Publication detail

Vulnerabilities of Biometric Systems

DRAHANSKÝ, M. KANICH, O.

Original Title

Vulnerabilities of Biometric Systems

English Title

Vulnerabilities of Biometric Systems

Type

conference paper

Language

en

Original Abstract

This article is focused on three vulnerabilities of biometric systems at a sensor level, presented on an example of fingerprint recognition. The first part is oriented on human diseases influencing the quality (and generally possibility) of acquired fingerprint. The second part introduces various other factors having an influence to the process of fingerprint acquisition. The last part is devoted to production of finger(print) fakes and herewith attacking the biometric systems in a spoof-use-way.

English abstract

This article is focused on three vulnerabilities of biometric systems at a sensor level, presented on an example of fingerprint recognition. The first part is oriented on human diseases influencing the quality (and generally possibility) of acquired fingerprint. The second part introduces various other factors having an influence to the process of fingerprint acquisition. The last part is devoted to production of finger(print) fakes and herewith attacking the biometric systems in a spoof-use-way.

Keywords

biometrics, vulnerability, disease, influencing factor, spoof

RIV year

2015

Released

20.05.2015

Publisher

University of Defence in Brno

Location

Brno

ISBN

978-80-7231-997-8

Book

Security and Protection of Information 2015

Edition

NEUVEDEN

Edition number

NEUVEDEN

Pages from

53

Pages to

60

Pages count

8

Documents

BibTex


@inproceedings{BUT119841,
  author="Martin {Drahanský} and Ondřej {Kanich}",
  title="Vulnerabilities of Biometric Systems",
  annote="This article is focused on three vulnerabilities of biometric systems at a sensor
level, presented on an example of fingerprint recognition. The first part is
oriented on human diseases influencing the quality (and generally possibility) of
acquired fingerprint. The second part introduces various other factors having an
influence to the process of fingerprint acquisition. The last part is devoted to
production of finger(print) fakes and herewith attacking the biometric systems in
a spoof-use-way.",
  address="University of Defence in Brno",
  booktitle="Security and Protection of Information 2015",
  chapter="119841",
  edition="NEUVEDEN",
  howpublished="print",
  institution="University of Defence in Brno",
  year="2015",
  month="may",
  pages="53--60",
  publisher="University of Defence in Brno",
  type="conference paper"
}