6,450 Hits in 4.5 sec

Evaluation methodology for fake samples detection in biometrics

Belen Fernandez-Saavedra, Raul Sanchez-Reillo, Raul Alonso-Moreno, Carmen Sanchez-Avila
2008 2008 42nd Annual IEEE International Carnahan Conference on Security Technology  
In this paper a methodology based on Common Criteria is given to evaluate, in an independent way, whether biometric capture devices implement methods for fake samples detection, and till which extent such  ...  Most of them could be avoided if acquisition sensors would have suitable approaches for aliveness detection at the capture process.  ...  Thanks to Dorian for providing us with fake finger used in some experiments.  ... 
doi:10.1109/ccst.2008.4751307 fatcat:qjnhopmusrhmfaidnr57glmjxa

Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned

Abdenour Hadid, Nicholas Evans, Sebastien Marcel, Julian Fierrez
2015 IEEE Signal Processing Magazine  
It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future. 1  ...  This tutorial article presents an introduction to spoofing and anti-spoofing research.  ...  This article presents what is, to the best of the authors' knowledge, the first proposal for a formal evaluation methodology.  ... 
doi:10.1109/msp.2015.2437652 fatcat:npjlxalvj5c5jobfimejpriylq

Guest Editorial: BIOSIG 2020 special issue on trustworthiness of person authentication

Ana F. Sequeira, Marta Gomez‐Barrero, Paulo Lobato Correia
2021 IET Biometrics  
areas within biometrics such as presentation attack detection (PAD), traditional and emergent biometric characteristics, and biometric recognition and soft biometrics in the presence of facial masks.  ...  BIOSIG 2020 special issue on trustworthiness of person authentication Recent guidelines for 'Trustworthy AI' state that it not only relates the trustworthiness of the AI system itself but also comprises  ...  | PRESENTATION ATTACK DETECTION The paper 'Unknown Presentation Attack Detection against Rational Attackers', by Ali Khodabakhsh and Zahid Akhtar, investigates the vulnerability of PAD systems to attacks  ... 
doi:10.1049/bme2.12055 fatcat:ipr6uvytzjhl7ahjz2q4kwd6ra

Towards the Security Evaluation of Biometric Authentication Systems

Mohamad El-Abed, Romain Giot, Baptiste Hemery, Jean Jacques Schwartzmann, Christophe Rosenberger
2012 International Journal of Engineering and Technology  
In order to contribute in resolving such problematic, we propose a modality-independent evaluation methodology for the security evaluation of biometric systems.  ...  The proposed methodology produces a security index which characterizes the overall security level of biometric systems.  ...  ACKNOWLEDGMENT The authors would like to thank the French Research Ministry for their financial support of this work.  ... 
doi:10.7763/ijet.2012.v4.373 fatcat:gjb2lruqvfc6hnuhk2xqjlfcny

Biometrics Evaluation Under Spoofing Attacks

Ivana Chingovska, Andre Rabello dos Anjos, Sebastien Marcel
2014 IEEE Transactions on Information Forensics and Security  
Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes.  ...  A novel evaluation framework for verification systems under spoofing attacks, called Expected Performance and Spoofability (EPS) framework, is the major contribution of this paper.  ...  ACKNOWLEDGMENTS The authors would like to thank the FP7 European TAB-ULA RASA (257289) and BEAT (284989) projects for their financial support.  ... 
doi:10.1109/tifs.2014.2349158 fatcat:ehcmbdhe7jcxjiaaxllnxc2foe

Guest Editorial Special Issue on Biometric Spoofing and Countermeasures

Nichola Evans, Stan Z. Li, Sebastien Marcel, Arun Ross
2015 IEEE Transactions on Information Forensics and Security  
In their paper entitled "Robust Scheme for Iris Presentation Attack Detection Using Multiscale Binarized Statistical Image Features," Raghavendra and Busch present a detailed analysis of iris spoofing  ...  In their paper entitled "An Investigation of Local Descriptors for Biometric Spoofing Detection," Gragnaniello, Poggi, Sansone, and Verdoliva investigate the application of local descriptors for spoofing  ... 
doi:10.1109/tifs.2015.2406111 fatcat:p64d7u4yk5b73knhopef3sjrqy

A realistic evaluation of iris presentation attack detection

Ana F. Sequeira, Shejin Thavalengal, James Ferryman, Peter Corcoran, Jaime S. Cardoso
2016 2016 39th International Conference on Telecommunications and Signal Processing (TSP)  
Iris liveness detection methods have been developed to overcome the vulnerability of iris biometric systems to spoofing attacks.  ...  To provide a more realistic evaluation, this work proposes: a) testing the binary models with unknown spoof samples that were not present in the training step; b) the use of a single-class classification  ...  This may be optimal for a real world iris recognition presentation attack detection technique.  ... 
doi:10.1109/tsp.2016.7760965 dblp:conf/tsp/SequeiraTF0C16 fatcat:kzglb4ksgjhflhyz2rjwvzlxqe

A Survey in Presentation Attack and Presentation Attack Detection

Anas Husseis, Judith Liu-Jimenez, Ines Goicoechea-Telleria, Raul Sanchez-Reillo
2019 2019 International Carnahan Conference on Security Technology (ICCST)  
On the other hand, different organizations, companies, and institutions use biometric-based solutions for access control.  ...  On the national scale, police authorities and border control measures use biometric recognition devices for individual identification and verification purposes.  ...  For that reason, different methodologies, such as the standard ISO/IEC 30107 Information technology -Biometric presentation attack detection [8] , [10], [11], [213] and Common Methodology for Information  ... 
doi:10.1109/ccst.2019.8888436 fatcat:kgyzt6xi6fed5muqhoowyaw2fi

Attacking a Smartphone Biometric Fingerprint System: A Novice's Approach

R. Blanco Gonzalo, B. Corsetti, I. Goicoechea-Telleria, A. Husseis, J. Liu-Jimenez, R. Sanchez-Reillo, T. Eglitis, E. Ellavarason, R. Guest, C. Lunerti, M. Azimi, J. Khiarak (+4 others)
2018 2018 International Carnahan Conference on Security Technology (ICCST)  
My apologies for the parts you cannot understand. Aunque estos 3 años de periodo de gestación hayan sido míos, tengo muchas personas a las que agradecer el acompañamiento y la ayuda.  ...  The contributions of this Thesis include: • Improvements on the presentation attack detection evaluation methodology. • Contributions to ISO/IEC 30107 -Biometric presentation attack detection -Part 3:  ...  In summary, the milestones achieved by this Thesis include: • Improvements on the presentation attack detection evaluation methodology. • Contributions to ISO/IEC 30107 -Biometric presentation attack detection  ... 
doi:10.1109/ccst.2018.8585726 dblp:conf/iccst/Blanco-GonzaloC18 fatcat:elg4ejl5dbgdpjv3pzyqcdtgui

An exploratory study of interpretability for face presentation attack detection

Ana F. Sequeira, Tiago Gonçalves, Wilson Silva, João Ribeiro Pinto, Jaime S. Cardoso
2021 IET Biometrics  
Biometric recognition and presentation attack detection (PAD) methods strongly rely on deep learning algorithms. Though often more accurate, these models operate as complex black boxes.  ...  Moreover, there is a need for methodologies to assess and compare the quality of explanations.  ...  Most BS can be spoofed by an attacker presenting fake or altered samples of the biometric trait at the sensor. Presentation attack detection (PAD) methods are intended to detect spoofing attacks.  ... 
doi:10.1049/bme2.12045 fatcat:sumrdstnura2xi776i46h5zuju

Biometric Antispoofing Methods: A Survey in Face Recognition

Javier Galbally, Sebastien Marcel, Julian Fierrez
2014 IEEE Access  
Spoofing, referred to by the term presentation attack in current standards, is a purely biometric vulnerability that is not shared with other IT security solutions.  ...  The work covers theories, methodologies, state-of-the-art techniques, and evaluation databases and also aims at providing an outlook into the future of this very active field of research.  ...  The ''worst case scenario'' presented above for face can be extended to all biometric traits, and makes spoofing evaluation a very difficult matter.  ... 
doi:10.1109/access.2014.2381273 fatcat:2xnosh6ujjbmrg6hizx5rupiia

A Contemporary Survey of Multimodal Presentation Attack Detection Techniques: Challenges and Opportunities

Kavita, Gurjit Singh Walia, Rajesh Rohilla
2021 SN Computer Science  
Biometric recognition is a broad and dynamic field of research but the main problem of this field is spoofing attack or presentation attack "use of fake biometric in place of the real biometric sample  ...  This paper covers theories, methodology, evaluation datasets, and aims at future work in this field of research.  ...  [7] Face, Iris Indirect Attack BioSecure Presented and evaluated the first software-based attack Singh et al.  ... 
doi:10.1007/s42979-020-00425-3 fatcat:zflh4h5yqze6tldgmcgbifczcm

A Study of Cancelable Biometrics in the Security Improvement of Biometric Authentication System using Fault Tree Analysis

Sanggyu SHIN, Yoichi SETO, Shogo SHIMIZU
2016 International Journal of Affective Engineering  
We also verify the effect of the security precaution of the liveness detection techniques using Fault Tree Analysis, a risk evaluation method about data protection and spoofing prevention techniques.  ...  Many methods have been proposed for cancelable biometrics technology, but the security criterion in such is indefinite.  ...  Figure 4 :Figure 5 : 45 Fault tree for an impersonation attack when liveness detection The case of Cryptography & Liveness detection Figure 6 :Figure 7 : 67 The case of Cancelable biometrics & Liveness  ... 
doi:10.5057/ijae.ijae-d-16-00008 fatcat:qimuiot7y5hdllckhvhaimzwpq

Enhancing Biometric Liveness Detection Using Trait Randomization Technique [article]

KENNETH OKEREAFOR, Clement Onime, Oliver Osuagwu
2020 Figshare  
The novel Multi-Modal Random Trait Biometric Liveness Detection System (MMRTBLDS) is introduced to mitigate the challenges of biometric spoofing using randomized combination of several techniques across  ...  for Biometrics Research and Testing, Martigny, Switzerland for their support and contributions towards this research.  ...  ACKNOWLEDGMENT Kenneth Okereafor thanks the Information and Communications Technology Section of the Abdus Salam International Centre for Theoretical Physics (ICTP), Trieste, Italy; and the Swiss Center  ... 
doi:10.6084/m9.figshare.12479174 fatcat:xxqoyxmi65cu5nh6rjd73ers4a

A Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks

Christina-Angeliki Toli, Bart Preneel
2015 International Journal of Intelligent Computing Research  
However, attacks against multi-modal crypto-biometric systems have not received much attention.  ...  This paper presents cryptosystems, intrusions and countermeasures for single, multiple modalities and complicated schemes.  ...  , spoof detection or presentation attack detection.  ... 
doi:10.20533/ijicr.2042.4655.2015.0069 fatcat:ifg2vnc6qbhntc755fxbihitia
« Previous Showing results 1 — 15 out of 6,450 results