Definition
Person authentication is one of the critical tasks in a securing information technology (IT) systems, and biometric recognition is a natural and reliable solution that can provide secure authentication. However, a biometric system is just one component of the overall IT security solution. To ensure the confidentiality of the biometric information and the integrity of the biometric system, several security issues must be addressed in the design stage. Appropriate steps must be taken to guard against the vulnerabilities at the interfaces between the different components of the security system and the threats introduced due to improper implementation and administration of the biometric system. Furthermore, the security of a biometric system must be analyzed systematically based on standard methodologies such as the Common Criteria framework.
Introduction
In today’s digital world, a wide variety of information technology (IT) systems is used by the government (e.g.,...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Coordination of federal information policy – information security, in United States Code, 3532, chap. 35. Available at http://www.law.cornell.edu/uscode/html/uscode44/usc_sec_44_00003532----000-.html
B. Wirtz, Biometric system security – part 1. Biom. Technol. Today 6–8 (2003)
B. Wirtz, Biometric system security – part 2. Biom. Technol. Today 8–9 (2003)
C. Soutar, Automatic Fingerprint Recognition Systems (Springer, Berlin, 2004)
G. Doddington, W. Liggett, A. Martin, M. Przybocki, D. Reynolds, Sheep, goats, lambs and wolves: a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation, in Proceedings of the Fifth International Conference on Spoken Language Processing (ICSLP). Sydney, 1998
UK Government Biometrics Working Group, Biometric device protection profile (BDPP). Technical report draft issue 0.82 (2001)
A.K. Jain, S. Pankanti, A Touch of Money. IEEE Spectr. 3(7), 22–27 (2006)
A. Juels, D. Molnar, D. Wagner, Security and privacy issues in E-passports, in Proceedings of First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, 2005, pp. 74–88
A. Adler, Sample images can be independently restored from face recognition templates, in Proceedings of Canadian Conference on Electrical and Computer Engineering, Montreal, 2003, vol. 2, pp. 1163–1166
A. Ross, J. Shah, A.K. Jain, From templates to images: reconstructing fingerprints from minutiae points. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 544–560 (2007)
R. Cappelli, A. Lumini, D. Maio, D. Maltoni, Fingerprint image reconstruction from standard templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(9), 1489–1503 (2007)
Evaluation Criteria for IT Security, in ISO/IEC 15408-1 (International Standards Organization, 2005)
Information Assurance Directorate, U.S. government biometric verification mode protection profile for basic robustness environments. Technical report 1.1 (2007)
Security Evaluation of Biometrics, in ISO/IEC CD 19792 (International Standards Organization, 2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Nandakumar, K. (2015). Security Issues, System Design. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_284
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7488-4_284
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-7487-7
Online ISBN: 978-1-4899-7488-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering