2008 42nd Annual IEEE International Carnahan Conference on Security Technology 2008
DOI: 10.1109/ccst.2008.4751307
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation methodology for fake samples detection in biometrics

Abstract: -Nowadays biometrics is being used in many applications where security is required. This fact causes that new threatens have appeared and that the number of attempts to break biometric systems has increased. From all potential attacks, those involving damage or thefts to users are the most worrying. Most of them could be avoided if acquisition sensors would have suitable approaches for aliveness detection at the capture process. Many providers claim that their products support these methods but unfortunately i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…On the other hand, although some efforts have been made in the frame of the Common Criteria [41], [181] and there is on-going work to release the first ISO standard specifically focused on spoofing [42], still no largely extended standard exists regarding the evaluation of biometric vulnerabilities. This has resulted in very sparse certifications of biometricbased security commercial products compared to other technologies with a long standardization trajectory such as smart cards or cryptography [45]- [47].…”
Section: Summary and Discussion: Lessons Facts And Challengesmentioning
confidence: 99%
“…On the other hand, although some efforts have been made in the frame of the Common Criteria [41], [181] and there is on-going work to release the first ISO standard specifically focused on spoofing [42], still no largely extended standard exists regarding the evaluation of biometric vulnerabilities. This has resulted in very sparse certifications of biometricbased security commercial products compared to other technologies with a long standardization trajectory such as smart cards or cryptography [45]- [47].…”
Section: Summary and Discussion: Lessons Facts And Challengesmentioning
confidence: 99%
“…The evaluation methodology of the security of the aliveness detector system proposed here was conducted according to the guidance provided in [13] and [14]. The results are given as both aggregated measures and compare the distance of each material used for imitated hands with the genuine hands.…”
Section: Experimental Methodologymentioning
confidence: 99%
“…The evaluation of the security of the hand shape biometric device proposed has been conducted on the basis of the guidance provided in [29] and [30]. It has been performed in two steps, each evaluating one of the two hypotheses we set out above in section 1A.…”
Section: B Evaluation Methodologymentioning
confidence: 99%