Skip to main content

A Study of Brute-Force Break-ins of a Palmprint Verification System

  • Conference paper
Audio- and Video-Based Biometric Person Authentication (AVBPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 3546))

Abstract

Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has led to the development of palmprint systems and their use in several real applications. Biometric systems are not, however, invulnerable. The potential attacks including replay and brute-force attacks have to be analyzed before they are massively deployed in real applications. With this in mind, this paper will consider brute-force break-ins directed against palmprint verification systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Boston (1999)

    Google Scholar 

  2. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition 35, 2727–2738 (2002)

    Article  MATH  Google Scholar 

  3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometricsbased authentication systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  4. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial gummy fingers on fingerprint systems. In: Proc. SPIE, San Jose, USA, February 2002, vol. 4677, pp. 275–289 (2002)

    Google Scholar 

  5. Ratha, N.K., Connell, J.H., Bolle, R.M.: Biometrics break-ins and band-aids. Pattern Recognition Letters 24, 2105–2113 (2003)

    Article  Google Scholar 

  6. Gorman, L.O.: Comparing passwords, tokens, biometrics for user authentication. Proceedings of the IEEE 91(12), 2021–2040 (2003)

    Article  Google Scholar 

  7. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  8. Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)

    Article  Google Scholar 

  9. Shu, W., Zhang, D.: Automated personal identification by palmprint. Optical Engineering 37(8), 2359–2363 (1998)

    Article  Google Scholar 

  10. Wu, X., Zhang, D., Wang, K., Hung, B.: Palmprint classification using principal lines. Pattern recognition 37(10), 1987–1998 (2004)

    Article  MATH  Google Scholar 

  11. Han, C.C., Cheng, H.L., Fan, K.C., Lin, C.L.: Personal authentication using palmprint features. Pattern Recognition 36(2), 371–381 (2003)

    Article  Google Scholar 

  12. Han, C.C.: A hand-based personal authentication using a coarse-to-fine strategy. Image and Vision Computing 22, 909–918 (2004)

    Article  Google Scholar 

  13. Zhang, D., Kong, W.K., You, J., Wong, M.: On-line palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(9), 1041–1050 (2003)

    Article  Google Scholar 

  14. Kong, A.W.K., Zhang, D.: Competitive coding scheme for palmprint verification. In: Proceedings of International Conference on Pattern Recognition, vol. 1, pp. 520–523 (2004)

    Google Scholar 

  15. Kong, A.W.K., Zhang, D.: Feature-level fusion for effective palmprint authentication. In: Proceedings of International Conference on Biometric Authentication, pp. 761–767 (2004)

    Google Scholar 

  16. Kong, A., Zhang, D., Lu, G.: A study of identical twins palmprint for personal verification. To appear in Pattern Recognition

    Google Scholar 

  17. Kong, W.K., Zhang, D.: Palmprint texture analysis based on low-resolution images for personal authentication. In: Proceedings of International Conference on Pattern Recognition, pp. 807–810 (2002)

    Google Scholar 

  18. Wu, X., Zhang, D., Wang, K.: Fisherpalms based palmprint recognition. Pattern Recognition Letters 24(15), 2829–2838 (2003)

    Article  Google Scholar 

  19. Zhang, L., Zhang, D.: Characterization of palmprints by wavelet signatures via directional context modeling. IEEE Transactions on Systems, Man and Cybernetics, Part B 34(3), 1335–1347 (2004)

    Article  Google Scholar 

  20. Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 1148–1161 (1993)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kong, A., Zhang, D., Kamel, M. (2005). A Study of Brute-Force Break-ins of a Palmprint Verification System. In: Kanade, T., Jain, A., Ratha, N.K. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2005. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527923_46

Download citation

  • DOI: https://doi.org/10.1007/11527923_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27887-0

  • Online ISBN: 978-3-540-31638-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics