Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ferguson, N., Schneier, B.: Practical Cryptography. John Wiley & Sons, NJ, USA (2003)
Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM vol. 42, pp. 136 (1999)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Berlin (2003)
The Guardian (17 Nov. 2006) Cracked it!
Cavoukian, A.: Privacy and Biometrics, In Proceedings of the Intertnational Conference on Privacy and Personal Data Protection, Hong Kong, China (1999)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
International Committee for Information Technology Standards (INCITS) Study Report on Biometrics in E-Authentication, Technical Report INCITS M1/06-0693 (2006)
Thalheim, L., Krissler, J.: Body Check: Biometric Access Protection Devices and their Programs Put to the Test, ct magazine, November (2002)
Schuckers, S.A.C.: Spoofing and anti-spoofing measures, Information Security Technical Report, vol. 7, pp. 56–62 (2002)
International Biometric Group, (2007) Spoof, Test underway of fingerprint and iris recognition systems’ resistance to spoofing http://www.biometricgroup.com/spoof/ 2007. Accessed 7 April, 2009
Matsumoto, T.: Gummy Finger and Paper Iris: An Update, Workshop Inform Security Research, Fukuoka, Japan, October (2004)
International Biometric Group, Liveness Detection in Biometric Systems, http://www.ibgweb.com/reports/public/reports/liveness.html
Schuckers, S.A.C., Derakhshani, R., Parthasardhi, S., Hornak, L.A., (2006) Liveness Detection in Biometric Devices, in Electrical Engineering Handbook, 3rd edition, CRC Press, Chapter 26, ISBN: 084932274X
Coli, P., Marcialis, G.L., Roli, F.: Vitality Detection from Fingerprint Images: A Critical Survey, Advances in Biometrics, Springerlink, vol. 4642, pp. 722–731 (2007)
Antonelli, A., Cappelli, R., Maio, D., Maltoni, D.: Fake Finger Detection by Skin Distortion Analysis. IEEE Trans. Inf. Forensics Secur. 1(3), 360–373 (2006)
Biel, L., Pettersson, O., Philipson, L., Wide, P.: ECG analysis: A new approach in human identification. IEEE Trans. Instrum Meas. 50, 808–812 (2001)
Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through off-line biometric identification. In Proceedings of the IEEE Symposium on the Privacy and Security. pp. 148–157 (1998)
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.: Biometric Encryption using image processing. In Proc. SPIE Int. Soc. Opt. Eng. 3314, 178–188 (1998)
Juels, A., Sudan, M.: A fuzzy vault scheme, In Proceedings of the IEEE International Symposium on the Information Theory. pp. 408 (2002)
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In Proceedings of the ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop. pp. 45–52 (2003)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proceedings of the IEEE. vol. 92, pp. 948–960 (2004)
Adler, A.: Vulnerabilities in biometric encryption systems. In Proceedings of the AVBPA, Tarrytown, NY, USA, LNCS 3546:1100–1109 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this entry
Cite this entry
Adler, A., Schuckers, S. (2009). Security and Liveness, Overview. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_62
Download citation
DOI: https://doi.org/10.1007/978-0-387-73003-5_62
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73002-8
Online ISBN: 978-0-387-73003-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering