Skip to main content

Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3682))

  • 1042 Accesses

Abstract

Personal identification technology is a critical field of information security that has raised various equipments and communications in the modern society. Most studies have concentrated on fingerprint input sensors, recognition, and performance evaluation. However, the vulnerability evaluation for integrity verification of fingerprint recognition systems has partly been studied so far. In this paper, we design and implement two prototype evaluation tools for the vulnerability evaluation of a matching algorithm and integrity evaluation in the fingerprint recognition. We show the results of integrity violation through the process of normal transfer and variant transfer for extracted minutiae data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Elsevier Advanced Technology, The Biometric Industry Report : Market and Technology Forecast to 2003, pp. 3–11 (2001)

    Google Scholar 

  2. U.S DOD, BMO.: Biometric System protection Profile For Medium Robustness Environments (2001)

    Google Scholar 

  3. Hong, L.: Automatic Personal Identification Using Fingerprints. A Dissertation of Computer Science, Michigan State University (1998)

    Google Scholar 

  4. Neil, Y., adnan, A.: Fingerprint verification based on minutiae feature: a review. Pattern Analysis and Applications 7(1), 94–113 (2004)

    Article  MathSciNet  Google Scholar 

  5. Jain, A., Hong, L., Bolle, R.: On-Line Fingerprint Verification. IEEE Transactions on Pattern Analysis Machine Intelligence 19(4), 302–314 (1997)

    Article  Google Scholar 

  6. Yoon, D.H., Kim, C.S., Rhee, K.H., Shim, G.P., Kim, J.S., No, B.G.: A study on the security vulnerability evaluation for fingerprint recognition systems. In: EALPIIT 2002, pp. 373–378 (2002)

    Google Scholar 

  7. UK Government Biometrics Working Group: Principles of Biometric Security System Vulnerability Assessment (2001)

    Google Scholar 

  8. Tico, M., Kuosmanen, P.: Fingerprint matching using an orientation-based minutia descriptor. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(8), 1009–1014 (2003)

    Article  Google Scholar 

  9. Gu, J., Zhou, J., Zhang, D.: A Combination model for orientation field Fingerprint. Pattern Recognition 37(3), 543–553 (2004)

    Article  Google Scholar 

  10. http://bias.csr.unibo.it/fvc2004 (2004)

  11. Kang, H., Lee, B., Kim, H., Shin, D.: A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor Modules. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2774, pp. 1245–1253. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Na, HJ., Yoon, DH., Kim, CS., Hwang, HS. (2005). Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552451_137

Download citation

  • DOI: https://doi.org/10.1007/11552451_137

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28895-4

  • Online ISBN: 978-3-540-31986-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics