Skip to main navigation Skip to search Skip to main content

An analysis of minutiae matching strength

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

299 Scopus citations

Abstract

In recent years there has been exponential growth in the use of biometrics for user authentication applications because biometrics-based authentication offers several advantages over knowledge and possession-based methods such as password/PIN-based systems. However, it is important that biometrics-based authentication systems be designed to withstand different sources of attacks on the system when employed in security-critical applications. This is even more important for unattended remote applications such as e-commerce. In this paper we outline the potential security holes in a biometrics-based authentication scheme, quantify the numerical strength of one method of fingerprint matching, then discuss how to combat some of the remaining weaknesses.

Original languageEnglish
Title of host publicationAudio- and Video-Based Biometric Person Authentication - Third International Conference, AVBPA 2001, Proceedings
PublisherSpringer Verlag
Pages223-228
Number of pages6
ISBN (Print)3540422161, 9783540422167
DOIs
StatePublished - 2001
Event3rd International Conference on Audio- and Video- Based Biometric Person Authentication, AVBPA 2001 - Halmstad, Sweden
Duration: Jun 6 2001Jun 8 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2091 LNCS

Conference

Conference3rd International Conference on Audio- and Video- Based Biometric Person Authentication, AVBPA 2001
Country/TerritorySweden
CityHalmstad
Period06/6/0106/8/01

Fingerprint

Dive into the research topics of 'An analysis of minutiae matching strength'. Together they form a unique fingerprint.

Cite this