Provoking security: Spoofing attacks against crypto-biometric systems.
Christina-Angeliki ToliBart PreneelPublished in: WorldCIS (2015)
Keyphrases
- biometric systems
- biometric template
- security protocols
- biometric identification
- biometric authentication
- personal identification
- biometric data
- security mechanisms
- user authentication
- authentication systems
- personal authentication
- multimodal biometric systems
- palmprint
- biometric recognition
- security threats
- cryptographic algorithms
- advanced encryption standard
- countermeasures
- key management
- image processing
- resource constrained
- security requirements
- security issues
- feature representation
- authentication protocol
- iris recognition
- information security