Attack 4 - •This is the secret datathat attacker wants to...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Attack 4: Bypass Feature Extractor •Hill climbing-basedattacker for a minutiae-basedfingerprint authentication  system •Location  (r,c) and orientation  of the minutiae used θ •Template information unknownto the attacker
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: •This is the secret datathat attacker wants to mimic •Synthetic minutiae setsinput to the matcher •Attacker tries to generate a minutia set that results in a high matching score using the scores returned by the matcher....
View Full Document

This document was uploaded on 11/03/2011 for the course BIOLOGY BSC1105 at Broward College.

Ask a homework question - tutors are online