This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: •Attack 5: Matcher is replaced by a Trojan horse program •It produces scores chosen by the attacker •Attack 6: Templates in the database are modified, removed, or new templates are added •Attack 7: The transferred template information is altered in the communication channel •Attack 8: The matching result (e.g., accept/reject) is overridden...
View Full Document
- Fall '10
- Biology, Biometric SystemsAttacks Systems