Security of biometric authentication systems
This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 28 |
---|---|
container_issue | |
container_start_page | 19 |
container_title | |
container_volume | |
creator | Matyáš, V Řiha, Z |
description | This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. Our paper starts with an introductory section that is followed by a section about variability of biometric characteristics, with a particular attention paid to biometrics used in large systems. The following sections then discuss the potential for biometric authentication systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems. |
doi_str_mv | 10.1109/CISIM.2010.5643698 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5643698</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5643698</ieee_id><sourcerecordid>5643698</sourcerecordid><originalsourceid>FETCH-LOGICAL-c139t-fe0e0522f0a8a43b3eb132fcfa027e1c03d6b500527d170d64ef53409411328f3</originalsourceid><addsrcrecordid>eNotj8FOwzAQRI0QEtDmB-CSDyBl7XUS-4giKJGKOLScK8dZCyPSoNg95O-xIHPZedJqd4axOw4bzkE_Nu2-fdsISFxWEiutLtgtl0LKWnGlL1mmk1m4hmuWhfAFSaWoJccb9rAne558nPPR5Z0fB4qTt7k5x086RW9N9OMpD3OINIQ1u3LmO1C2zBX7eHk-NK_F7n3bNk-7wnLUsXAElB4IB0YZiR1Sx1E46wyImrgF7Kuu_MvQp1B9JcmVKEFLnvaUwxW7_7_riej4M_nBTPNxKYi_1d9DZQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security of biometric authentication systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Matyáš, V ; Řiha, Z</creator><creatorcontrib>Matyáš, V ; Řiha, Z</creatorcontrib><description>This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. Our paper starts with an introductory section that is followed by a section about variability of biometric characteristics, with a particular attention paid to biometrics used in large systems. The following sections then discuss the potential for biometric authentication systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems.</description><identifier>ISBN: 9781424478170</identifier><identifier>ISBN: 1424478170</identifier><identifier>EISBN: 1424478189</identifier><identifier>EISBN: 1424478162</identifier><identifier>EISBN: 9781424478187</identifier><identifier>EISBN: 9781424478163</identifier><identifier>DOI: 10.1109/CISIM.2010.5643698</identifier><language>eng</language><publisher>IEEE</publisher><subject>Accuracy ; Authentication ; Bioinformatics ; Error analysis ; Iris recognition</subject><ispartof>2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 2010, p.19-28</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c139t-fe0e0522f0a8a43b3eb132fcfa027e1c03d6b500527d170d64ef53409411328f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5643698$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5643698$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Matyáš, V</creatorcontrib><creatorcontrib>Řiha, Z</creatorcontrib><title>Security of biometric authentication systems</title><title>2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)</title><addtitle>CISIM</addtitle><description>This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. Our paper starts with an introductory section that is followed by a section about variability of biometric characteristics, with a particular attention paid to biometrics used in large systems. The following sections then discuss the potential for biometric authentication systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems.</description><subject>Accuracy</subject><subject>Authentication</subject><subject>Bioinformatics</subject><subject>Error analysis</subject><subject>Iris recognition</subject><isbn>9781424478170</isbn><isbn>1424478170</isbn><isbn>1424478189</isbn><isbn>1424478162</isbn><isbn>9781424478187</isbn><isbn>9781424478163</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8FOwzAQRI0QEtDmB-CSDyBl7XUS-4giKJGKOLScK8dZCyPSoNg95O-xIHPZedJqd4axOw4bzkE_Nu2-fdsISFxWEiutLtgtl0LKWnGlL1mmk1m4hmuWhfAFSaWoJccb9rAne558nPPR5Z0fB4qTt7k5x086RW9N9OMpD3OINIQ1u3LmO1C2zBX7eHk-NK_F7n3bNk-7wnLUsXAElB4IB0YZiR1Sx1E46wyImrgF7Kuu_MvQp1B9JcmVKEFLnvaUwxW7_7_riej4M_nBTPNxKYi_1d9DZQ</recordid><startdate>201010</startdate><enddate>201010</enddate><creator>Matyáš, V</creator><creator>Řiha, Z</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201010</creationdate><title>Security of biometric authentication systems</title><author>Matyáš, V ; Řiha, Z</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c139t-fe0e0522f0a8a43b3eb132fcfa027e1c03d6b500527d170d64ef53409411328f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Accuracy</topic><topic>Authentication</topic><topic>Bioinformatics</topic><topic>Error analysis</topic><topic>Iris recognition</topic><toplevel>online_resources</toplevel><creatorcontrib>Matyáš, V</creatorcontrib><creatorcontrib>Řiha, Z</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Matyáš, V</au><au>Řiha, Z</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security of biometric authentication systems</atitle><btitle>2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)</btitle><stitle>CISIM</stitle><date>2010-10</date><risdate>2010</risdate><spage>19</spage><epage>28</epage><pages>19-28</pages><isbn>9781424478170</isbn><isbn>1424478170</isbn><eisbn>1424478189</eisbn><eisbn>1424478162</eisbn><eisbn>9781424478187</eisbn><eisbn>9781424478163</eisbn><abstract>This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. Our paper starts with an introductory section that is followed by a section about variability of biometric characteristics, with a particular attention paid to biometrics used in large systems. The following sections then discuss the potential for biometric authentication systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems.</abstract><pub>IEEE</pub><doi>10.1109/CISIM.2010.5643698</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424478170 |
ispartof | 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 2010, p.19-28 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5643698 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Accuracy Authentication Bioinformatics Error analysis Iris recognition |
title | Security of biometric authentication systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T01%3A06%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20of%20biometric%20authentication%20systems&rft.btitle=2010%20International%20Conference%20on%20Computer%20Information%20Systems%20and%20Industrial%20Management%20Applications%20(CISIM)&rft.au=Matya%CC%81s%CC%8C,%20V&rft.date=2010-10&rft.spage=19&rft.epage=28&rft.pages=19-28&rft.isbn=9781424478170&rft.isbn_list=1424478170&rft_id=info:doi/10.1109/CISIM.2010.5643698&rft_dat=%3Cieee_6IE%3E5643698%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424478189&rft.eisbn_list=1424478162&rft.eisbn_list=9781424478187&rft.eisbn_list=9781424478163&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5643698&rfr_iscdi=true |