Download Get cached

Transcript
6.2.5 False Rejection Rate (FRR)..................................................................... 75
6.2.6 False Acceptance Rate (FAR) ................................................................. 75
6.2.7 Failure to Enrol Rate (FTER) .................................................................. 75
6.3 Problems with Fingerprint Technology .......................................................... 76
6.3.1 Distortion of the Image ........................................................................... 76
6.3.2 Incorrect Placement of Finger ................................................................. 77
6.3.3 Missing Minutiae .................................................................................... 77
6.3.4 Malicious Users ...................................................................................... 77
6.3.5 Attacks.................................................................................................... 78
6.3.6 Defences ................................................................................................. 81
6.4 Liveness Testing............................................................................................ 82
6.4.1 Intrinsic Properties of a Human Body...................................................... 83
6.4.2 Involuntary Signal Generated by the Body .............................................. 84
6.4.3 Responses to a Stimulus.......................................................................... 84
6.4.4 Weak and Strong Liveness Tests............................................................. 85
6.5 Fingerprint Standards..................................................................................... 86
6.5.1 ISO 7816 part 11..................................................................................... 86
6.5.2 BioAPI.................................................................................................... 87
6.6 Summary ....................................................................................................... 87
Chapter 7: Smart Card VeriSys: A High Level Description ......................89
7.1 Introduction ................................................................................................... 89
7.2 Smart Card VeriSys ....................................................................................... 89
7.2.1 Registration............................................................................................. 89
7.2.2 Authentication ........................................................................................ 90
7.2.3 Smart Card.............................................................................................. 91
7.3 Summary ....................................................................................................... 92
Chapter 8: Hardware and Software used for the Smart Card VeriSys.....93
8.1 Introduction ................................................................................................... 93
8.2 Smart Cards and Reader................................................................................. 93
8.3 Computer....................................................................................................... 95
8.4 Software ........................................................................................................ 95
8.5 Security Settings............................................................................................ 97
8.5.1 Security Levels for Template Matching................................................... 97
8.5.2 Anti-spoofing Security Settings............................................................... 97
6