Attacks on biometric systems: a case study in fingerprints

  title={Attacks on biometric systems: a case study in fingerprints},
  author={Umut Uludag and Anil K. Jain},
  booktitle={IS\&T/SPIE Electronic Imaging},
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, we analyze these attacks in the realm of a fingerprint biometric system. We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a… 

Attacks on Biometric Systems: An Overview

This paper presents a literature review of attack system architecture and makes progress towards various attack points in biometric system and urges to study existing biometric template protection techniques to resist these attacks.

Biometric template security: Challenges and solutions

The various threats that can be encountered by a biometric system are described and experimental results pertaining to a hybrid system combining biometrics with cryptography, that converts traditional fingerprint templates into novel cryptographic structures are provided.

Towards the Security Evaluation of Biometric Authentication Systems

The proposed modality-independent evaluation methodology is based on the use of a database of common threats and vulnerabilities of biometric systems, and the notion of risk factor produces a security index which characterizes the overall security level ofBiometric systems.

Multimodal Biometrics as Attacks Measure in Biometrics Systems

This review paper proposes an integration of fingerprint and face recognition systems to provide anti-spoofing and replay attacks measures making it difficult for an impersonator/imposter to steal multiple biometric traits of a genuine user.

A Study on Attacks and Security Against Fingerprint Template Database

An overview of various biometric template protection schemes is presented and their advantages in terms of security, revocability, and impact on matching accuracy are discussed.

A survey of attacks on iris biometric systems

This article intends to review the popular attacks on the iris biometric, which affects its security, and present a survey on the approaches taken by various researchers to mitigate these attacks.

Spoof Detection of Fingerprint Biometrics based on Local and Global Quality Measures

This paper proposes a method to avoid the sensor level attack using limited ring wedge spectral energy, Inhomogenity and Directional Contrast, which is the global quality measure and local quality measures.

Mimicry Attack on Strategy-Based Behavioral Biometric

  • Roman V Yampolskiy
  • Computer Science
    Fifth International Conference on Information Technology: New Generations (itng 2008)
  • 2008
The concept of strategy-based behavioral biometrics is introduced followed by experimental results from spoofing security systems based on strategy- based biometric technology and an existing methodology is suggested to counteract spoofing attacks against behavior-based biometric systems.

Security of biometric authentication systems

  • V. MatyásZ. Ríha
  • Computer Science, Mathematics
    2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)
  • 2010
This overview paper outlines the views of actual security of biometric authentication and encryption systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems.

Vulnerabilities of Biometric System

This paper describes the various threats that can be catched by a biometric system and specifically focuses on attacks designed to elicit information about the original biometric data of an individual from the stored template.



An Analysis of Minutiae Matching Strength

The potential security holes in a biometrics-based authentication scheme are outlined, the numerical strength of one method of fingerprint matching is quantified, then how to combat some of the remaining weaknesses are discussed.

Enhancing security and privacy in biometrics-based authentication systems

The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.

Hiding Biometric Data

This work introduces two applications of an amplitude modulation-based watermarking method, in which a user's biometric data is hidden in a variety of images and has the ability to increase the security of both the hiddenBiometric data and host images.

Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned

This article shows how all currently available fingerprint scanners can be fooled by dummies that are created with very limited means and skills, specifically verification based on fingerprints.

Multimodal Biometric Authentication Methods: A COTS Approach | NIST

This work is the first to demonstrate that multimodal fingerprint and face biometric systems can achieve significant accuracy gains over either biometric alone, even when using already highly accurate COTS systems on a relatively large-scale population.

New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates

This work introduces the concept of a delta-contracting and epsilon-revealing function which executes preprocessing in the biometric authentication scheme and believes that this concept can become a building block of a public infrastructure for biometrics authentication that nonetheless preserves privacy of the participants.

Multimodal Biometric Authentication Methods : A COTS Approach

This work is the first to demonstrate that multimodal fingerprint and face biometric systems can achieve significant accuracy gains over either biometric alone, even when using already highly accurate COTS systems on a relatively large-scale population.

Handbook of Fingerprint Recognition

This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.

Risk of Masquerade Arising from the Storage of Biometrics

It is shown that it is possible to create an image of a fingerprint based on the information contained within the stored template, which indicates that more attention will have to go to securing stored fingerprint data, unless the feature extraction process can be proven to be one-way.

An identity-authentication system using fingerprints

The design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual is described and an improved minutiae-extraction algorithm is developed that is faster and more accurate than the earlier algorithm.