-165, 2004.
Yongjian Hu, Sam Kwong, Jiwu Huang, “An Algorithm for Removable Visible Watermarking”, IEEE Trans. On Circuits and Systems for Video Technology, Vol. 16, No.1, Jan 2006.
Ee-Chien Chang, Michael Orchard, “Geometric Properties of Watermarking Schemes”, IEEE Proceedings of International Conference on Image processing, Vol. 3, pp. 714-717, Sep 2000.
HayRan Lee, KyungHyun Rhee, “Reversible Data Embedding for Tamper-Proof Watermarks”, IEEE Proceeding of of First International Conference on Innovative Computing, Information and Control (ICICIC’06), 2006.
Siew Wen Chin, Li-Minn Ang, Kah Phooi Seng, “A New Multimodal Biometric System using Tripled chaotic Watermarking Approach”, IEEE International Symposium on Information Technology, ITSIM 2008, Vol. 1, pp. 1-8, Aug 2008.
Sviatolsav Voloshynovskiy, Shelby Pereira, Thierry Pun, “Attacks on Digital Watermarks: Classification, Estimation-Based Attacks, and Benchmarks”, IEEE Communication Magazine, pp. 118-126, Aug 2001.
Lifeng Lai, Siu-Wai Ho, H. Vincemd Poor, “Privacy – Security Tradeoffs in Biometric Security Systems”, IEEE Forty-Sixth Annual Allerton Conference, USA, pp. 268-273, 2008.
Anil K. Jain, Umut Uludag, “Hiding Biometric Data”, IEEE Trans. On Pattern analysis and Machine Intelligence, Vol. 25, No. 11, Nov 2003.
“Biometric system security – Part 2”, Biometric Technology Today, pp. 8-9, March 2003.
Ruud M. Bolle, Jonathan H. Connell, Nalin K. Ratha, “Biometrics perils and patches”, The Journal of Pattern Recognition Society, Vol. 35, pp. 2727-2738, 2002.
Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle, “ An Analysis of Minutiae Matching Streangth”, IEEE Proceedings of Third International Conference on Audio and Visual based Biometric person authentication”, pp. 223-228, 2001.
Anil K. Jain, Arun Ross, “Multibiometric Systems”, Communications of ACM, Vol. 27, No. 1, pp. 34-40, Jan 2004.
Anil K. Jain, Arun Ross, Umut Uludag, “Biometric Template Security: Challenges and Solutions”, Appeared in Proceedings of Signal Processing Conference (EUSIPCO), Antalya, Turkey, Sep 2005.
Andy Alder, “Can Images be regenerated from biometric templates?” , Biometric Conference, Sept. 22-23, 2003.
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain, “Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors”, Proceedings of 19th International Conference on Pattern Recognition, Tampa, FL, Dec 2008.
Anil K. Jain, Karthik Nandakumar, Abhishek Nagar, “Review Article- Biometric Template Security”, Hindawi Publishing Corporation, EURASIP Journal on Advances in Signal Processing, Volume 2008, article ID 579416, pp. 1-16, 2008.
Handbook of Biometrics, Andy Alder, “Biometric System Security”, Chapter 19, Springer, 2008.
Roman V. Yampolskiy, “Behavioral Biometrics: a survey and classification”, Int. J. Biometrics, Vol. 1, No. 1, 2008.
Anil K. Jain, Arun Ross, Salil Prabhakar, “An Introduction to Biometric Recognition”, Appeared in IEEE Trans. On Circuits and Systems for Video Technology: Special Issue on Image –and Video- Based Biometrics, Vol. 14, No. 1, Jan. 2004.
Arun Ross, Anil Jain, “Information fusion in biometrics”, Pattern recognition Letters, vol. 24, pp. 2115-2125, 2003.
Ricardo N. Rodrigues, Lee Luan Ling, Venu Govindaraju, “Robustness of multimodal biometric fusion methods against spoof attacks”, Science Direct Journal of Visual Languages and Computing, Vol. 20, pp. 169-179, 2009.
Aloysius George, “Multi-Modal Biometric Human Verification using LDA and DFB”, International Journal of Biometrics and Bioinformatics, Vol. 2, pp. 1-10, Issue 4.
Antonia Azzini, Stefania Marrara, “A fuzzy approach to multimodal biometric continuous authentication’, Published Online Springer Science + Business Media, Fuzzy Optim Decis Making, pp. 243-247, June 2008.
Won-gyum Kim, HeugKyu Lee, “Multimodal biometric image watermarking using two-stage integrity verification”, Signal Process journal, 2009 ( To be published ).
Oleksiy Koval, Sviatoslav Voloshynovskiy, Thierry Pun, “Privacy-Preserving Multimodal Person and Object Identification”, MM & Sec’08, United Kingdom, ACM, pp. 177-184, 2008.
Ioannis G. Damousis, Dimitrios Tzovaras, Evangelos Bekiaris, “Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept”, Hindawi Publishing Corporation, EURASIP Journal on Advances in Signal Processing, Volume 2008, article ID 265767, pp. 1-11, 2008.
Patrick G. McLean, “A Secure Pervasive Environment”, Proceedings of Australasian information security workshop Conference on ACSW frontiers 2003, Vol. 21, pp. 67-73, 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.