Biometrics Systems Under Spoofing Attack [An evaluation methodology and lessons learned]

被引:129
|
作者
Hadid, Abdenour [1 ]
Evans, Nicholas [2 ]
Marcel, Sebastien [3 ,4 ]
Fierrez, Julian [5 ,6 ]
机构
[1] Univ Oulu, Ctr Machine Vis Res, SF-90100 Oulu, Finland
[2] EURECOM, Sophia Antipolis, France
[3] Idiap Res Inst, Biometr Grp, Zurich, Switzerland
[4] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[5] Univ Autonoma Madrid, E-28049 Madrid, Spain
[6] Michigan State Univ, E Lansing, MI 48824 USA
基金
芬兰科学院;
关键词
All Open Access; Green;
D O I
10.1109/MSP.2015.2437652
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometrics already form a significant component of current and emerging identification technologies. Biometrics systems aim to determine or verify the identity of an individual from their behavioral and/or biological characteristics. Despite significant progress, some biometric systems fail to meet the multitude of stringent security and robustness requirements to support their deployment in some practical scenarios. Among current concerns are vulnerabilities to spoofing-persons who masquerade as others to gain illegitimate accesses to protected data, services, or facilities. While the study of spoofing, or rather antispoofing, has attracted growing interest in recent years, the problem is far from being solved and will require far greater attention in the coming years. This tutorial article presents an introduction to spoofing and antispoofing research. It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future. © 2015 IEEE.
引用
收藏
页码:20 / 30
页数:11
相关论文
共 50 条
  • [21] Evaluation Methodology for Analyzing Environment Influence in Biometrics
    Fernandez-Saavedra, Belen
    Sanchez-Reillo, Raul
    Alonso-Moreno, Raul
    Mueller, Robert
    2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4, 2008, : 1342 - +
  • [22] Mobile Biometrics: Towards A Comprehensive Evaluation Methodology
    Buriro, Attaullah
    Akhtar, Zahid
    Crispo, Bruno
    Gupta, Sandeep
    2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [23] EVALUATION METHODOLOGY FOR FAKE SAMPLES DETECTION IN BIOMETRICS
    Fernandez-Saavedra, Belen
    Sanchez-Reillo, Raul
    Alonso-Moreno, Raul
    Sanchez-Avila, Carmen
    42ND ANNUAL 2008 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 233 - +
  • [24] Organisational accidents investigation methodology and lessons learned
    Dien, Y
    Llory, M
    Montmayeul, R
    JOURNAL OF HAZARDOUS MATERIALS, 2004, 111 (1-3) : 147 - 153
  • [25] iCollections methodology: workflow, results and lessons learned
    Blagoderov, Vladimir
    Penn, Malcolm
    Sadka, Mike
    Hine, Adrian
    Brooks, Stephen
    Siebert, Darrell J.
    Sleep, Chris
    Cafferty, Steve
    Cane, Elisa
    Martin, Geoff
    Toloni, Flavia
    Wing, Peter
    Chainey, John
    Duffell, Liz
    Huxley, Rob
    Ledger, Sophie
    McLaughlin, Caitlin
    Mazzetta, Gerardo
    Perera, Jasmin
    Crowther, Robyn
    Douglas, Lyndsey
    Durant, Joanna
    Scialabba, Elisabetta
    Honey, Martin
    Huertas, Blanca
    Howard, Theresa
    Carter, Victoria
    Albuquerque, Sara
    Paterson, Gordon
    Kitching, Ian J.
    BIODIVERSITY DATA JOURNAL, 2017, 5
  • [26] iCollections methodology: workflow, results and lessons learned
    Blagoderov, Vladimir
    Penn, Malcolm
    Sadka, Mike
    Hine, Adrian
    Brooks, Stephen
    Siebert, Darrell J.
    Sleep, Chris
    Cafferty, Steve
    Cane, Elisa
    Martin, Geoff
    Toloni, Flavia
    Wing, Peter
    Chainey, John
    Duffell, Liz
    Huxley, Rob
    Ledger, Sophie
    McLaughlin, Caitlin
    Mazzetta, Gerardo
    Perera, Jasmin
    Crowther, Robyn
    Douglas, Lyndsey
    Durant, Joanna
    Honey, Martin
    Huertas, Blanca
    Howard, Theresa
    Carter, Victoria
    Albuquerque, Sara
    Paterson, Gordon
    Kitching, Ian J.
    BIODIVERSITY DATA JOURNAL, 2017, 5
  • [27] Lessons learned on probabilistic methodology for precursor analyses
    Babst, S.
    Gaenssmantel, G.
    Wielenberg, A.
    KERNTECHNIK, 2016, 81 (05) : 520 - 526
  • [28] The Tokyo subway sarin attack-lessons learned
    Okumura, T
    Hisaoka, H
    Yamada, A
    Ishimatsu, S
    Takasu, N
    TOXICOLOGY AND APPLIED PHARMACOLOGY, 2004, 197 (03) : 171 - 171
  • [29] Lessons Learned from the Terror Attack in Stockholm 2017
    Svedenlof, Charlotte Therup
    EUROPEAN JOURNAL OF PSYCHOTRAUMATOLOGY, 2019, 10
  • [30] Lessons learned in the evaluation of Liconsa
    Shamah, Teresa
    Villalpando, Salvador
    Mundo, Veronica
    Cuevas, Lucia
    Rivera, Juan
    SALUD PUBLICA DE MEXICO, 2007, 49 : E250 - E254