Abstract
Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has led to the development of palmprint systems and their use in several real applications. Biometric systems are not, however, invulnerable. The potential attacks including replay and brute-force attacks have to be analyzed before they are massively deployed in real applications. With this in mind, this paper will consider brute-force break-ins directed against palmprint verification systems.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jain, A., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Boston (1999)
Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition 35, 2727–2738 (2002)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometricsbased authentication systems. IBM Systems Journal 40(3), 614–634 (2001)
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial gummy fingers on fingerprint systems. In: Proc. SPIE, San Jose, USA, February 2002, vol. 4677, pp. 275–289 (2002)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Biometrics break-ins and band-aids. Pattern Recognition Letters 24, 2105–2113 (2003)
Gorman, L.O.: Comparing passwords, tokens, biometrics for user authentication. Proceedings of the IEEE 91(12), 2021–2040 (2003)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948–960 (2004)
Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)
Shu, W., Zhang, D.: Automated personal identification by palmprint. Optical Engineering 37(8), 2359–2363 (1998)
Wu, X., Zhang, D., Wang, K., Hung, B.: Palmprint classification using principal lines. Pattern recognition 37(10), 1987–1998 (2004)
Han, C.C., Cheng, H.L., Fan, K.C., Lin, C.L.: Personal authentication using palmprint features. Pattern Recognition 36(2), 371–381 (2003)
Han, C.C.: A hand-based personal authentication using a coarse-to-fine strategy. Image and Vision Computing 22, 909–918 (2004)
Zhang, D., Kong, W.K., You, J., Wong, M.: On-line palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(9), 1041–1050 (2003)
Kong, A.W.K., Zhang, D.: Competitive coding scheme for palmprint verification. In: Proceedings of International Conference on Pattern Recognition, vol. 1, pp. 520–523 (2004)
Kong, A.W.K., Zhang, D.: Feature-level fusion for effective palmprint authentication. In: Proceedings of International Conference on Biometric Authentication, pp. 761–767 (2004)
Kong, A., Zhang, D., Lu, G.: A study of identical twins palmprint for personal verification. To appear in Pattern Recognition
Kong, W.K., Zhang, D.: Palmprint texture analysis based on low-resolution images for personal authentication. In: Proceedings of International Conference on Pattern Recognition, pp. 807–810 (2002)
Wu, X., Zhang, D., Wang, K.: Fisherpalms based palmprint recognition. Pattern Recognition Letters 24(15), 2829–2838 (2003)
Zhang, L., Zhang, D.: Characterization of palmprints by wavelet signatures via directional context modeling. IEEE Transactions on Systems, Man and Cybernetics, Part B 34(3), 1335–1347 (2004)
Daugman, J.: High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15(11), 1148–1161 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kong, A., Zhang, D., Kamel, M. (2005). A Study of Brute-Force Break-ins of a Palmprint Verification System. In: Kanade, T., Jain, A., Ratha, N.K. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2005. Lecture Notes in Computer Science, vol 3546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527923_46
Download citation
DOI: https://doi.org/10.1007/11527923_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-27887-0
Online ISBN: 978-3-540-31638-1
eBook Packages: Computer ScienceComputer Science (R0)