Logo PTI
Polish Information Processing Society
Logo RICE

Annals of Computer Science and Information Systems, Volume 10

Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering

To study of various security attacks against Biometric template in a generic Biometric Recognition System

,

DOI: http://dx.doi.org/10.15439/2017R57

Citation: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, Vijender Kumar Solanki, Vijay Bhasker Semwal, Rubén González Crespo, Vishwanath Bijalwan (eds). ACSIS, Vol. 10, pages 235240 ()

Full text

Abstract. Biometric recognitions system is a system which provides the reliable solution for user authentication in identity management systems. The motivation is that how we can use the effective biometric system in e-Governance service delivery with secure channel. So first we discuss the various security attacks that can be encounter during the enrollment and verification of biometric traits. We analyze various vulnerabilities of biometric system and study the various counter measures that can be present in biometric system in any way. There are many successful developments in the field of e-Authentication but the security is remain challenge in real world. This paper focus on the risks of biometric data at the time of enrollment and verification process. There are many types of attacks like finger print in biometric system by using fake fingers at the sensor could be a serious threat for unattended applications. In biometric system fingerprint matching is very big challenge to match the saved image with real time template with reduce the false match rate and false reject rate. We focus here to analyze the behavior of fingerprint verification because fingerprint verification is the very reliable personal e-Authentication mechanism.

References

  1. Raffaele Capplellin, Alessandra Lumini. Darion Maio, “Fingerprint Image Reconstruction from Standard Templates”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, No.9, pp. 1489-1503, 2007.
  2. Arun Ross, Anil Jain, “Biometric Sensor Interoperability: A Case Study in Fingerprints”, Proc. of international ECCV Workshop on Biometric Authentication (BioAW), LNCS Vol. 3087, pp 134-145, Springer Publisers, May 2004.
  3. Jain, A.K., Uludag, U., Ross, A.: Biometric template selection: a case study in fingerprints.In: Proc. of 4th Int’l Conf. on Audio- and Video-based Biometric Authentication (A VBP A). Volume LNCS 2688., Guildford, UK, Springer (2003) 335–342.
  4. Unique Identification Authority of India. Multipurpose National Identity Card. Available at http://uidai.gov.in/
  5. FaceIT SDK, L-1 Identity Solutions. Available at www.annualreports.com/HostedData/AnnualReports/PDF/id2007.pdf (Access date 14-04-2016)
  6. Anil K. Jain, karthik Nandakumar, and Abhishek Nagar, “Review article Biometric Template Security”, Hindawi Publihing Corporation, EURASIP Journal on Advances in Signal Processing, Volume 2008, Article ID 579416, 17 pages, http://dx.doi.org/10.1155/2008/579416.
  7. A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: a tool for information security”, IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125-143, 2006.
  8. Nalini K. Ratha, Shaoyun Chen, and Ani1 K. Jain. “Adaptive flow orientation based texture extraction in finger print images”. Pattern Recognition, VOL. 28, 28(11):1657-1672, November 1995.
  9. N. K. Ratha, J. H. Connell, and R. M. Bolle, “An analysis of minutiae matching strength,” in Proceedings of the 3rd International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA ’01), pp. 223–228, Halmstad, Sweden,June 2001.
  10. Shenglin Yang, Ingrid Verbauwhede, “Automatic Secure fingerprint verification system based on fuzzy vault scheme”, Proceedings in (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. v/609 - v/612 Vol. 5, http://dx.doi.org/10.1109/ICASSP.2005.1416377, 2005