Abstract
Biometrics is a pattern recognition system that refers to the use of different physiological (face, fingerprints, etc.) and behavioral (voice, gait etc.) traits for identification and verification purposes. A biometrics-based personal authentication system has numerous advantages over traditional systems such as token-based (e.g., ID cards) or knowledge-based (e.g., password) but they are at the risk of attacks. This paper presents a literature review of attack system architecture and makes progress towards various attack points in biometric system. These attacks may compromise the template resulting in reducing the security of the system and motivates to study existing biometric template protection techniques to resist these attacks.
Highlights
Biometric is a science through which system can uniquely identify an individual on the basis of his physiological and behavioral traits [1]
Biometric systems are more convenient to use as compared with traditional authentication systems such as token based (e.g., ID cards) or knowledge based because it alleviates the need to remember long passwords and to carry tokens with itself
As discussed above biometric systems are vulnerable to attacks which can make use of various generic security threats to harm the integrity of any biometric system
Summary
Biometric is a science through which system can uniquely identify an individual on the basis of his physiological (face, iris, fingerprint, hand geometry, retina etc.) and behavioral (gait, voice, signature, keystroke etc.) traits [1]. Biometric systems are more convenient to use as compared with traditional authentication systems such as token based (e.g., ID cards) or knowledge based (e.g., passwords) because it alleviates the need to remember long passwords and to carry tokens with itself. In identification mode (shown in fig.1), system carries out a one-to-many comparison to set up an individual’s identity. In verification mode (shown in fig.2), system carries out a one-to-one comparison to set up an individual’s identity. Rubal Jain and Chander Kant / Attacks on Biometric Systems: An Overview predefined security threshold it will accept the individual otherwise reject it
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advances in Scientific Research
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.