Software attacks on iris recognition systems

Software attacks on iris recognition systems

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Iris and Periocular Biometric Recognition — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The wide deployment of biometric systems over the last few years has motivated an increased amount of research on both vulnerabilities ofbiometric schemes to software attacks and the development of appropriate countermeasures. The focus is not limited any more to decreasing error rates or verification time, but it is slowly moving towards the analysis of the security and privacy granted by biometric systems. The works summarized in this chapter have shown that even the biometric characteristics considered the most secure due to its inherent stochastic nature, such as the iris, are vulnerable to a non-negligible number of external attacks. In an attempt to reduce such vulnerabilities, some countermeasures have been proposed.

Chapter Contents:

  • 13.1 Introduction
  • 13.2 Hill-climbing based attacks
  • 13.3 Synthetic iris generation
  • 13.3.1 False acceptance attacks based on fully synthetic iris
  • 13.3.2 Inverse biometrics attacks
  • 13.4 Software attacks on biometric template protection schemes
  • 13.4.1 Stolen key-inversion attacks
  • 13.4.2 Attacks via record multiplicity
  • 13.5 Countermeasures to software attacks
  • 13.6 Conclusions
  • References

Inspec keywords: security of data; iris recognition

Other keywords: software attacks; iris recognition systems; external attacks

Subjects: Data security; Computer vision and image processing techniques; Image recognition

Preview this chapter:
Zoom in

Software attacks on iris recognition systems, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse005e/PBSE005E_ch13-1.gif /docserver/preview/fulltext/books/sc/pbse005e/PBSE005E_ch13-2.gif

Related content

This is a required field
Please enter a valid email address