Skip to main content

Security and Liveness, Overview

  • Reference work entry
Book cover Encyclopedia of Biometrics

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ferguson, N., Schneier, B.: Practical Cryptography. John Wiley & Sons, NJ, USA (2003)

    Google Scholar 

  2. Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM vol. 42, pp. 136 (1999)

    Google Scholar 

  3. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Berlin (2003)

    MATH  Google Scholar 

  4. The Guardian (17 Nov. 2006) Cracked it!

    Google Scholar 

  5. Cavoukian, A.: Privacy and Biometrics, In Proceedings of the Intertnational Conference on Privacy and Personal Data Protection, Hong Kong, China (1999)

    Google Scholar 

  6. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)

    Google Scholar 

  7. International Committee for Information Technology Standards (INCITS) Study Report on Biometrics in E-Authentication, Technical Report INCITS M1/06-0693 (2006)

    Google Scholar 

  8. Thalheim, L., Krissler, J.: Body Check: Biometric Access Protection Devices and their Programs Put to the Test, ct magazine, November (2002)

    Google Scholar 

  9. Schuckers, S.A.C.: Spoofing and anti-spoofing measures, Information Security Technical Report, vol. 7, pp. 56–62 (2002)

    Google Scholar 

  10. International Biometric Group, (2007) Spoof, Test underway of fingerprint and iris recognition systems’ resistance to spoofing http://www.biometricgroup.com/spoof/ 2007. Accessed 7 April, 2009

  11. Matsumoto, T.: Gummy Finger and Paper Iris: An Update, Workshop Inform Security Research, Fukuoka, Japan, October (2004)

    Google Scholar 

  12. International Biometric Group, Liveness Detection in Biometric Systems, http://www.ibgweb.com/reports/public/reports/liveness.html

  13. Schuckers, S.A.C., Derakhshani, R., Parthasardhi, S., Hornak, L.A., (2006) Liveness Detection in Biometric Devices, in Electrical Engineering Handbook, 3rd edition, CRC Press, Chapter 26, ISBN: 084932274X

    Google Scholar 

  14. Coli, P., Marcialis, G.L., Roli, F.: Vitality Detection from Fingerprint Images: A Critical Survey, Advances in Biometrics, Springerlink, vol. 4642, pp. 722–731 (2007)

    Google Scholar 

  15. Antonelli, A., Cappelli, R., Maio, D., Maltoni, D.: Fake Finger Detection by Skin Distortion Analysis. IEEE Trans. Inf. Forensics Secur. 1(3), 360–373 (2006)

    Article  Google Scholar 

  16. Biel, L., Pettersson, O., Philipson, L., Wide, P.: ECG analysis: A new approach in human identification. IEEE Trans. Instrum Meas. 50, 808–812 (2001)

    Article  Google Scholar 

  17. Davida, G.I., Frankel, Y., Matt, B.J.: On enabling secure applications through off-line biometric identification. In Proceedings of the IEEE Symposium on the Privacy and Security. pp. 148–157 (1998)

    Google Scholar 

  18. Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.: Biometric Encryption using image processing. In Proc. SPIE Int. Soc. Opt. Eng. 3314, 178–188 (1998)

    Google Scholar 

  19. Juels, A., Sudan, M.: A fuzzy vault scheme, In Proceedings of the IEEE International Symposium on the Information Theory. pp. 408 (2002)

    Google Scholar 

  20. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In Proceedings of the ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop. pp. 45–52 (2003)

    Google Scholar 

  21. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proceedings of the IEEE. vol. 92, pp. 948–960 (2004)

    Google Scholar 

  22. Adler, A.: Vulnerabilities in biometric encryption systems. In Proceedings of the AVBPA, Tarrytown, NY, USA, LNCS 3546:1100–1109 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this entry

Cite this entry

Adler, A., Schuckers, S. (2009). Security and Liveness, Overview. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_62

Download citation

Publish with us

Policies and ethics