{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Attacks Against Biometric SystemsAttacks Systems

Attacks Against Biometric SystemsAttacks Systems -...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Attacks Against Biometric  SystemsAttacks Systems •Attack 1: A fake biometric (e.g., an artificial finger) is  presented at the sensor •Attack 2: Illegally intercepted data is resubmitted  (replay) •Attack 3: Feature detector is replaced by a Trojan  horse program •It produces feature sets chosen by the attacker •Attack 4: Legitimate features are replaced with a  synthetic feature set
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: •Attack 5: Matcher is replaced by a Trojan horse program •It produces scores chosen by the attacker •Attack 6: Templates in the database are modified, removed, or new templates are added •Attack 7: The transferred template information is altered in the communication channel •Attack 8: The matching result (e.g., accept/reject) is overridden...
View Full Document

{[ snackBarMessage ]}

Page1 / 2

Attacks Against Biometric SystemsAttacks Systems -...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online