Security threats of finger print biometric in network system environment

Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand,...

Full description

Bibliographic Details
Main Authors: Taha, Imad, Ahmad, Mohammad A.
Format: Article
Language:English
Published: Design for Scientific Renaissance 2011
Subjects:
Online Access:http://irep.iium.edu.my/2865/
http://irep.iium.edu.my/2865/1/17.pdf
_version_ 1848776065604911104
author Taha, Imad
Ahmad, Mohammad A.
author_facet Taha, Imad
Ahmad, Mohammad A.
author_sort Taha, Imad
building IIUM Repository
collection Online Access
description Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see some of the arguments of the vulnerabilities and security threats. Based on that, analysis and surveying, experimental solutions and countermeasures are presented.
first_indexed 2025-11-14T14:24:10Z
format Article
id iium-2865
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T14:24:10Z
publishDate 2011
publisher Design for Scientific Renaissance
recordtype eprints
repository_type Digital Repository
spelling iium-28652011-09-13T00:24:38Z http://irep.iium.edu.my/2865/ Security threats of finger print biometric in network system environment Taha, Imad Ahmad, Mohammad A. QA75 Electronic computers. Computer science T58.5 Information technology Biometrics-based personal authentication systems that use physiological (e.g., fingerprint, face) or behavioral (e.g., speech, handwriting) traits are becoming increasingly popular, compared to traditional systems that are based on tokens (e.g., key) or knowledge (e.g., password). On the other hand, biometric systems are vulnerable to attacks, which can decrease their security. This paper analyzes and surveys the vulnerabilities and security threats of the finger print biometric systems used for access control and the authentication of access to confidential information in network system environment. As analysis tools, two biometric network models are implemented and connected to see some of the arguments of the vulnerabilities and security threats. Based on that, analysis and surveying, experimental solutions and countermeasures are presented. Design for Scientific Renaissance 2011-09-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/2865/1/17.pdf Taha, Imad and Ahmad, Mohammad A. (2011) Security threats of finger print biometric in network system environment. Journal of Advanced Computer Science and Technology Research (JACSTR), 1 (1). pp. 36-51. ISSN 2231-8852 http://www.sign-ific-ance.co.uk/dsr/index.php/JACSTR
spellingShingle QA75 Electronic computers. Computer science
T58.5 Information technology
Taha, Imad
Ahmad, Mohammad A.
Security threats of finger print biometric in network system environment
title Security threats of finger print biometric in network system environment
title_full Security threats of finger print biometric in network system environment
title_fullStr Security threats of finger print biometric in network system environment
title_full_unstemmed Security threats of finger print biometric in network system environment
title_short Security threats of finger print biometric in network system environment
title_sort security threats of finger print biometric in network system environment
topic QA75 Electronic computers. Computer science
T58.5 Information technology
url http://irep.iium.edu.my/2865/
http://irep.iium.edu.my/2865/
http://irep.iium.edu.my/2865/1/17.pdf