A Spoofing Attack against a Cancelable Biometric Authentication Scheme

@article{Izu2014ASA,
  title={A Spoofing Attack against a Cancelable Biometric Authentication Scheme},
  author={Tetsuya Izu and Yumi Sakemi and Masahiko Takenaka and Naoya Torii},
  journal={2014 IEEE 28th International Conference on Advanced Information Networking and Applications},
  year={2014},
  pages={234-239}
}
ID/password-based authentication is commonly used in network services. Some users set different ID/password pairs for different services, but other users reuse a pair of ID/password to other services. Such recycling allows the list attack in which an adversary tries to spoof a target user by using a list of IDs and passwords obtained from other system by some means (an insider attack, malwares, or even a DB leakage). As a countermeasure agains the list attack, biometric authentication attracts… CONTINUE READING
2 Citations
13 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 13 references

and T

  • T. Hirano, M. Hattori, T. Ito, N. Matsuda
  • Mori, “Countermeasures against the Replay Attack…
  • 2013
Highly Influential
6 Excerpts

High Confidence Personal Identification by Rapid Video Analysis of Iris Texture

  • J. Daugman
  • ICCST 1992, pp.50–60, IEEE
  • 1992
Highly Influential
6 Excerpts

Countermeasures against the Replay Attack on Public - key Encryption Based Cancelable Biometrics ( in Japanese ) ”

  • M. Hattori, T. Ito, N. Matsuda, T. Mori
  • The 30 th Symposium on Cryptography and…
  • 2013

Similar Papers

Loading similar papers…