Analysis of brute-force break-ins of a palmprint authentication system

Adams W.K. Kong, Dapeng Zhang, Mohamed Kamel

Research output: Journal article publicationJournal articleAcademic researchpeer-review

28 Citations (Scopus)


Biometric authentication systems are widely applied because they offer inherent advantages over classical knowledge-based and token-based personal-identification approaches. This has led to the development of products using palmprints as biometric traits and their use in several real applications. However, as biometric systems are vulnerable to replay, database, and brute-force attacks, such potential attacks must be analyzed before biometric systems are massively deployed in security systems. This correspondence proposes a projected multinomial distribution for studying the probability of successfully using brute-force attacks to break into a palmprint system. To validate the proposed model, we have conducted a simulation. Its results demonstrate that the proposed model can accurately estimate the probability. The proposed model indicates that it is computationally infeasible to break into the palmprint system using brute-force attacks.
Original languageEnglish
Pages (from-to)1201-1205
Number of pages5
JournalIEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Issue number5
Publication statusPublished - 1 Oct 2006


  • Brute-force attack
  • Palmprint
  • Passwords
  • Secure authentication

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Software
  • Information Systems
  • Human-Computer Interaction
  • Computer Science Applications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Analysis of brute-force break-ins of a palmprint authentication system'. Together they form a unique fingerprint.

Cite this