Authors
Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle
Publication date
2001
Journal
IBM systems Journal
Volume
40
Issue
3
Pages
614-634
Publisher
IBM
Description
Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.
Total citations
20022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024713264043103115119127156152152152146142131148139126129929123
Scholar articles