Several biometric threats systems models have been proposed to facilitate the design, implementation and validation techniques for securing these systems. Some models classify threats by type of attacks, others by specific attacks and other by using vulnerabilities and threat agent. Each model proposes a vision and a different approach to identify these threats. For example, to design security techniques for wireless biometric card, one should identify all threats facing this kind of device. In this paper, a comparative study and synthesis to help choose the most fitting model, depending on the security problems addressed, is given.
|Title of host publication||Computational Aspects of Social Networks (CASoN), 2012 Fourth International Conference on|
|Place of Publication||Piscataway, NJ|
|Publication status||Published - 2012|