Login / Signup
Targeted impersonation as a tool for the detection of biometric system vulnerabilities.
John D. Bustard
John N. Carter
Mark S. Nixon
Published in:
BTAS (2013)
Keyphrases
</>
biometric systems
detection method
hand geometry
biometric identification
personal identification
biometric authentication
smart card
user authentication
security analysis
multimodal biometric systems
image processing
matching score
palmprint
distance measure
object detection
input image
multiscale