Database-centric chain-of-custody in biometric forensic systems

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Biometric systems gain more and more attention in everyday life regarding authentication and surveillance of persons. This includes, amongst others, the login on a notebook based on fingerprint verification, controlling of airports or train stations, and the biometric identity card. Although these systems have several advantages in comparison to traditional approaches, they exhibit high risks regarding confidentiality and data protection issues. For instance, tampering biometric data or general misuse could have devastating consequences for the owner of the respective data. Furthermore, the digital nature of biometric data raises specific requirements for the usage of the data for crime detection or at court to convict a criminal. Here, the chain-of-custody has to be proven without any doubt. In this paper, we present a database-centric approach for ensuring the chain-of-custody in a forensic digital fingerprint system. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Schäler, M., Schulze, S., & Kiltz, S. (2011). Database-centric chain-of-custody in biometric forensic systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6583 LNCS, pp. 250–261). https://doi.org/10.1007/978-3-642-19530-3_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free