Abstract
Personal identification technology is a critical field of information security that has raised various equipments and communications in the modern society. Most studies have concentrated on fingerprint input sensors, recognition, and performance evaluation. However, the vulnerability evaluation for integrity verification of fingerprint recognition systems has partly been studied so far. In this paper, we design and implement two prototype evaluation tools for the vulnerability evaluation of a matching algorithm and integrity evaluation in the fingerprint recognition. We show the results of integrity violation through the process of normal transfer and variant transfer for extracted minutiae data.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Elsevier Advanced Technology, The Biometric Industry Report : Market and Technology Forecast to 2003, pp. 3–11 (2001)
U.S DOD, BMO.: Biometric System protection Profile For Medium Robustness Environments (2001)
Hong, L.: Automatic Personal Identification Using Fingerprints. A Dissertation of Computer Science, Michigan State University (1998)
Neil, Y., adnan, A.: Fingerprint verification based on minutiae feature: a review. Pattern Analysis and Applications 7(1), 94–113 (2004)
Jain, A., Hong, L., Bolle, R.: On-Line Fingerprint Verification. IEEE Transactions on Pattern Analysis Machine Intelligence 19(4), 302–314 (1997)
Yoon, D.H., Kim, C.S., Rhee, K.H., Shim, G.P., Kim, J.S., No, B.G.: A study on the security vulnerability evaluation for fingerprint recognition systems. In: EALPIIT 2002, pp. 373–378 (2002)
UK Government Biometrics Working Group: Principles of Biometric Security System Vulnerability Assessment (2001)
Tico, M., Kuosmanen, P.: Fingerprint matching using an orientation-based minutia descriptor. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(8), 1009–1014 (2003)
Gu, J., Zhou, J., Zhang, D.: A Combination model for orientation field Fingerprint. Pattern Recognition 37(3), 543–553 (2004)
Kang, H., Lee, B., Kim, H., Shin, D.: A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor Modules. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2774, pp. 1245–1253. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Na, HJ., Yoon, DH., Kim, CS., Hwang, HS. (2005). Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_137
Download citation
DOI: https://doi.org/10.1007/11552451_137
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28895-4
Online ISBN: 978-3-540-31986-3
eBook Packages: Computer ScienceComputer Science (R0)