Download Get cached
Transcript
6.2.5 False Rejection Rate (FRR)..................................................................... 75 6.2.6 False Acceptance Rate (FAR) ................................................................. 75 6.2.7 Failure to Enrol Rate (FTER) .................................................................. 75 6.3 Problems with Fingerprint Technology .......................................................... 76 6.3.1 Distortion of the Image ........................................................................... 76 6.3.2 Incorrect Placement of Finger ................................................................. 77 6.3.3 Missing Minutiae .................................................................................... 77 6.3.4 Malicious Users ...................................................................................... 77 6.3.5 Attacks.................................................................................................... 78 6.3.6 Defences ................................................................................................. 81 6.4 Liveness Testing............................................................................................ 82 6.4.1 Intrinsic Properties of a Human Body...................................................... 83 6.4.2 Involuntary Signal Generated by the Body .............................................. 84 6.4.3 Responses to a Stimulus.......................................................................... 84 6.4.4 Weak and Strong Liveness Tests............................................................. 85 6.5 Fingerprint Standards..................................................................................... 86 6.5.1 ISO 7816 part 11..................................................................................... 86 6.5.2 BioAPI.................................................................................................... 87 6.6 Summary ....................................................................................................... 87 Chapter 7: Smart Card VeriSys: A High Level Description ......................89 7.1 Introduction ................................................................................................... 89 7.2 Smart Card VeriSys ....................................................................................... 89 7.2.1 Registration............................................................................................. 89 7.2.2 Authentication ........................................................................................ 90 7.2.3 Smart Card.............................................................................................. 91 7.3 Summary ....................................................................................................... 92 Chapter 8: Hardware and Software used for the Smart Card VeriSys.....93 8.1 Introduction ................................................................................................... 93 8.2 Smart Cards and Reader................................................................................. 93 8.3 Computer....................................................................................................... 95 8.4 Software ........................................................................................................ 95 8.5 Security Settings............................................................................................ 97 8.5.1 Security Levels for Template Matching................................................... 97 8.5.2 Anti-spoofing Security Settings............................................................... 97 6