Authors
Ruud M Bolle, Jonathan H Connell, Nalini K Ratha
Publication date
2002/12/1
Journal
Pattern recognition
Volume
35
Issue
12
Pages
2727-2738
Publisher
Pergamon
Description
Biometrics authentication offers many advantages over conventional authentication systems that rely on possessions or special knowledge. With conventional technology, often the mere possession of an employee ID card is proof of ID, while a password potentially can be used by large groups of colleagues for long times without change. The fact that biometrics authentication is non-repudiable (hard to refute) and, yet, convenient, is among its most important advantages. Biometrics systems, however, suffer from some inherent biometrics-specific security threats. These threats are mainly related to the use of digital signals and the need for additional input devices, though we also discuss brute-force attacks of biometrics systems. There are also problems common to any pattern recognition system. These include “wolves” and “lambs”, and a new group we call “chameleons”. An additional issue with the use of …
Total citations
200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242101528202931313333252228192419221720191774
Scholar articles
RM Bolle, JH Connell, NK Ratha - Pattern recognition, 2002