Skip to main content

Security Issues, System Design

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics

Definition

Person authentication is one of the critical tasks in a securing information technology (IT) systems, and biometric recognition is a natural and reliable solution that can provide secure authentication. However, a biometric system is just one component of the overall IT security solution. To ensure the confidentiality of the biometric information and the integrity of the biometric system, several security issues must be addressed in the design stage. Appropriate steps must be taken to guard against the vulnerabilities at the interfaces between the different components of the security system and the threats introduced due to improper implementation and administration of the biometric system. Furthermore, the security of a biometric system must be analyzed systematically based on standard methodologies such as the Common Criteria framework.

Introduction

In today’s digital world, a wide variety of information technology (IT) systems is used by the government (e.g.,...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Coordination of federal information policy – information security, in United States Code, 3532, chap. 35. Available at http://www.law.cornell.edu/uscode/html/uscode44/usc_sec_44_00003532----000-.html

  2. B. Wirtz, Biometric system security – part 1. Biom. Technol. Today 6–8 (2003)

    Google Scholar 

  3. B. Wirtz, Biometric system security – part 2. Biom. Technol. Today 8–9 (2003)

    Google Scholar 

  4. C. Soutar, Automatic Fingerprint Recognition Systems (Springer, Berlin, 2004)

    Google Scholar 

  5. G. Doddington, W. Liggett, A. Martin, M. Przybocki, D. Reynolds, Sheep, goats, lambs and wolves: a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation, in Proceedings of the Fifth International Conference on Spoken Language Processing (ICSLP). Sydney, 1998

    Google Scholar 

  6. UK Government Biometrics Working Group, Biometric device protection profile (BDPP). Technical report draft issue 0.82 (2001)

    Google Scholar 

  7. A.K. Jain, S. Pankanti, A Touch of Money. IEEE Spectr. 3(7), 22–27 (2006)

    Google Scholar 

  8. A. Juels, D. Molnar, D. Wagner, Security and privacy issues in E-passports, in Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, 2005, pp. 74–88

    Google Scholar 

  9. A. Adler, Sample images can be independently restored from face recognition templates, in Proceedings of Canadian Conference on Electrical and Computer Engineering, Montreal, 2003, vol. 2, pp. 1163–1166

    Google Scholar 

  10. A. Ross, J. Shah, A.K. Jain, From templates to images: reconstructing fingerprints from minutiae points. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 544–560 (2007)

    Google Scholar 

  11. R. Cappelli, A. Lumini, D. Maio, D. Maltoni, Fingerprint image reconstruction from standard templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(9), 1489–1503 (2007)

    Google Scholar 

  12. Evaluation Criteria for IT Security, in ISO/IEC 15408-1 (International Standards Organization, 2005)

    Google Scholar 

  13. Information Assurance Directorate, U.S. government biometric verification mode protection profile for basic robustness environments. Technical report 1.1 (2007)

    Google Scholar 

  14. Security Evaluation of Biometrics, in ISO/IEC CD 19792 (International Standards Organization, 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Nandakumar, K. (2015). Security Issues, System Design. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_284

Download citation

Publish with us

Policies and ethics