Possible Attacks on Match-In-Database Fingerprint Authentication

Jadyn Sondrol
{"title":"Possible Attacks on Match-In-Database Fingerprint Authentication","authors":"Jadyn Sondrol","doi":"10.61366/2576-2176.1129","DOIUrl":null,"url":null,"abstract":"Biometrics are used to help keep users’ data private. There are many different biometric systems, all dealing with a unique attribute of a user, such as fingerprint, face, retina, iris and voice recognition. Fingerprint biometric systems, specifically match-in-database, have universally become the most implemented biometric system. To make these systems more secure, threat models are used to identify potential attacks and ways to mitigate them. This paper introduces a threat model for match-in-database fingerprint authentication systems. It also describes some of the most frequent attacks these systems come across and some possible mitigation efforts that can be adapted to keep the systems more secure.","PeriodicalId":498881,"journal":{"name":"Scholarly Horizons University of Minnesota Morris Undergraduate Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scholarly Horizons University of Minnesota Morris Undergraduate Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.61366/2576-2176.1129","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Biometrics are used to help keep users’ data private. There are many different biometric systems, all dealing with a unique attribute of a user, such as fingerprint, face, retina, iris and voice recognition. Fingerprint biometric systems, specifically match-in-database, have universally become the most implemented biometric system. To make these systems more secure, threat models are used to identify potential attacks and ways to mitigate them. This paper introduces a threat model for match-in-database fingerprint authentication systems. It also describes some of the most frequent attacks these systems come across and some possible mitigation efforts that can be adapted to keep the systems more secure.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
匹配指纹认证可能的攻击
生物识别技术被用来保护用户数据的隐私。有许多不同的生物识别系统,都处理用户的独特属性,如指纹、面部、视网膜、虹膜和语音识别。指纹生物识别系统,特别是数据库匹配系统,已成为目前应用最广泛的生物识别系统。为了使这些系统更加安全,使用威胁模型来识别潜在的攻击和减轻攻击的方法。介绍了一种数据库匹配指纹认证系统的威胁模型。它还描述了这些系统遇到的一些最常见的攻击,以及一些可能的缓解措施,可以适应以保持系统更安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Possible Attacks on Match-In-Database Fingerprint Authentication Deep-Learning Realtime Upsampling Techniques in Video Games Exploring Methods Used in Face Swapping
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1