Manabu Inuma

Learn More
In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intentional impersonation attacks such as wolf attacks. The wolf attack is an attempt to impersonate a genuine user by presenting a “wolf” to a biometric(More)
This paper gives the formal definitions for security metrics proposed by Simoens et al.[11] and Nagar et al.[1], and analyze the relations. [11] defined comprehensive metrics for all biometric template protection algorithms. Their security-related metrics are defined as the measurement of performance in various setting. Whereas [1] also defined similar but(More)
Recently Radio Frequency IDentification (RFID) systems are used in many applications. However an individual identification scheme using RFID tags has a serious problem that if there are many tags within the reader’s operation range, then the reader can not determine a genuine tag of a user to be authenticated, the identification protocol is executed for all(More)
In [4], we proposed a theoretical framework to construct matching algorithms for any biometric authentication systems. In this paper, we will introduce the results in [4] and add some comments on the accuracy (FAR and FRR) of our proposed matching algorithms (Lemma 6, 7, 8). Conventional matching algorithms are not necessarily secure against strong(More)
  • 1