Abstract:
The systems of fingerprints and collusion attacks on them are considered. The structure of fingerprint systems opposing such attacks is investigated. An algorithm for generating these systems is developed. A method for identifying counter-fitters through a fake fingerprint is proposed. In the set of all collective attacks, the riskiest one being the majorizing attack is identified.