Security Evaluation of Biometrics Authentications for Cellular Phones

@article{Manabe2009SecurityEO,
  title={Security Evaluation of Biometrics Authentications for Cellular Phones},
  author={Hirokazu Manabe and Yuta Yamakawa and Tomohiro Sasamoto and Ry{\^o}ichi Sasaki},
  journal={2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
  year={2009},
  pages={34-39}
}
Cellular phones, which are now widely used, often contain significant amounts of personal information, and are also increasingly being used for money-related functions such as credit card purchases. Consequently, biometric authentication technologies are being introduced as a means to ensure higher security. However, these technologies can be vulnerable to criminal penetration. Because of this, the authors evaluated the security levels of cellular phones by a series of experiments using… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 10 CITATIONS

Preventing Cell Phone Intrusion and Theft using Biometrics

  • 2013 IEEE Security and Privacy Workshops
  • 2013
VIEW 6 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Biometric: fingerprints protection

Ashish Mm, Sinha Gr, Patel Rp
  • 2018

Biometric Template Protection

VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.

Introduction to Biometric Security

“ YoichiSeto
  • 1981