Biometrics Systems Under Spoofing Attack [An evaluation methodology and lessons learned]

被引:129
|
作者
Hadid, Abdenour [1 ]
Evans, Nicholas [2 ]
Marcel, Sebastien [3 ,4 ]
Fierrez, Julian [5 ,6 ]
机构
[1] Univ Oulu, Ctr Machine Vis Res, SF-90100 Oulu, Finland
[2] EURECOM, Sophia Antipolis, France
[3] Idiap Res Inst, Biometr Grp, Zurich, Switzerland
[4] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[5] Univ Autonoma Madrid, E-28049 Madrid, Spain
[6] Michigan State Univ, E Lansing, MI 48824 USA
基金
芬兰科学院;
关键词
All Open Access; Green;
D O I
10.1109/MSP.2015.2437652
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometrics already form a significant component of current and emerging identification technologies. Biometrics systems aim to determine or verify the identity of an individual from their behavioral and/or biological characteristics. Despite significant progress, some biometric systems fail to meet the multitude of stringent security and robustness requirements to support their deployment in some practical scenarios. Among current concerns are vulnerabilities to spoofing-persons who masquerade as others to gain illegitimate accesses to protected data, services, or facilities. While the study of spoofing, or rather antispoofing, has attracted growing interest in recent years, the problem is far from being solved and will require far greater attention in the coming years. This tutorial article presents an introduction to spoofing and antispoofing research. It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future. © 2015 IEEE.
引用
收藏
页码:20 / 30
页数:11
相关论文
共 50 条
  • [41] Simulation and Systems Engineering: Lessons Learned
    Conroy, Michael
    Rabelo, Luis
    SAE Technical Papers, 2019, (March):
  • [42] Assessment and evaluation: Lessons learned by coalitions
    McGourty, J
    28TH ANNUAL FRONTIERS IN EDUCATION CONFERENCE - CONFERENCE PROCEEDINGS, VOLS 1-3, 1998, : 527 - 527
  • [43] Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack
    Wang, Hui-Ming
    Huang, Ke-Wen
    Tsiftsis, Theodoros A.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 860 - 876
  • [44] Active delivery for lessons learned systems
    Weber, R
    Aha, DW
    Muñoz-Avila, H
    Breslow, LA
    ADVANCES IN CASE-BASED REASONING, PROCEEDINGS, 2001, 1898 : 322 - 334
  • [45] A REVIEW OF PERFORMANCE EVALUATION FOR BIOMETRICS SYSTEMS
    Hong, Jin-Hyuk
    Yun, Eun-Kyung
    Cho, Sung-Bae
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2005, 5 (03) : 501 - 536
  • [46] Implementation of lessons learned in design and evaluation of displays for helmet mounted display systems
    Kranz, Y
    HELMET- AND HEAD-MOUNTED DISPLAY III, 1998, 3362 : 156 - 163
  • [47] Lessons learned in the evaluation of the Opportunities Programme
    Neufeld, L. M.
    SALUD PUBLICA DE MEXICO, 2007, 49 : E242 - E244
  • [48] Lessons learned from the design and evaluation of visual information-seeking systems
    Gerken, Jens
    Heilig, Mathias
    Jetter, Hans-Christian
    Rexhausen, Sebastian
    Demarmels, Mischa
    Koenig, Werner A.
    Reiterer, Harald
    INTERNATIONAL JOURNAL ON DIGITAL LIBRARIES, 2009, 10 (2-3) : 49 - 66
  • [49] Choreography Modelling Language for the Embedded Systems Domain Empirical Evaluation and Lessons Learned
    Tausan, Nebojsa
    Lehto, Jari
    Markkula, Jouni
    Kuvaja, Pasi
    Oivo, Markku
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT (PROFES 2016), 2016, 10027 : 144 - 159
  • [50] FPSO electrical systems - Lessons learned
    Brown, RR
    INDUSTRY APPLICATIONS SOCIETY 49TH ANNUAL PETROLEUM AND CHEMICAL INDUSTRY CONFERENCE, 2002, : 111 - 118