
Privacy and identity theft concerns. Locking of digi-
tal content with biometrics tends to create concerns
about privacy among users, since breaches of the
security can potentially compromise the biometric
security for large numbers of users.
Summary
This chapter provides a broad overview of vulnerabil-
ities in biometric systems. Vulnerabilities are defined in
terms of possible active attacks against bio metric sys-
tems. A model of biometric processing [2] is consid-
ered in detail, and the potential vulnerabilities at each
stage of processing are considered: identity claim, pre-
sentation, sensor, segmentation, feature extraction, qual-
ity control, template creation, data storage, matching,
and decision. To understand the vulnerabilities of a large
biometric system, attack tree methods are explained.
Finally, four example scenarios are given for biometric
applications, the vulnerabilities are considered: govern-
ment identity cards, physical access, computer and net-
work access, and digital content protection. However, in
addition to the vulnerabilities specific to the biometric
technology, it is important to note that the vulnerabil-
ities of any networked computer security system contin-
ue to be a concern; specifically, such systems are
vulnerable to social engineering and all the security
issues which plague modern computer networks. Fi-
nally, biometric vulnerabilities must be compared to
those of the systems they are designed to replace. In
many cases, the bio metric system, with the vulnerabil-
ities considered in this chapter, will still be dramatically
more secure than identity cards, passwords, or other
tokens.
Related Entries
▶ Biometric Encryption
▶ Biometric Security, Overview
▶ Biometric System Design, Overview
▶ Biometrics Security, Standardization
▶ Cancelable Biometrics
▶ Fraud Reduction, Application
▶ Fraud Reduction, Overview
▶ Security Issues, System Design
▶ Tampler-Proof OS Zero-Effort Forgery Test
References
1. Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, NJ,
USA (2003)
2. ISO: Standing Document 2, version 5 – Harmonized Biometric
Vocabulary. Technical Report ISO/IEC JTC 1/SC 37 N 1480
(2006)
3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and
privacy in biometrics-based authentication systems. IBM Syst.
J. 40, 614–634 (2001)
4. Cukic, B., Barlow, N.: Threats and countermeasures, In Proc.
Biometric Consortium Conference, Washington DC, USA (2005)
5. Tilton, C: Biometrics in E-Authentication: Threat model.
Biometrics Consortium Conference, Baltimore, MD, USA
(2006)
6. Uludag, U., Jain, A.K.: Attacks on biometric systems: A case
study in fingerprints. In Proc. SPIE-EI 2004, Security, Stegano-
graphy and Watermarking of Multimedia Contents VI 5306,
622–633 (2004)
7. Salter, M.B.: Passports, mobility, and security: How smart can
the border be?. Int. Stud. Persp. 5, 71–91 (2004)
8. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Im-
pact of artificial ‘‘gummy’’ fingers on fingerprint Systems. Proc
SPIE, 4677, January (2002)
9. Thalheim, L., Krissler, J.: Body check: Biometric access protec-
tion devices and their programs put to the test. ct magazine,
November (2002)
10. International Biometric Group, Liveness Detection in Bio-
metric Systems, http://www.ibgweb.com/reports/public/reports/
liveness.html
11. Daugman, J.: Iris recognition and spoofing countermeasures. 7
th
Int. Biometric Conference, London (2002)
12. Derakhshani, R., Schuckers, S.A.C., Hornak, L.A., O’Gorman, L.:
Determination of vitality from a non-invasive biomedical mea-
surement for use in fingerprint scanners. Pattern Recognition
36, 386–396 (2003)
13. The Guardian (17 Nov. 2006) Cracked it!
14. Doddington, G., Liggett, W., Martin, A., Przybocki, N.,
Reynolds, D.: Sheep, goats, lambs and wolves: an analysis of
individual differences in speaker recognition performance. In
Proc. Int. Conf. Auditory-Visual Speech Processing, Sidney,
Australia (1998)
15. International Biometric Group: Generating images from tem-
plates. http://www.ibgweb.com/reports/public/reports/templates
_images.html (2002)
16. Jain, A.K., Nagar, A., Nandakumar, K.: Biometric template
security. EURASIP. J. Adv. Signal. Proc. chapter ID 579416, 17
(2008)
17. International Labour Organization: Biometric Testing
Campaign Report (Addendum to Part I). Geneva (2005)
18. International Committee for Information Technology Standards
(INCITS): Study Report on Biometrics in E-Authentication,
Technical Report INCITS M1/06-0693 (2006)
19. Schneier, B.: Attack trees. Dr. Dobb’s J. (1999)
20. Moore, A.P., Ellison, R.J., Linger, R.C.: Attack Modeling for
Information Security and Survivability. Carnegie Mellon Uni-
versity, Pittsburgh, PA, USA (2001)
Biometric Vulnerabilities, Overview
B
167
B