In this paper we give a survey of biometrical applications in security context. We start with a brief overview of the different biometric modalities which are most frequently used and compare their security contribution with classical cryptographic primitives. We then consider the case of fingerprints when used as password surrogates. We discuss the main security concerns of biometry in more detail on this practical example and make a point that the false accept error probability should be considered as the de facto measure of security.
CITATION STYLE
Tams, B., Rassias, M. T., & Mihailescu, P. (2015). Current challenges for IT security with focus on biometry. In Computation, Cryptography, and Network Security (pp. 461–491). Springer International Publishing. https://doi.org/10.1007/978-3-319-18275-9_21
Mendeley helps you to discover research relevant for your work.