Security threats of finger print biometric in network system environment
Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand,...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Design for Scientific Renaissance
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/2865/ http://irep.iium.edu.my/2865/ http://irep.iium.edu.my/2865/1/17.pdf |
id |
iium-2865 |
---|---|
recordtype |
eprints |
spelling |
iium-28652011-09-13T00:24:38Z http://irep.iium.edu.my/2865/ Security threats of finger print biometric in network system environment Taha, Imad Ahmad, Mohammad A. QA75 Electronic computers. Computer science T58.5 Information technology Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see some of the arguments of the vulnerabilities and security threats. Based on that, analysis and surveying, experimental solutions and countermeasures are presented. Design for Scientific Renaissance 2011-09-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/2865/1/17.pdf Taha, Imad and Ahmad, Mohammad A. (2011) Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR), 1 (1). pp. 36-51. ISSN 2231-8852 http://www.sign-ific-ance.co.uk/dsr/index.php/JACSTR |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science T58.5 Information technology |
spellingShingle |
QA75 Electronic computers. Computer science T58.5 Information technology Taha, Imad Ahmad, Mohammad A. Security threats of finger print biometric in network system environment |
description |
Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see some of the arguments of the vulnerabilities and security threats. Based on that, analysis and surveying, experimental solutions and countermeasures are presented. |
format |
Article |
author |
Taha, Imad Ahmad, Mohammad A. |
author_facet |
Taha, Imad Ahmad, Mohammad A. |
author_sort |
Taha, Imad |
title |
Security threats of finger print biometric in network system environment |
title_short |
Security threats of finger print biometric in network system environment |
title_full |
Security threats of finger print biometric in network system environment |
title_fullStr |
Security threats of finger print biometric in network system environment |
title_full_unstemmed |
Security threats of finger print biometric in network system environment |
title_sort |
security threats of finger print biometric in network system environment |
publisher |
Design for Scientific Renaissance |
publishDate |
2011 |
url |
http://irep.iium.edu.my/2865/ http://irep.iium.edu.my/2865/ http://irep.iium.edu.my/2865/1/17.pdf |
first_indexed |
2023-09-18T20:10:32Z |
last_indexed |
2023-09-18T20:10:32Z |
_version_ |
1777407447588143104 |