
▶ Biometric System Design
▶ Biometrics and Security, Standardization
▶ Biometric Vulnerabilities, Overview
▶ Cancelable Biometrics
▶ Fraud reduction
▶ Liveness Detection: Face
▶ Liveness Detection: Fingerprint
▶ Liveness Detection: Iris
▶ Liveness Detection: Voice
▶ User Interface, System Design
▶ Zero-effort Forgery Test
References
1. Ferguson, N., Schneier, B.: Practical Cryptography. John Wiley &
Sons, NJ, USA (2003)
2. Schneier, B.: The Uses and Abuses of Biometrics. Communica-
tions of the ACM vol. 42, pp. 136 (1999)
3. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of
Fingerprint Recognition. Springer, Berlin (2003)
4. The Guardian (17 Nov. 2006) Cracked it!
5. Cavoukian, A.: Privacy and Biometrics, In Proceedings of
the Intertnational Conference on Privacy and Personal Data
Protection, Hong Kong, China (1999)
6. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security
and privacy in biometrics-based authentication systems. IBM
Syst. J. 40, 614–634 (2001)
7. International Committee for Information Technology Standards
(INCITS) Study Report on Biometrics in E-Authentication,
Technical Report INCITS M1/06-0693 (2006)
8. Thalheim, L., Krissler, J.: Body Check: Biometric Access Protec-
tion Devices and their Programs Put to the Test, ct magazine,
November (2002)
9. Schuckers, S.A.C.: Spoofing and anti-spoofing measures, Infor-
mation Security Technical Report, vol. 7, pp. 56–62 (2002)
10. International Biometric Group, (2007) Spoof, Test underway of
fingerprint and iris recognition systems’ resistance to spoofing
http://www.biometricgroup.com/spoof/ 2007. Accessed 7 April,
2009
11. Matsumoto, T.: Gummy Finger and Paper Iris: An Update,
Workshop Inform Security Research, Fukuoka, Japan, October
(2004)
12. International Biometric Group, Liveness Detection in Bio-
metric Systems, http://www.ibgweb.com/reports/public/reports/
liveness.html
13. Schuckers, S.A.C., Derakhshani, R., Parthasardhi, S., Hornak, L.A.,
(2006) Liveness Detection in Biometric Devices, in Electrical
Engineering Handbook, 3rd edition, CRC Press, Chapter 26,
ISBN: 084932274X
14. Coli, P., Marcialis, G.L., Roli, F.: Vitality Detection from Finger-
print Images: A Critical Survey, Advances in Biometrics, Spring-
erlink, vol. 4642, pp. 722–731 (2007)
15. Antonelli, A., Cappelli, R., Maio, D., Maltoni, D.: Fake Finger
Detection by Skin Distortion Analysis. IEEE Trans. Inf. Forensics
Secur. 1(3), 360–373 (2006)
16. Biel, L., Pettersson, O., Philipson, L., Wide, P.: ECG analysis: A
new approach in human identification. IEEE Trans. Instrum
Meas. 50, 808–812 (2001)
17. Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications
through off-line biometric identification. In Proceedings of the
IEEE Symposium on the Privacy and Security. pp. 148–157 (1998)
18. Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.:
Biometric Encryption using image processing. In Proc. SPIE Int.
Soc. Opt. Eng. 3314, 178–188 (1998)
19. Juels, A., Sudan, M.: A fuzzy vault scheme, In Proceedings of
the IEEE International Symposium on the Information Theory.
pp. 408 (2002)
20. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based
fingerprint authentication. In Proceedings of the ACMSIGMM
2003 Multimedia, Biometrics Methods and Applications Work-
shop. pp. 45–52 (2003)
21. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric
Cryptosystems: Issues and Challenges. Proceedings of the IEEE.
vol. 92, pp. 948–960 (2004)
22. Adler, A.: Vulnerabilities in biometric encryption systems. In
Proceedings of the AVBPA, Tarrytown, NY, USA, LNCS 3546:
1100–1109 (2005)
Security Block
▶ Common Biometric Exchange Formats Framework
Standardization
Security Issues, System Design
KARTHIK NANDAKUMAR
Institute for Infocomm Research A *STAR, Fusionopolis,
Singapore
Definition
Person authentication is one of the critical tasks in a
securing information technology (IT) systems and bio-
metric recognition is a natural and reliable solution
that can provide secu re authentication. However,
a biometric system is just one component of the over-
all IT security solution. To ensure the confidentiality
1152
S
Security Block