Security threats of finger print biometric in network system environment

Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand,...

Full description

Bibliographic Details
Main Authors: Taha, Imad, Ahmad, Mohammad A.
Format: Article
Language:English
Published: Design for Scientific Renaissance 2011
Subjects:
Online Access:http://irep.iium.edu.my/2865/
http://irep.iium.edu.my/2865/
http://irep.iium.edu.my/2865/1/17.pdf
id iium-2865
recordtype eprints
spelling iium-28652011-09-13T00:24:38Z http://irep.iium.edu.my/2865/ Security threats of finger print biometric in network system environment Taha, Imad Ahmad, Mohammad A. QA75 Electronic computers. Computer science T58.5 Information technology Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see some of the arguments of the vulnerabilities and security threats. Based on that, analysis and surveying, experimental solutions and countermeasures are presented. Design for Scientific Renaissance 2011-09-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/2865/1/17.pdf Taha, Imad and Ahmad, Mohammad A. (2011) Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR), 1 (1). pp. 36-51. ISSN 2231-8852 http://www.sign-ific-ance.co.uk/dsr/index.php/JACSTR
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
T58.5 Information technology
spellingShingle QA75 Electronic computers. Computer science
T58.5 Information technology
Taha, Imad
Ahmad, Mohammad A.
Security threats of finger print biometric in network system environment
description Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see some of the arguments of the vulnerabilities and security threats. Based on that, analysis and surveying, experimental solutions and countermeasures are presented.
format Article
author Taha, Imad
Ahmad, Mohammad A.
author_facet Taha, Imad
Ahmad, Mohammad A.
author_sort Taha, Imad
title Security threats of finger print biometric in network system environment
title_short Security threats of finger print biometric in network system environment
title_full Security threats of finger print biometric in network system environment
title_fullStr Security threats of finger print biometric in network system environment
title_full_unstemmed Security threats of finger print biometric in network system environment
title_sort security threats of finger print biometric in network system environment
publisher Design for Scientific Renaissance
publishDate 2011
url http://irep.iium.edu.my/2865/
http://irep.iium.edu.my/2865/
http://irep.iium.edu.my/2865/1/17.pdf
first_indexed 2023-09-18T20:10:32Z
last_indexed 2023-09-18T20:10:32Z
_version_ 1777407447588143104