Issues and Concerns in Biometric IT Security
Philip Statham, CESG, U.K.
Biometric Source Feature and Biometric Image—A Note on Terminology
Authentication, Identification, and Verification
Positive Identification and Verification Applications
Negative Identification Applications
Measuring Biometric System Performance
Performance Test Results Available in the Public Domain
Spoofing, Mimicry, and Liveness Detection
Capturing the Biometric Characteristics Belonging to an Enrollee
Manufacturing an Artifact Containing a Copy of the Captured Biometric Source Feature
Protecting Data Within the Biometric System
Transitory Data and Data Flow Protection
Reverse Engineering of Templates
Latent and Residual Images Within the Biometric System
Binding Biometric Templates to Applications
Biometric Encryption and Templateless Biometrics
Biometrics Do Not Provide Absolute Identification
Biometrics Do Not Possess the Equivalent Level of Randomness That Passwords Have
Biometrics Cannot Be Changed When Compromised
Biometrics May Not Offer Nonrepudiation
Biometric Characteristics May Be Collected Accidentally or Covertly Without Consent
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.