Biometric system vulnerabilities: A typology of metadata

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used to protect assets and people in several areas such as commercial, forensic and government applications. As a first step, a metadata analysis was performed. A focus has then been placed on their role in the fight against biometric vulnerabilities. Thus, the vulnerabilities studied have been classified into two main categories: intrinsic limits and adverse attacks. Finally, one of the scenarios considered was implemented, particularly the case of the combination of skin color with facial recognition. The implementation resulted in encouraging results with an Area Under the Curve (AUC) of 0.826 for the face system and 0.908 for the multimodal system.

Cite

CITATION STYLE

APA

Sobabe, A. A., Djara, T., & Vianou, A. (2020). Biometric system vulnerabilities: A typology of metadata. Advances in Science, Technology and Engineering Systems, 5(1), 191–200. https://doi.org/10.25046/aj050125

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free