2011
DOI: 10.1016/s0969-4765(11)70093-5
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…In terms of sensor‐level attacks, three existing methods have been identified [9]: Zero‐effort attacks , in which a person claims a random identity and attempts to be incorrectly accepted by the system. Zero‐effort attacks are the attack type being measured in existing large‐scale performance evaluations that calculate false accept rates. Brute force attacks , which repeatedly attempt to access a system, adjusting a biometric feature until a sufficiently close match is obtained [10].…”
Section: Biometric Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…In terms of sensor‐level attacks, three existing methods have been identified [9]: Zero‐effort attacks , in which a person claims a random identity and attempts to be incorrectly accepted by the system. Zero‐effort attacks are the attack type being measured in existing large‐scale performance evaluations that calculate false accept rates. Brute force attacks , which repeatedly attempt to access a system, adjusting a biometric feature until a sufficiently close match is obtained [10].…”
Section: Biometric Vulnerabilitiesmentioning
confidence: 99%
“…Attackers can exploit this variation to compromise a biometric system. For example, a lamb insertion attack [9] would involve deliberately enrolling a person or synthetic feature that is known to have a similar signature to many subjects. The system containing the lamb subject would then be vulnerable to imposters claiming the lamb identity.…”
Section: Biometric Vulnerabilitiesmentioning
confidence: 99%
“…Attackers can ex ploit this variation to compromise a biometric system. For ex ample, a lamb insertion attack [6] would involve deliberately enrolling a person or synthetic feature that is known to have a similar signature to many subjects. The system containing the lamb subject would then be vulnerable to imposters claiming the lamb identity.…”
Section: Biometric Vulnerabilitiesmentioning
confidence: 99%
“…Instead, the framework of a biometric system that includes data acquisition, processing, storing of templates and matching can also be threaten by an adversary that result the problems of authentication accuracy, reliability, robustness against fraudulent attacks, secrecy of biometric data and privacy protection. A practical biometric system which is employed to different applications can perform better and achieve the desired accuracy, but it is highly vulnerable to simple methods that can circumvent the security (Dunstone and Poulton, 2011). The methods includes the synthetic reproduction of anatomical identities, e.g., acquisition of facial images or lifting of latent fingerprints; and the imitation of behavioural identities, e.g., reproduction of handwritten signature or producing similar voices.…”
Section: Introductionmentioning
confidence: 99%