Security of biometric authentication systems

This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Matyáš, V, Řiha, Z
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 28
container_issue
container_start_page 19
container_title
container_volume
creator Matyáš, V
Řiha, Z
description This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. Our paper starts with an introductory section that is followed by a section about variability of biometric characteristics, with a particular attention paid to biometrics used in large systems. The following sections then discuss the potential for biometric authentication systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems.
doi_str_mv 10.1109/CISIM.2010.5643698
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5643698</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5643698</ieee_id><sourcerecordid>5643698</sourcerecordid><originalsourceid>FETCH-LOGICAL-c139t-fe0e0522f0a8a43b3eb132fcfa027e1c03d6b500527d170d64ef53409411328f3</originalsourceid><addsrcrecordid>eNotj8FOwzAQRI0QEtDmB-CSDyBl7XUS-4giKJGKOLScK8dZCyPSoNg95O-xIHPZedJqd4axOw4bzkE_Nu2-fdsISFxWEiutLtgtl0LKWnGlL1mmk1m4hmuWhfAFSaWoJccb9rAne558nPPR5Z0fB4qTt7k5x086RW9N9OMpD3OINIQ1u3LmO1C2zBX7eHk-NK_F7n3bNk-7wnLUsXAElB4IB0YZiR1Sx1E46wyImrgF7Kuu_MvQp1B9JcmVKEFLnvaUwxW7_7_riej4M_nBTPNxKYi_1d9DZQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security of biometric authentication systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Matyáš, V ; Řiha, Z</creator><creatorcontrib>Matyáš, V ; Řiha, Z</creatorcontrib><description>This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. Our paper starts with an introductory section that is followed by a section about variability of biometric characteristics, with a particular attention paid to biometrics used in large systems. The following sections then discuss the potential for biometric authentication systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems.</description><identifier>ISBN: 9781424478170</identifier><identifier>ISBN: 1424478170</identifier><identifier>EISBN: 1424478189</identifier><identifier>EISBN: 1424478162</identifier><identifier>EISBN: 9781424478187</identifier><identifier>EISBN: 9781424478163</identifier><identifier>DOI: 10.1109/CISIM.2010.5643698</identifier><language>eng</language><publisher>IEEE</publisher><subject>Accuracy ; Authentication ; Bioinformatics ; Error analysis ; Iris recognition</subject><ispartof>2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 2010, p.19-28</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c139t-fe0e0522f0a8a43b3eb132fcfa027e1c03d6b500527d170d64ef53409411328f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5643698$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5643698$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Matyáš, V</creatorcontrib><creatorcontrib>Řiha, Z</creatorcontrib><title>Security of biometric authentication systems</title><title>2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)</title><addtitle>CISIM</addtitle><description>This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. Our paper starts with an introductory section that is followed by a section about variability of biometric characteristics, with a particular attention paid to biometrics used in large systems. The following sections then discuss the potential for biometric authentication systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems.</description><subject>Accuracy</subject><subject>Authentication</subject><subject>Bioinformatics</subject><subject>Error analysis</subject><subject>Iris recognition</subject><isbn>9781424478170</isbn><isbn>1424478170</isbn><isbn>1424478189</isbn><isbn>1424478162</isbn><isbn>9781424478187</isbn><isbn>9781424478163</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj8FOwzAQRI0QEtDmB-CSDyBl7XUS-4giKJGKOLScK8dZCyPSoNg95O-xIHPZedJqd4axOw4bzkE_Nu2-fdsISFxWEiutLtgtl0LKWnGlL1mmk1m4hmuWhfAFSaWoJccb9rAne558nPPR5Z0fB4qTt7k5x086RW9N9OMpD3OINIQ1u3LmO1C2zBX7eHk-NK_F7n3bNk-7wnLUsXAElB4IB0YZiR1Sx1E46wyImrgF7Kuu_MvQp1B9JcmVKEFLnvaUwxW7_7_riej4M_nBTPNxKYi_1d9DZQ</recordid><startdate>201010</startdate><enddate>201010</enddate><creator>Matyáš, V</creator><creator>Řiha, Z</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201010</creationdate><title>Security of biometric authentication systems</title><author>Matyáš, V ; Řiha, Z</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c139t-fe0e0522f0a8a43b3eb132fcfa027e1c03d6b500527d170d64ef53409411328f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Accuracy</topic><topic>Authentication</topic><topic>Bioinformatics</topic><topic>Error analysis</topic><topic>Iris recognition</topic><toplevel>online_resources</toplevel><creatorcontrib>Matyáš, V</creatorcontrib><creatorcontrib>Řiha, Z</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Matyáš, V</au><au>Řiha, Z</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security of biometric authentication systems</atitle><btitle>2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)</btitle><stitle>CISIM</stitle><date>2010-10</date><risdate>2010</risdate><spage>19</spage><epage>28</epage><pages>19-28</pages><isbn>9781424478170</isbn><isbn>1424478170</isbn><eisbn>1424478189</eisbn><eisbn>1424478162</eisbn><eisbn>9781424478187</eisbn><eisbn>9781424478163</eisbn><abstract>This overview paper outlines our views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. Our paper starts with an introductory section that is followed by a section about variability of biometric characteristics, with a particular attention paid to biometrics used in large systems. The following sections then discuss the potential for biometric authentication systems, and for the use of biometrics in support of cryptographic applications as they are typically used in computer systems.</abstract><pub>IEEE</pub><doi>10.1109/CISIM.2010.5643698</doi><tpages>10</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424478170
ispartof 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 2010, p.19-28
issn
language eng
recordid cdi_ieee_primary_5643698
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Accuracy
Authentication
Bioinformatics
Error analysis
Iris recognition
title Security of biometric authentication systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T01%3A06%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20of%20biometric%20authentication%20systems&rft.btitle=2010%20International%20Conference%20on%20Computer%20Information%20Systems%20and%20Industrial%20Management%20Applications%20(CISIM)&rft.au=Matya%CC%81s%CC%8C,%20V&rft.date=2010-10&rft.spage=19&rft.epage=28&rft.pages=19-28&rft.isbn=9781424478170&rft.isbn_list=1424478170&rft_id=info:doi/10.1109/CISIM.2010.5643698&rft_dat=%3Cieee_6IE%3E5643698%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424478189&rft.eisbn_list=1424478162&rft.eisbn_list=9781424478187&rft.eisbn_list=9781424478163&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5643698&rfr_iscdi=true