Measuring and mitigating targeted biometric impersonation.
John D. BustardJohn N. CarterMark S. NixonAbdenour HadidPublished in: IET Biom. (2014)
Keyphrases
- security analysis
- smart card
- pattern recognition
- identity verification
- authentication protocol
- user authentication
- biometric identification
- risk management
- personal identification
- biometric authentication
- biometric systems
- learning algorithm
- person authentication
- biometric data
- iris recognition
- palmprint
- decision support system
- feature vectors
- neural network
- target audience