Performance and Security of Biometric Fusion against Spoof Attacks.
Zahid AkhtarMohammed RizwanSandeep KalePublished in: IICAI (2011)
Keyphrases
- biometric systems
- score level fusion
- biometric template
- multimodal biometrics
- biometric data
- biometric identification
- biometric authentication
- identity verification
- matching score
- personal identification
- fuzzy vault
- authentication systems
- person authentication
- biometric recognition
- palmprint
- match scores
- security problems
- security mechanisms
- user authentication
- security threats
- countermeasures
- security issues
- security vulnerabilities
- cyber attacks
- information security
- security breaches
- security systems
- data fusion
- computer security
- java card
- feature representation
- denial of service attacks
- security flaws
- image fusion
- security protocols
- security requirements
- protection scheme
- chosen plaintext
- border control
- buffer overflow
- malicious users
- stream cipher
- ddos attacks
- cryptographic protocols
- malicious attacks
- security measures