Skip to main content

Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition

  • Conference paper
  • 1001 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3682))

Abstract

Personal identification technology is a critical field of information security that has raised various equipments and communications in the modern society. Most studies have concentrated on fingerprint input sensors, recognition, and performance evaluation. However, the vulnerability evaluation for integrity verification of fingerprint recognition systems has partly been studied so far. In this paper, we design and implement two prototype evaluation tools for the vulnerability evaluation of a matching algorithm and integrity evaluation in the fingerprint recognition. We show the results of integrity violation through the process of normal transfer and variant transfer for extracted minutiae data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Elsevier Advanced Technology, The Biometric Industry Report : Market and Technology Forecast to 2003, pp. 3–11 (2001)

    Google Scholar 

  2. U.S DOD, BMO.: Biometric System protection Profile For Medium Robustness Environments (2001)

    Google Scholar 

  3. Hong, L.: Automatic Personal Identification Using Fingerprints. A Dissertation of Computer Science, Michigan State University (1998)

    Google Scholar 

  4. Neil, Y., adnan, A.: Fingerprint verification based on minutiae feature: a review. Pattern Analysis and Applications 7(1), 94–113 (2004)

    Article  MathSciNet  Google Scholar 

  5. Jain, A., Hong, L., Bolle, R.: On-Line Fingerprint Verification. IEEE Transactions on Pattern Analysis Machine Intelligence 19(4), 302–314 (1997)

    Article  Google Scholar 

  6. Yoon, D.H., Kim, C.S., Rhee, K.H., Shim, G.P., Kim, J.S., No, B.G.: A study on the security vulnerability evaluation for fingerprint recognition systems. In: EALPIIT 2002, pp. 373–378 (2002)

    Google Scholar 

  7. UK Government Biometrics Working Group: Principles of Biometric Security System Vulnerability Assessment (2001)

    Google Scholar 

  8. Tico, M., Kuosmanen, P.: Fingerprint matching using an orientation-based minutia descriptor. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(8), 1009–1014 (2003)

    Article  Google Scholar 

  9. Gu, J., Zhou, J., Zhang, D.: A Combination model for orientation field Fingerprint. Pattern Recognition 37(3), 543–553 (2004)

    Article  Google Scholar 

  10. http://bias.csr.unibo.it/fvc2004 (2004)

  11. Kang, H., Lee, B., Kim, H., Shin, D.: A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor Modules. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2774, pp. 1245–1253. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Na, HJ., Yoon, DH., Kim, CS., Hwang, HS. (2005). Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_137

Download citation

  • DOI: https://doi.org/10.1007/11552451_137

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28895-4

  • Online ISBN: 978-3-540-31986-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics