Biometric systems, modalities and attacks

Biometric systems, modalities and attacks

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Information Security: Foundations, Technologies and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter will present a detailed overview of biometric systems and how they work. The system attributes, performance metrics, modalities are all discussed, alongside an analysis of attacks that exist against biometric systems. Given the limitations that exist in all biometric systems, a trend in biometric research is towards the use of multibiometric systems, which seek to overcome the issues through the application of multiple modalities, algorithms, instances or samples. These systems and the approaches that exist are presented. The chapter ends with a discussion of the efforts being made with the standardization of the domain - which has been the essential factor in bringing biometrics from a niche into the mainstream.

Chapter Contents:

  • 4.1 Introduction
  • 4.2 Biometric components and attributes
  • 4.3 Biometric performance characteristics
  • 4.4 Physiological biometric approaches
  • 4.4.1 Ear geometry
  • 4.4.2 Facial recognition
  • 4.4.3 Facial thermogram
  • 4.4.4 Fingerprint recognition
  • 4.4.5 Hand geometry
  • 4.4.6 Iris recognition
  • 4.4.7 Retinal recognition
  • 4.4.8 Vascular pattern recognition
  • 4.5 Behavioural biometric approaches
  • 4.5.1 Behavioural profiling
  • 4.5.2 Gait recognition
  • 4.5.3 Keystroke analysis
  • 4.5.4 Signature recognition
  • 4.5.5 Speaker recognition (or voice verification)
  • 4.6 Attacks against biometrics
  • 4.7 Multibiometrics
  • 4.7.1 Fusion
  • 4.7.2 Performance of multimodal systems
  • 4.8 Biometric standards
  • 4.9 Conclusions
  • References

Inspec keywords: biometrics (access control); security of data

Other keywords: multibiometric systems; attack analysis; biometric systems; system attributes; biometric attacks; performance metrics; biometric modalities

Subjects: Data security

Preview this chapter:
Zoom in

Biometric systems, modalities and attacks, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch4-1.gif /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch4-2.gif

Related content

This is a required field
Please enter a valid email address