About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
Pattern Recognition Letters
Paper
Biometrics break-ins and band-aids
Abstract
Currently there is much interest in the use of biometrics for authentication and identification applications. This has been heightened most recently because of the threat of terrorism. Biometrics authentication and identification systems offer several advantages over systems based on knowledge or possession such as unsupervised (legacy) password/PIN-based systems and supervised (legacy) passport-based systems. To optimize security it is important that biometrics authentication systems are designed to withstand different sources of attack. We identify some such threats to biometrics systems and detail issues related to the tradeoff between security and convenience. We further show how to estimate a biometrics' intrinsic security, sometimes called a biometrics' individuality, with fingerprints as an example. © 2003 Elsevier Science B.V. All rights reserved.