Academic literature on the topic 'Vulnerabilities of biometric system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerabilities of biometric system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Vulnerabilities of biometric system"

1

Sobabe, Abdou-Aziz, Tahirou Djara, and Antoine Vianou. "Biometric System Vulnerabilities: A Typology of Metadata." Advances in Science, Technology and Engineering Systems Journal 5, no. 1 (2020): 191–200. http://dx.doi.org/10.25046/aj050125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Yogendra Narain, and Sanjay Kumar Singh. "A taxonomy of biometric system vulnerabilities and defences." International Journal of Biometrics 5, no. 2 (2013): 137. http://dx.doi.org/10.1504/ijbm.2013.052964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Govind, Mozakker Anam, Md Sajid, and Dr Sakthivel M. "Finger Print Voting System." International Research Journal of Computer Science 11, no. 04 (2024): 200–203. http://dx.doi.org/10.26562/irjcs.2024.v1104.11.

Full text
Abstract:
The field of biometrics, or the identification of people based on physiological or behavioral characteristics [6], has recently received a significant amount of attention in current research as a result of its applicability in the fields of information technology and security. With the increased usage of PIN numbers and passwords in everyday life, the vulnerabilities of these two technologies are becoming more apparent (e.g. password-cracking). Biometric authorization’s strengths are that it requires the user to be present and that it eliminates the hassles of passwords and PIN’s (or can be used in parallel with these for added security). Specifically, online identity verification, ATM machines, and building entrance authorization, are all areas where it is very useful to implement an automatic identification system.
APA, Harvard, Vancouver, ISO, and other styles
4

S Prasad, Puja. "Vulnerabilities of Biometric Authentication Systems: A Survey." HELIX 8, no. 5 (2018): 4100–4103. http://dx.doi.org/10.29042/2018-4100-4103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moorthy, Kohbalan, Kauthar Mohd Daud, Steven R. Arokiasamy, and Md Raihanul Islam Tomal. "HYBRID BIOMETRIC AUTHENTICATION FOR AUTOMATIC TELLER MACHINE." International Journal of Software Engineering and Computer Systems 10, no. 1 (2024): 32–39. http://dx.doi.org/10.15282/ijsecs.10.1.2024.3.0121.

Full text
Abstract:
Automated Teller Machines (ATMs) are a crucial part of modern life, providing users with the ability to conduct basic banking transactions electronically without the need for bank representatives. These machines are ubiquitous, particularly in developed countries, and their usage is expanding rapidly across the globe. However, this widespread adoption has highlighted significant security concerns for general users. Traditional security measures, such as Personal Identification Numbers (PINs), are increasingly proving insufficient due to issues like card theft, ATM scams, and other security breaches. To address these vulnerabilities, biometrics-based authentication is emerging as a promising alternative. Unlike traditional password or PIN-based methods, biometric authentication uses unique physical characteristics, such as fingerprints, to verify identity. This method offers a higher level of security by making it significantly harder for unauthorized users to access accounts. In this research, we introduce a hybrid biometric authentication system for ATMs, focusing on fingerprint recognition. Our prototype aims to enhance transaction security and provide a more user-friendly experience. By integrating biometric strategies with ATMs for single verification, we aim to reduce the risks associated with PIN-based authentication and improve overall security. This approach not only addresses existing vulnerabilities but also sets the stage for more secure and reliable ATM transactions in the future.
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Sharad. "Anti-Spoofing: Liveness Detection System." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 4997–5003. https://doi.org/10.22214/ijraset.2025.70787.

Full text
Abstract:
Abstract: Face recognition systems became more susceptible to presentation attacks by digital screens, printed images, and 3D masks [3]. This paper introduces a full-fledged anti-spoofing solution based on the YOLO (You Only Look Once) frameworktoidentifyandthwart suchattemptsatspoofinginreal-time[14]. Oursystemintegrates effective object detection features with custom liveness evaluation features to form an effective security layer for biometric authentication systems. Experimental results show high accuracy in distinguishing between real users and spoofing attempts with real-time performance appropriate for practical use [4]. The study points out the efficiency of feature extraction from biometric informationusingCNNs [16] and the capacity ofTransformers to model global dependencies for improvedspoof detection [11]. By combining these approaches, the study seeks to enhance the accuracy and reliability of liveness detection, mitigating vulnerabilities in biometric authentication systems [9].
APA, Harvard, Vancouver, ISO, and other styles
7

Kancherla, Tarun. "Fingerprint-Based Voting System Using C#: A Secure Biometric Approach to Modern Elections." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 158–60. https://doi.org/10.22214/ijraset.2025.68176.

Full text
Abstract:
Integrity in elections is fundamental to democratic processes, yet traditional voting systems face significant vulnerabilities such as rigging and voter fraud. This paper introduces a biometric voting so- lution leveraging fingerprint recognition to enhance electoral transparency developed using C# and SQL Server Studio to improve electoral transparency and security. The proposed system employs bio- metric authentication to uniquely identify voters, effectively eliminating impersonation and multiple voting incidents. System performance evaluations demonstrate a biometric matching accuracy of 98%, underscoring the practicality and efficiency of biometric systems in real- world electoral environments.
APA, Harvard, Vancouver, ISO, and other styles
8

Khranovskyi, Mykola, and Andriy Kernytskyy. "Blockhain and Biometrics Challenges and Solutions." Computer Design Systems. Theory and Practice 6, no. 1 (2024): 189–98. http://dx.doi.org/10.23939/cds2024.01.189.

Full text
Abstract:
Blockchain technology has garnered significant attention in recent years due to its ability to revolutionize conventional processes by providing faster, more secure, and cost-effective solutions. This study explores the symbiotic relationship between blockchain and biometrics, investigating how these technologies can mutually reinforce each other. The research makes a dual contribution: firstly, it comprehensively analyses blockchain and biometrics, highlighting their convergence's potential advantages and obstacles. Secondly, it delves deeper into utilising blockchain for safeguarding biometric templates. Although the potential benefits outlined earlier are promising, integrating blockchain and biometric technologies faces challenges due to constraints within current blockchain technology. These constraints include a limited transaction processing capacity, the need to store all system transactions leading to increased storage demands, and insufficiently explored resilience against diverse attacks. Historically, biometric systems have been vulnerable to both physical and software-based attacks. While techniques like presentation attack detection can somewhat mitigate physical sensor vulnerabilities, safeguarding against software attacks necessitates adopting biometric template protection measures. Despite advancements in this area, there remains scope for enhancing these methods. Integrating blockchain and biometrics promises to enhance security and efficiency across various sectors. By combining blockchain's immutability and transparency with biometric data's uniqueness and reliability, organizations can establish robust systems that protect sensitive information while streamlining processes. This research underscores the importance of understanding the intricacies of merging these technologies to leverage their full potential effectively. Overall, this study sheds light on the transformative power of integrating blockchain and biometrics, offering insights into how this synergy can drive innovation, improve security measures, and optimize operations in a rapidly evolving digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
9

Abbas, Alyaa A., and Zahraa Maan Sallal. "Hybrid biometric authentication for banks security improvements." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-A (2025): 1037–50. https://doi.org/10.47974/jdmsc-2030.

Full text
Abstract:
As ATM cards, credit cards, and mobile banking become more convenient, online banking is becoming more popular around the world. Usernames, passwords, CVVs, and OTPs, although traditionally used for authentication, are susceptible to security vulnerabilities. The vulnerabilities of these systems can be exploited at will, resulting in unauthorized access to sensitive financial information. Biometric authentication, particularly the recognition of iris patterns, is proposed as a solution to these security challenges. Through the combination of traditional authentication methods and biometric traits, this system offers an additional layer of security. A secure database stores iris patterns that can be compared to a secure database to verify who is authorized to complete transactions. This provides a dependable solution for modern banking security.
APA, Harvard, Vancouver, ISO, and other styles
10

Shuwandy, Moceheb Lazam, Rawan Adel Fawzi Alsharida, and Maytham M. Hammood. "Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques." Mesopotamian Journal of CyberSecurity 5, no. 1 (2025): 165–77. https://doi.org/10.58496/mjcs/2025/011.

Full text
Abstract:
Smartphone authentication systems must balance security and user convenience, which is a persistent challenge in the digital realm. Traditional biometrics, such as fingerprints and facial recognition, face vulnerabilities to spoofing and environmental conditions, limiting reliability. This study introduces a novel approach by integrating three-dimensional (3D) touch sensors with finger location data for authentication. The goal is to develop a system that improves accuracy while minimizing false positives and negatives, leveraging touch pressure and spatial interaction as unique biometric identifiers. Data from 20 participants, including pressure levels, spatial coordinates, and timestamps, were analysed using Random Forest (RF) and Extreme Gradient Boosting (XGBoost) models. The results showed that combining pressure sensitivity with spatial data significantly improved performance, achieving an F1- score of 0.83 and an accuracy of 83%. The system demonstrated balanced precision (0.84) and recall (0.83), effectively reducing false positives and negatives. Robustness was confirmed through cross-validation tests, which validated the consistency across datasets and real-time usability scenarios. This study establishes a foundation for secure, user-friendly smartphone authentication, highlighting the potential of 3D touch technology in addressing current biometric system limitations. This approach opens avenues for further research in mobile security, integrating multimodal biometric data with advanced machine learning techniques.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Vulnerabilities of biometric system"

1

Osoka, Agu. "Assessing and protecting against vulnerabilities of biometric systems." Thesis, University of Kent, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Higbee, Matthew Somers. "Deriving System Vulnerabilities Using Log Analytics." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/6139.

Full text
Abstract:
System Administrators use many of the same tactics that are implemented by hackers to validate the security of their systems, such as port scanning and vulnerability scanning. Port scanning is slow, and can be highly inaccurate. After a scan is complete, the results of the scan must be cross checked with a vulnerability database to discover if any vulnerabilities are present. While these techniques are useful, they have severe limitations. System Administrators have full access to all of their machines. They should not have to rely exclusively on port scanning them from the outside of their machines to check for vulnerabilities when they have this level of access. This thesis introduces a novel concept for replacing port scanning with a Log File Inventory Management System. This system will be able to automatically build an accurate system inventory using existing log files. This system inventory will then be automatically cross checked with a database of known vulnerabilities in real-time resulting in faster and more accurate vulnerability reporting than is found in traditional port scanning methods.
APA, Harvard, Vancouver, ISO, and other styles
3

Jayapal, Ranjith. "Biometric encryption system for increased security." UNF Digital Commons, 2017. http://digitalcommons.unf.edu/etd/746.

Full text
Abstract:
Security is very important in present day life. In this highly-interconnected world, most of our daily activities are computer based, and the data transactions are protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords related to an individual that can lead to attacks. Indeed, remembering several passwords can become a tedious task. Biometrics is a science that measures an individual’s physical characteristics in a unique way. Thus, biometrics serves as a method to replace the cumbersome use of complex passwords. Our research uses the features of biometrics to efficiently implement a biometric encryption system with a high level of security.
APA, Harvard, Vancouver, ISO, and other styles
4

Bansal, Mamta. "Face based multimodal biometric authentication system." Thesis, IIT Delhi, 2015. http://eprint.iitd.ac.in:80//handle/2074/8179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Swabey, Matthew A. "The human auditory system as a biometric." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Muthu, Rajesh. "Development of a secure biometric recognition system." Thesis, Northumbria University, 2016. http://nrl.northumbria.ac.uk/31618/.

Full text
Abstract:
Biometric based security systems are becoming an integral part of many security agencies and organisations. These systems have a number of applications ranging from national security, law enforcement, the identification of people, particularly for building access control, the identification of suspects by the police, driver’s licences and many other spheres. However, the main challenge is to ensure the integrity of digital content under different intentional and non-intentional distortions; along with the robustness and security of the digital content. This thesis focuses on improving the security of fingerprint templates to allow accurate comparison of the fingerprint content. The current methods to generate fingerprint templates for comparison purposes mostly rely on using a single feature extraction technique such as Scale Invariant Feature Transform (SIFT) or Fingerprint Minutiae. However, the combination of two feature extraction techniques (e.g., SIFT-Minutiae) has not been studied in the literature. This research, therefore, combines the existing feature extraction techniques, SIFTHarris: Feature point detection is critical in image hashing in term of robust feature extraction, SIFT to incorporate the Harris criterion to select most robust feature points and SIFT-Wavelet: Wavelet based technique is basically used to provide more security and reliability of image, SIFT feature with efficient wavelet-based salient points to generate robust SIFT - wavelet feature that provides sufficient invariance to common image manipulations. The above said feature detector are known work well on the natural images (e.g., faces, buildings or shapes) and tests them in the new context of fingerprint images. The results in this thesis demonstrate that new approach contributes towards the improvement of fingerprint template security and accurate fingerprint comparisons. The fingerprint minutiae extraction method is combined individually with the SIFTHarris method, SIFT-Wavelet method and the SIFT method, to generate the most prominent fingerprint features. These features are post-processed into perceptual hashes using Radial Shape Context Hashing (RSCH) and Angular Shape Context Hashing (ASCH) methods. The accuracy of fingerprint comparison in each case is evaluated using the Receiver Operating Characteristic (ROC) curves. The experimental results demonstrate that for the JPEG lossy compression and geometric attacks, including rotation and translation, the fingerprint template and accuracy of fingerprint matching improved when combinations of two different Feature extraction techniques are used, in contrast to using only a single feature extraction technique. The ROC plots illustrates the SIFT-Harris-Minutiae, SIFT-Wavelet-Minutiae, SIFTMinutiae perform better than the SIFT method. The ROC plots further demonstrate that SIFT-Harris-Minutiae outperform all the other techniques. Therefore, SIFTHarris-Minutiae technique is more suitable for generating a template to compare the fingerprint content. Furthermore, this research focuses on perceptual hashing to improve the minutiae extraction of fingerprint images, even if the fingerprint image has been distorted. The extraction of hash is performed after wavelet transform and singular value decomposition (SVD). The performance evaluation of this approach includes important metrics, such as the Structural Similarity Index Measure (SSIM) and the Peak Signal-to-Noise Ratio (PSNR). Experimentally, it has confirmed its robustness against image processing operations and geometric attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Shonubi, Felix, Ciara Lynton, Joshua Odumosu, and Daryl Moten. "Exploring Vulnerabilities in Networked Telemetry." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596435.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV<br>The implementation of Integrated Network Enhanced Telemetry (iNET) in telemetry applications provides significant enhancements to telemetry operations. Unfortunately such networking brings the potential for devastating cyber-attacks and networked telemetry is also susceptible to these attacks. This paper demonstrates a worked example of a social engineering attack carried out on a test bed network, analyzing the attack process from launch to detection. For this demonstration, a penetration-testing tool is used to launch the attack. This attack will be monitored to detect its signature using a network monitoring tool, and this signature will then be used to create a rule which will trigger an alert in an Intrusion Detection System. This work highlights the importance of network security in telemetry applications and is critical to current and future telemetry networks as cyber threats are widespread and potentially devastating.
APA, Harvard, Vancouver, ISO, and other styles
8

Poon, Hoi Ting. "Towards a practical and secure biometric authentication system." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/28017.

Full text
Abstract:
The idea of merging biometrics technology with cryptography brought interesting possibilities in enhancing the security and privacy of biometrics systems. Conventional systems generally require large databases, which represent a security risk and raise privacy concerns. Biometric encryption is a method devised to hide biometric features along with a cryptographic key, which could remove the need for such biometric databases. The Fuzzy Vault scheme is one of the promising candidates for biometric encryption. This thesis analyzes the scheme and attempts to provide solutions to problems impeding the system from being used in practise. We looked at the current techniques in dealing with the noise inherent in biometric templates, in particular fingerprints, and provides insight on their implication in information and biometric security. We also present two practical decoders based on the Berlekamp-Massey algorithm and the Euclidean algorithm, and provide the first implementation of a Reed-Solomon decoder for the Fuzzy Vault scheme. Our implementation results indicate that the traditional Berlekamp-Massey algorithm may not be as suitable and efficient as Gao's Reed-Solomon decoder. In our analysis, some potential vulnerabilities were also identified. In particular, the collusion attack was found to be able to seriously reduce the security of the scheme in practise and is applicable to all existing implementations. Some possible defenses against the attack such as a one-way transform of the locking set and deterministic chaff points generation were proposed.
APA, Harvard, Vancouver, ISO, and other styles
9

McCracken, Wendy Margaret. "Service Delivery To Deaf Children : Vulnerabilities Within The System." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brown, Allanah. "The fuel transportation system in British Columbia : attributes and vulnerabilities." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59065.

Full text
Abstract:
Disasters can, and do lead to widespread disruption, often crippling transportation systems in complex ways. Transportation systems need to be designed not only to operate on an ordinary day; they need to be designed to respond to man-made and natural disasters. Proactive planning can allow transport to resume service, and deal with crises, as quickly as possible post-disaster. This thesis provides information to assist in the development of plans and protocols for emergency scenarios. Coastal communities throughout British Columbia (BC) are heavily dependent on maritime transportation for the supply of fuel, food, and other critical resources. Vancouver Island only has an estimated 3 days’ worth of food and fuel stored on the island. Without sufficient storage, or a means of producing these resources, coastal communities are highly vulnerable to maritime disruption. If transportation systems are disrupted for an extended period, communities can experience shortages to supply. This can lead to communities losing power, operations, and critical resources for survival. Through interviews and interactive workshops with industry stakeholders, this study brings forth issues and limitations within fuel transportation in BC. Current transportation systems are potentially ill equipped to deal with large-scale events with some response plans fragmented, and the decision-making infrastructure at times ad hoc. Improving a system’s preparedness through identification of hazards, and educating the industry could significantly aid the system’s response and revitalization post-disaster. Through review of current systems and plans, this thesis highlights persistent concerns within the system and begins to explore ways to improve the resilience of fuel distribution in BC. Through analyzing mitigation options, the validity of pro-active planning can be seen. The concerns and recommendations from this thesis could lay the foundation for building a more resilient system capable of executing effective emergency response.<br>Applied Science, Faculty of<br>Civil Engineering, Department of<br>Graduate
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Vulnerabilities of biometric system"

1

Dunstone, Ted, and Neil Yager, eds. Biometric System and Data Analysis. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-77627-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elsworth, John T. Design and performance of biometric system. Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chinhŭngwŏn, Hanʼguk Chŏngbo Poho, та Korea (South) Chŏngbo Tʻongsinbu, ред. Saengchʻe insik sisŭtʻem sihŏm kisul pʻyojunhwa yŏnʼgu =: A study on biometric system testing standardization. Chŏngbo Tʻongsinbu, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Piccolo, Jason J. Identifying criminal aliens within the United States criminal justice system. National University, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kuan, Hung-i. Evaluation of a biometric keystroke typing dynamics computer security system. Naval Postgraduate School, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Neil, Yager, ed. Biometric system and data analysis: Design, evaluation, and data mining. Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, United States Government Accountability. Homeland Security: Progress has been made to address the vulnerabilities exposed by 9/11, but continued federal action is needed to further mitigate security risks : report to congressional requesters, House of Representatives. U.S. Govt. Accountability Office, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Frost & Sullivan., ed. U.S. electronic access control system markets: High security requirements promote biometric identification. Frost & Sullivan, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Aviation security: Vulnerabilities and potential improvements for the air cargo system : report to congressional requesters. U.S. General Accounting Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Vulnerabilities in the U.S. passport system can be exploited by criminals and terrorists: Hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, June 29, 2005. U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Vulnerabilities of biometric system"

1

Adler, Andy. "Vulnerabilities in Biometric Encryption Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11527923_114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Tajinder, Shashi Bhushan, Pooja Sharma, and Vishal Garg. "Examining the Vulnerabilities of Biometric Systems." In Leveraging Computer Vision to Biometric Applications. Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781032614663-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Adler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities: Overview." In Encyclopedia of Biometrics. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_65-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Adler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities: Overview." In Encyclopedia of Biometrics. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_65-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Adler, Andy, and Stephanie Schuckers. "Biometric Vulnerabilities, Overview." In Encyclopedia of Biometrics. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-73003-5_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adler, Andy, and Stephanie A. C. Schuckers. "Biometric Vulnerabilities, Overview." In Encyclopedia of Biometrics. Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Colonna, Liane, and Gianluigi M. Riva. "Smart Mirrors and Data Protection Regulation." In Intelligent Systems Reference Library. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84158-3_12.

Full text
Abstract:
Abstract Smart mirrors have the potential to significantly enhance the quality of life for older adults by supporting their health, well-being, and social connectivity. However, they also introduce substantial legal and regulatory challenges, particularly in the realm of data protection. This paper aims to examine these challenges and contribute to the interdisciplinary discourse on smart mirrors, facilitating the integration of legal and technological considerations. At the outset, the paper provides an overview of smart mirrors to understand the technological foundation for which the law applies. It then explores various data protection concerns raised by smart mirrors, such as issues related to consent and transparency, security vulnerabilities, and the potential misuse of personal information. Next, the paper presents a taxonomy of key factors that influence how data protection rules apply to smart mirrors, such the physical location of the smart mirror, the context in which it is used (e.g., private home, public facility, healthcare environment), the status of the user (e.g., adult, minor, patient), the status of the service provider (e.g., manufacturer, third-party service), the involvement of any intermediaries in data processing, and the nature and sensitivity of the data being gathered (e.g., biometric data, personal health information). The paper concludes with an examination of the role of data protection by design (DPbD) in this context, highlighting the importance of incorporating regulatory compliance into smart mirrors from the beginning of its development and deployment.
APA, Harvard, Vancouver, ISO, and other styles
8

Lupu, E., and M. Cioban. "Voice Biometric System." In IFMBE Proceedings. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04292-8_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wirtz, Brigitte. "Biometric System Security." In Securing Electronic Business Processes. Vieweg+Teubner Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-84982-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Akula, Abhilash, Jeshwanth Ega, Kalyan Thota, and Gowtham. "Biometric Voting System." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Vulnerabilities of biometric system"

1

M, Vaidehi, Mesith Chaimanee, and Mithileysh Sathiyanarayanan. "Investigate the Vulnerabilities and Improvements in Biometric Authentication Systems Using Deep Learning Techniques." In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT). IEEE, 2025. https://doi.org/10.1109/ce2ct64011.2025.10939229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abdeen, Ahmad, Mahmoud Mohanna, Yusuf Mansur, and Elena Battini Sonmez. "Biometric Fraud Detection System." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

P, Poovizhi, Pavithra D, Vijaya Kumar T, Nandhakumar M, Suryadharshini G, and Sheljin S G. "Multimodal Biometric Fusion System." In 2024 International Conference on Emerging Research in Computational Science (ICERCS). IEEE, 2024. https://doi.org/10.1109/icercs63125.2024.10895379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Deepa, G., A. Vennila, A. Sudhakar, S. J. Shubhashree, and J. V. Vishvadharshan. "Smart Biometric Cabinet Locking System." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gudur, Bheemesh K., Tejashwini Ivanagimath, and Tarunkumar Rathod. "Biometric Based Portable Student Attendance System." In 2024 International Conference on Innovation and Novelty in Engineering and Technology (INNOVA). IEEE, 2024. https://doi.org/10.1109/innova63080.2024.10846952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agrawal, Subhash Chand, and Rajesh Kumar Tripathi. "Biometric Attendance System Using Face Recognition." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10688314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Menakadevi, B., D. Sathish Kumar, P. Nagasaratha, and K. Parimalam. "Biometric System Attacks-A Case Study." In 2025 International Conference on Computer, Electrical & Communication Engineering (ICCECE). IEEE, 2025. https://doi.org/10.1109/iccece61355.2025.10940734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bustard, John D., John N. Carter, and Mark S. Nixon. "Targeted impersonation as a tool for the detection of biometric system vulnerabilities." In 2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 2013. http://dx.doi.org/10.1109/btas.2013.6712744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Goicoechea-Telleria, Ines, Judith Liu-Jimenez, Raul Sanchez-Reillo, and Wendy Ponce-Hemandez. "Vulnerabilities of biometric systems integrated in mobile devices: An evaluation." In 2016 International Carnahan Conference on Security Technology (ICCST). IEEE, 2016. http://dx.doi.org/10.1109/ccst.2016.7815677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zahid, Zainab, Ammar Haider, Nosheen Sabahat, and Asim Tanwir. "Vulnerabilities in Biometric Authentication of Smartphones." In 2020 IEEE 23rd International Multitopic Conference (INMIC). IEEE, 2020. http://dx.doi.org/10.1109/inmic50486.2020.9318094.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Vulnerabilities of biometric system"

1

Koskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1763279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hasnain, Saher. Vulnerabilities in the Animal By-Products Food System. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.gud520.

Full text
Abstract:
This work was carried out by the Food Systems Transformation Group at the University of Oxford’s Environmental Change Institute and the University of York. This report has been produced by University of Oxford under a contract placed by the Food Standards Agency (the Agency). The views expressed herein are not necessarily those of the Agency. University of Oxford warrants that all reasonable skill and care has been used in preparing this report. Notwithstanding this warranty, University of Oxford shall not be under any liability for loss of profit, business, revenues or any special indirect or consequential damage of any nature whatsoever or loss of anticipated saving or for any increased costs sustained by the client or his or her servants or agents arising in any way whether directly or indirectly as a result of reliance on this report or of any error or defect in this report. We gratefully acknowledge expert advice and review by Dr John Ingram, University of Oxford; Dr Monika Zurek, University of Oxford; and Dr Philip Garnett, University of York.
APA, Harvard, Vancouver, ISO, and other styles
3

LeMay, Elizabeth, Karen Scarfone, and Peter Mell. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities. National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.ir.7864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Traditional physical infrastructure increasingly relies upon software. Yet, 75% of software projects fail in budget by 46% and schedule by 82%. While other systems generally have a “responsible-in-charge” (RIC) professional, the implementation of a similar system of accountability in software is not settled. This is a major concern, as the consequences of software failure can be a matter of life-or-death. Further, there has been a 742% average annual increase in software supply chain attacks on increasingly used open-source software over the past three years, which can cost up to millions of dollars per incident.&lt;/div&gt;&lt;div class="htmlview paragraph"&gt;&lt;b&gt;Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities&lt;/b&gt; discusses the verification, validation, and uncertainty quantification needed to vet systems before implementation and the continued maintenance measures required over the lifespan of software-integrated assets. It also proposes a certified System Software Integrator role that would be responsible for public safety in traditional infrastructure.&lt;/div&gt;&lt;div class="htmlview paragraph"&gt;&lt;a href="https://www.sae.org/publications/edge-research-reports" target="_blank"&gt;Click here to access the full SAE EDGE&lt;/a&gt;&lt;sup&gt;TM&lt;/sup&gt;&lt;a href="https://www.sae.org/publications/edge-research-reports" target="_blank"&gt; Research Report portfolio.&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;
APA, Harvard, Vancouver, ISO, and other styles
5

Erol, Selman, and Michael Junho Lee. Financial System Architecture and Technological Vulnerability. Federal Reserve Bank of New York, 2024. http://dx.doi.org/10.59576/sr.1122.

Full text
Abstract:
This paper presents a framework to study of technological resiliency of financial system architecture. Financial market infrastructures, or platforms, compete with services critical functions along various stages in the lifecycle of a trade, and make investments in technological resiliency to guard against attackers seeking to exploit system weaknesses. Platforms’ financial network effects attenuate competition between platforms on security. Exposure to vulnerabilities is magnified in the presence of strategic adversaries. Private provision of technological resiliency is generally sub-optimal, with over- and underinvestment in security depending on market structure. Vulnerabilities evolve over the maturity of a financial system, but there generically exists a tipping point at which technological resiliency diverges from optimal and creates technological drag on the financial system. We find supportive evidence in tri-party repo settlement: the exit of duopolist resulted in a significant drop in IT-related investment by the sole provider, even as peer firms ramp up investment.
APA, Harvard, Vancouver, ISO, and other styles
6

Shepard, Blake. Using a Large CYC-Based Ontology to Model and Predict Vulnerabilities at the Real-World Info-System Boundary. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada388002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lilavanichakul, Apichaya. Sustainable Agri-Food System and Resilience in Thailand - Exploring Technology-Driven Solutions for a Resilient Future. Asian Productivity Organization, 2025. https://doi.org/10.61145/gthi4179.

Full text
Abstract:
The agri-food system faces critical challenges from climate change, food insecurity, and rising consumer demands for transparency. This report explores technology-driven solutions such as digital agriculture, vertical farming, and circular economy practices to enhance sustainability and resilience. It emphasizes the role of stakeholders in addressing systemic vulnerabilities exposed by the COVID-19 pandemic and climate disruptions. Adopting equitable practices and stringent climate policies can create a sustainable future for global food systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Murphy, Maureen, Rachel Carey, and Leila Alexandra. The resilience of Melbourne's food system to climate and pandemic shocks. University of Melbourne, 2022. http://dx.doi.org/10.46580/124370.

Full text
Abstract:
This report from the Foodprint Melbourne project summarises the findings of an investigation into the resilience of Melbourne’s food system to shocks and stresses. It focuses particularly on the resilience of Melbourne’s food system to climate and pandemic shocks and stresses. However, it also considers longer term underlying stresses on Melbourne’s food system from declining supplies of natural resources and environmental degradation. The report discusses the impacts of shocks and stresses throughout the food system from food production to consumption and the generation of waste. It identifies vulnerabilities in the city’s food system to these shocks and stresses, and it discusses the features of a resilient food system.
APA, Harvard, Vancouver, ISO, and other styles
9

Abdulrahim, Sawsan, Zeinab Cherri, May Adra, and Fahed Hassan. Beyond Kafala: Employer roles in growing vulnerabilities of women migrant domestic workers. Centre for Excellence and Development Impact and Learning (CEDIL), 2023. http://dx.doi.org/10.51744/ceb7.

Full text
Abstract:
Women migrant domestic workers (WMDWs) constitute 7.7 percent of migrant workers worldwide, of whom more than a quarter live and work in the Arab region. In Lebanon, as in other Arab countries, WMDWs are recruited through the sponsorship system, Kafala. Under this system, a potential migrant worker can only obtain legal residency and a work permit in the country of destination if she is sponsored by a specific employer. Once in the destination country, the worker cannot transfer to a new employer unless granted permission by the original sponsor. The system heightens the social, economic, and legal vulnerability of WMDWs and has been described as unfree or bound labor and a system of racialized servitude. Yet, Kafala is not a written policy but rather a collection of administrative procedures, customary practices, and socially acceptable norms that are maintained by various players throughout the migration process. The question then arises as to whether advocacy efforts that focus on abolishing Kafala as a legal term would mitigate employers’ exploitative practices that violate the workers’ rights and freedoms, particularly in a country like Lebanon. This policy brief is based on a study carried out under the International Labour Organization’s (ILO) Work in Freedom project designed to mitigate the exploitation and forced labor of women migrating from South to West Asia to work in the domestic and garment sectors. This brief explores knowledge, awareness and attitudes to Kafala by employers in Lebanon.
APA, Harvard, Vancouver, ISO, and other styles
10

Miller, Andy, and Paul Higgins. Making Communities Stronger and More Secure. American Meteorological Society, 2019. https://doi.org/10.1175/strengthening-communities-2019.

Full text
Abstract:
Virtually every social and economic sector and every institution underlying modern civilization is dependent on and vulnerable to weather, water, and climate. Advances in Earth system observations, science, and services create an enormous opportunity for communities throughout the country to become stronger and more secure in the face of existing vulnerabilities and emerging risks due to climate change. This study reaffirms six areas of emphasis for strengthening communities and identifies four overarching findings that can further efforts to strengthen communities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!