{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T23:18:14Z","timestamp":1772493494294,"version":"3.50.1"},"reference-count":59,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cisim.2010.5643698","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:34:10Z","timestamp":1291152850000},"page":"19-28","source":"Crossref","is-referenced-by-count":21,"title":["Security of biometric authentication systems"],"prefix":"10.1109","author":[{"given":"Vashek","family":"Matyas","sequence":"first","affiliation":[]},{"given":"Zdenek","family":"Riha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.10.043"},{"key":"ref38","year":"0","journal-title":"Liveness Detection in Biometric Systems"},{"key":"ref33","article-title":"X.I081-The Telebiometric Multimodal Model-A Framework for the Specification of Security Aspects of Telebiometrics","year":"0"},{"key":"ref32","article-title":"Harmonized Biometric Vocabulary","year":"0"},{"key":"ref31","article-title":"ISO 19794&#x2013;6 Biometric Data Interchange Formats-Part 6: Iris Image Data","year":"0"},{"key":"ref30","article-title":"ISO\/IEC FCD 24745 Information technology-Biometric information protection","year":"0"},{"key":"ref37","article-title":"New shielding functions to enhance privacy and prevent misuse of biometric templates","author":"linnartz","year":"2003","journal-title":"Proc 4th Int Conf AVBPA"},{"key":"ref36","article-title":"Detector for recognizing the living character of a finger in a fingerprint recognizing apparatus","author":"kallo","year":"2001"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1145\/319709.319714","article-title":"A Fuzzy Commitment Scheme","author":"juels","year":"1999","journal-title":"Proc Sixth ACM Conf Computer and Comm Security"},{"key":"ref34","article-title":"Fuzzy Commitment","author":"juels","year":"2004","journal-title":"DIMACS Workshop on Cryp-tographv Theory Meets Practice"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1108\/09685220210436949","article-title":"Private Key Generation from OnLine Handwritten Signatures","volume":"10","author":"hao","year":"2002","journal-title":"Information Management & Computer Security"},{"key":"ref27","article-title":"Combining Crypto with Biometrics Effectively","volume":"55","author":"hao","year":"2006","journal-title":"IEEE Transactions on Computers"},{"key":"ref29","article-title":"Airport Biometrics Access Control Qualified Products Lists (QPL)","author":"hendricks","year":"2010","journal-title":"Qualifying Identity and Privilege Credential Products for the Transportation Worker Identification Credential (TWIC) and other DHS\/TSA programs Qualified Product Lists (QPL)"},{"key":"ref2","article-title":"Reconstruction of source images from quantized biometric match score data","author":"adler","year":"2004","journal-title":"Proc 2004 Biometric Consortium Conf"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/s10044-008-0120-3","article-title":"Towards a Measure of Biometric Information","volume":"12","author":"adler","year":"2009","journal-title":"Pattern Analysis & Applications"},{"key":"ref20","first-page":"158","article-title":"Some Recent Research Aspects of Threshold Cryptography","author":"desmedt","year":"1997","journal-title":"Information Security IEE Proceedings"},{"key":"ref22","article-title":"FRONTEX (2007) BIOPASS-Study on Automated Biometric Border Crossing Systems for Registered Passenger at Four European Airports","year":"2007"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","article-title":"Fuzzy extractors: How to Generate Strong Keys from Biometric and Other Noisy Data","author":"dodis","year":"2004","journal-title":"Proc Eurocrypt 2004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12368-9_12"},{"key":"ref23","article-title":"FRONTEX (2010) BIOPASS II-Automated biometric border crossing systems based on electronic passports and facial recognition: RAPID and SmartGate","year":"2010"},{"key":"ref26","article-title":"MINEX, Performance and Interoperability of the INCITS 378 Fingerprint Template","author":"grother","year":"2006","journal-title":"NISTIR 7296"},{"key":"ref25","first-page":"1","article-title":"Computation of Cryptographic Keys from Face Biometrics","author":"goh","year":"2003","journal-title":"Proc Int'l Federation for Information Processing 2003"},{"key":"ref50","article-title":"Fingerprint capture and the German Experience","volume":"4","author":"seidel","year":"2009","journal-title":"MRTD Report"},{"key":"ref51","article-title":"Biometric Encryption","author":"soutar","year":"1999","journal-title":"ICSA Guide to Cryptography"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.12.028"},{"key":"ref58","article-title":"Equating Biometric Entropy","author":"young","year":"2006","journal-title":"Biometric Consortium Conference"},{"key":"ref57","article-title":"Protocols Using Keys from Faulty Data","author":"wheeler","year":"2001","journal-title":"Security Protocols Workshop 2001"},{"key":"ref56","first-page":"622","article-title":"Attacks on biometric systems: a case study in fingerprints","author":"uludag","year":"2004","journal-title":"Proc SPIE-EI 2004"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146282"},{"key":"ref54","article-title":"Body Check","author":"thalheim","year":"2002","journal-title":"c't magazine 1112002"},{"key":"ref53","first-page":"436","article-title":"Practical Biometric Authentication with Template Protection","author":"tuyls","year":"2005","journal-title":"AVBPA 2005"},{"key":"ref52","article-title":"Biometric System Security","author":"soutar","year":"0","journal-title":"White Paper Bioscrypt"},{"key":"ref10","article-title":"Best Practices in Testing and Reporting Performance of Biometric Devices","year":"0"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/11426639_9","article-title":"Secure Remote Authentication Using Biometric Data","author":"boyen","year":"2005","journal-title":"Advances in Cryptology-EUROCRYPT 2005"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1117\/12.462719","article-title":"Impact of Artificial &#x2018;Gummy&#x2019; Fingers on Fingerprint Systems","author":"matsumoto","year":"2002","journal-title":"SPIE Optical Security and Counterfeit Deterrence Techniques IV"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-009-0089-0"},{"key":"ref13","article-title":"The trouble with biometrics","volume":"24","author":"calabrese","year":"1999","journal-title":"login"},{"key":"ref14","article-title":"How to fake fingerprints?","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/982507.982516"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/11507840_22","article-title":"Approximate Message Authentication and Biometric Entity Authentication","author":"crescenzo","year":"2005","journal-title":"Financial Cryptography and Data Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-72201-1_6"},{"key":"ref18","article-title":"Anti-spoofing Liveness Detection","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00038-9"},{"key":"ref4","article-title":"Information content of biometric features","author":"adler","year":"2005","journal-title":"Biometric Consortium 2005"},{"key":"ref3","article-title":"Vulnerabilities in biometric encryption systems","author":"adler","year":"2004","journal-title":"NATO RTA Workshop Enhancing Information Systems Security-Biometrics IST-044-RWS-007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455801"},{"key":"ref5","article-title":"The practical subtleties of biometric key generation","author":"ballard","year":"2008","journal-title":"Proceedings of The 17th Conference on Security Symposium"},{"key":"ref8","article-title":"Biometrics, enrolment trial","year":"0","journal-title":"Management Summary"},{"key":"ref7","article-title":"Next Generation German e-Passport Fingerprint Enrolment-Quality vs. Time","author":"bausinger","year":"2007","journal-title":"NIST Biometric Quality Workshop 2007 NIST"},{"key":"ref49","article-title":"A Multispectral Sensor for Fingerprint Spoof Detection","author":"rowe","year":"2005","journal-title":"SENSORS"},{"key":"ref9","author":"bicz","year":"2003","journal-title":"The Impossibility of Faking Optel's Ultrasonic Fingerprint Scanners"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35528-3_17"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0090-5"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-984-2_10"},{"key":"ref42","article-title":"To-ward Speech-Generated Cryptographic Keys on Resource Constrained Devices","author":"monrose","year":"2002","journal-title":"USENIX Security Workshop 2002"},{"key":"ref41","year":"0"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7408","article-title":"FRVT 2006 and ICE 2006 Large-Scale Results","author":"phillips","year":"2007"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1145\/319709.319720","article-title":"Password Hardening Based on Keystroke Dynamics","author":"monrose","year":"1999","journal-title":"Proc Sixth ACM Conf Computer and Comm Security"}],"event":{"name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","location":"Krackow, Poland","start":{"date-parts":[[2010,10,8]]},"end":{"date-parts":[[2010,10,10]]}},"container-title":["2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5637902\/5643452\/05643698.pdf?arnumber=5643698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T09:53:51Z","timestamp":1685872431000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5643698\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/cisim.2010.5643698","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}