Abstract

Biometrics is a pattern recognition system that refers to the use of different physiological (face, fingerprints, etc.) and behavioral (voice, gait etc.) traits for identification and verification purposes. A biometrics-based personal authentication system has numerous advantages over traditional systems such as token-based (e.g., ID cards) or knowledge-based (e.g., password) but they are at the risk of attacks. This paper presents a literature review of attack system architecture and makes progress towards various attack points in biometric system. These attacks may compromise the template resulting in reducing the security of the system and motivates to study existing biometric template protection techniques to resist these attacks.

Highlights

  • Biometric is a science through which system can uniquely identify an individual on the basis of his physiological and behavioral traits [1]

  • Biometric systems are more convenient to use as compared with traditional authentication systems such as token based (e.g., ID cards) or knowledge based because it alleviates the need to remember long passwords and to carry tokens with itself

  • As discussed above biometric systems are vulnerable to attacks which can make use of various generic security threats to harm the integrity of any biometric system

Read more

Summary

Introduction

Biometric is a science through which system can uniquely identify an individual on the basis of his physiological (face, iris, fingerprint, hand geometry, retina etc.) and behavioral (gait, voice, signature, keystroke etc.) traits [1]. Biometric systems are more convenient to use as compared with traditional authentication systems such as token based (e.g., ID cards) or knowledge based (e.g., passwords) because it alleviates the need to remember long passwords and to carry tokens with itself. In identification mode (shown in fig.1), system carries out a one-to-many comparison to set up an individual’s identity. In verification mode (shown in fig.2), system carries out a one-to-one comparison to set up an individual’s identity. Rubal Jain and Chander Kant / Attacks on Biometric Systems: An Overview predefined security threshold it will accept the individual otherwise reject it

Biometric System
Attacks on biometric system
Architecture of attack system
Generic security threats
Techniques to resist attacks
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.