Security analysis for biometric data in ID documents

S. Schimke, S. Kiltz, C. Vielhauer, A.A.C.M. Kalker

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
1 Downloads (Pure)

Abstract

In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.
Original languageEnglish
Title of host publicationProceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 17-1-2005, San Jose, Ca, USA
Pages474-485
DOIs
Publication statusPublished - 2005
EventSecurity, Steganography, and Watermarking of Multimedia Contents VII - San Jose, United States
Duration: 21 Apr 200521 Apr 2005

Publication series

NameProceedings of SPIE
Volume5681
ISSN (Print)0277-786X

Conference

ConferenceSecurity, Steganography, and Watermarking of Multimedia Contents VII
CountryUnited States
CitySan Jose
Period21/04/0521/04/05
OtherPart of: 2005 SPIE and IS&T Electronic Imaging Conference

Fingerprint

Dive into the research topics of 'Security analysis for biometric data in ID documents'. Together they form a unique fingerprint.

Cite this