Biometrics Systems Under Spoofing Attack [An evaluation methodology and lessons learned]

被引:129
|
作者
Hadid, Abdenour [1 ]
Evans, Nicholas [2 ]
Marcel, Sebastien [3 ,4 ]
Fierrez, Julian [5 ,6 ]
机构
[1] Univ Oulu, Ctr Machine Vis Res, SF-90100 Oulu, Finland
[2] EURECOM, Sophia Antipolis, France
[3] Idiap Res Inst, Biometr Grp, Zurich, Switzerland
[4] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[5] Univ Autonoma Madrid, E-28049 Madrid, Spain
[6] Michigan State Univ, E Lansing, MI 48824 USA
基金
芬兰科学院;
关键词
All Open Access; Green;
D O I
10.1109/MSP.2015.2437652
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometrics already form a significant component of current and emerging identification technologies. Biometrics systems aim to determine or verify the identity of an individual from their behavioral and/or biological characteristics. Despite significant progress, some biometric systems fail to meet the multitude of stringent security and robustness requirements to support their deployment in some practical scenarios. Among current concerns are vulnerabilities to spoofing-persons who masquerade as others to gain illegitimate accesses to protected data, services, or facilities. While the study of spoofing, or rather antispoofing, has attracted growing interest in recent years, the problem is far from being solved and will require far greater attention in the coming years. This tutorial article presents an introduction to spoofing and antispoofing research. It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future. © 2015 IEEE.
引用
收藏
页码:20 / 30
页数:11
相关论文
共 50 条
  • [1] Biometrics Evaluation Under Spoofing Attacks
    Chingovska, Ivana
    dos Anjos, Andre Rabello
    Marcel, Sebastien
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) : 2264 - 2276
  • [2] ePassports and biometrics: Experiences and lessons learned
    Wolf, A
    ISSE 2005 - Securing Electronic Business Processes, 2005, : 210 - 219
  • [3] Improving Gait Biometrics under Spoofing Attacks
    Hadid, Abdenour
    Ghahramani, Mohammad
    Bustard, John
    Nixon, Mark
    IMAGE ANALYSIS AND PROCESSING (ICIAP 2013), PT II, 2013, 8157 : 1 - 10
  • [4] PNU Spoofing: a menace for biometrics authentication systems?
    Bruno, Andrea
    Cattaneo, Giuseppe
    Petrillo, Umberto Ferraro
    Capasso, Paola
    PATTERN RECOGNITION LETTERS, 2021, 151 : 3 - 10
  • [5] Gait biometrics under spoofing attacks: an experimental investigation
    Hadid, Abdenour
    Ghahramani, Mohammad
    Kellokumpu, Vili
    Feng, Xiaoyi
    Bustard, John
    Nixon, Mark
    JOURNAL OF ELECTRONIC IMAGING, 2015, 24 (06)
  • [6] Methodology and evaluation in sports analytics: challenges, approaches, and lessons learned
    Davis, Jesse
    Bransen, Lotte
    Devos, Laurens
    Jaspers, Arne
    Meert, Wannes
    Robberechts, Pieter
    Van Haaren, Jan
    Van Roy, Maaike
    MACHINE LEARNING, 2024, 113 (09) : 6977 - 7010
  • [7] Biometrics for Identity Documents and Smart Cards: Lessons Learned
    Drygajlo, Andrzej
    BIOMETRICS AND ID MANAGEMENT, 2011, 6583 : 1 - 12
  • [8] RASSP Methodology Evaluation and Lessons Learned Developing IRST Signal Processor
    Larry Scanlan
    Wing Lee
    Mike Vahey
    Mike McCollough
    Journal of VLSI signal processing systems for signal, image and video technology, 1997, 15 : 145 - 160
  • [9] RASSP methodology evaluation and lessons learned developing IRST signal processor
    Scanlan, L
    Lee, W
    Vahey, M
    McCollough, M
    JOURNAL OF VLSI SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 1997, 15 (1-2): : 145 - 160
  • [10] Lessons Learned in Systems Thinking Approach for Evaluation Planning
    Williams, John C.
    Costich, Julia
    Hacker, William D.
    Davis, James S.
    JOURNAL OF PUBLIC HEALTH MANAGEMENT AND PRACTICE, 2010, 16 (02): : 151 - 155