2014
DOI: 10.1016/j.ins.2013.06.015
|View full text |Cite
|
Sign up to set email alerts
|

A novel hand reconstruction approach and its application to vulnerability assessment

Abstract: Esta es la versión de autor del artículo publicado en: This is an author produced version of a paper published in:Information Sciences 238 (2014) AbstractThe present work proposes a novel probabilistic method to reconstruct a hand shape image from its template. We analyse the degree of similarity between the reconstructed images and the original samples in order to determine whether the synthetic hands are able to deceive hand recognition systems. This analysis is made through the estimation of the success ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 58 publications
0
10
0
Order By: Relevance
“…As any other security technology, biometric systems are exposed to external attacks that can compromise their security. In particular, it has been proven that it is feasible to recover the biometric trait (i.e., iris [2], face [3], handshape [4] or fingerprint [5]) from the information contained in the stored biometric reference data (template). This fact poses a severe security and privacy problem: a skilled impostor could have access to our biometric data.…”
Section: Introductionmentioning
confidence: 99%
“…As any other security technology, biometric systems are exposed to external attacks that can compromise their security. In particular, it has been proven that it is feasible to recover the biometric trait (i.e., iris [2], face [3], handshape [4] or fingerprint [5]) from the information contained in the stored biometric reference data (template). This fact poses a severe security and privacy problem: a skilled impostor could have access to our biometric data.…”
Section: Introductionmentioning
confidence: 99%
“…In other words, they take advantage of the information conveyed in bona fide biometric templates to gain some knowledge of the underlying biometric information, hence violating the privacy of the owner. Such methodologies have already been applied to fingerprint [6,26,25], iris [28,24], handshape [34], face [40,12], or handwriting [81,82].…”
Section: Inversementioning
confidence: 99%
“…Similarly, Gomez-Barrero et al proposed in [34] a probabilistic inverse biometrics method based on a combination of a handshape images generator and an adaptation of the Nelder-Mead simplex algorithm, which had been previously used to recover face images in [84].…”
Section: Knowledge Required: Similarity Scoresmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, attacks that exploit the information related to comparison scores can be categorised into either hill-climbing attacks or affine-based reconstruction attacks. In hill-climbing attacks [10][11][12] the attacker only needs to have access to the comparison scores issued by the biometric recognition algorithm. He can start the attack by presenting an arbitrary (possibly synthetic) biometric sample for comparison with a targeted biometric reference (BR) in the system.…”
Section: Introductionmentioning
confidence: 99%