Abstract
In recent years there has been exponential growth in the use of biometrics for user authentication applications because biometricsbased authentication offers several advantages over knowledge and possession-based methods such as password/PIN-based systems. However, it is important that biometrics-based authentication systems be designed to withstand different sources of attacks on the system when employed in security-critical applications. This is even more important for unattended remote applications such as e-commerce. In this paper we outline the potential security holes in a biometrics-based authentication scheme, quantify the numerical strength of one method of fingerprint matching, then discuss how to combat some of the remaining weaknesses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B. Miller, “Vital signs of Identity”, IEEE Spectrum, February 1994, pp. 22–30.
A. Jain, L. Hong, and S. Pankanti, “Biometrics Identification”, Communications of the ACM, February 2000, pp. 90–98.
B. Schneier, “The uses and abuses of biometrics”. Communications of the ACM, August 1999, Vol. 42,No. 8, pp. 136.
N.K. Ratha and R.M. Bolle, “Smartcard based authentication”, in Biometrics: Personal Identification in Networked Society (Eds. A. Jain, R. Bolle and S. Pankanti), Kluwer, 1999, pp. 369–384.
N.K. Ratha, J.H. Connell, and R.M. Bolle, “A biometrics-based secure authentication System”, Proc. of the AutoID 99, Oct. 1999, pp. 70–73.
N.K. Ratha, J.H. Connell, and R.M. Bolle, “Secure data hiding in wavelet compressed fingerprint images”, Proc. of the ACM Multimedia Workshop on Multimedia and Security, Nov. 2000, pp. 127–130.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ratha, N.K., Connell, J.H., Bolle, R.M. (2001). An Analysis of Minutiae Matching Strength. In: Bigun, J., Smeraldi, F. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2001. Lecture Notes in Computer Science, vol 2091. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45344-X_32
Download citation
DOI: https://doi.org/10.1007/3-540-45344-X_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42216-7
Online ISBN: 978-3-540-45344-4
eBook Packages: Springer Book Archive