2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2010
DOI: 10.1109/btas.2010.5634531
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of biometric spoofing in a multimodal system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
39
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(43 citation statements)
references
References 13 publications
1
39
0
Order By: Relevance
“…This is highly dependent on the used fusion algorithm, which has inspired fusion schemes specifically designed to increase the robustness to spoofing. Most notable are [21] which explores fuzzy logic, and [20] which extends the LLR scheme by introducing hidden variables denoting the probability of a spoofing attack. None of the mentioned work employs an algorithm specialized to detect spoofing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…This is highly dependent on the used fusion algorithm, which has inspired fusion schemes specifically designed to increase the robustness to spoofing. Most notable are [21] which explores fuzzy logic, and [20] which extends the LLR scheme by introducing hidden variables denoting the probability of a spoofing attack. None of the mentioned work employs an algorithm specialized to detect spoofing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…However, a hacker may fake only a subset of the fused biometric traits. Recently, researchers demonstrated that the existing multimodal systems can be deceived also when only a subset of the fused modalities is spoofed [6]. Rodrigues et al proposed an approach to measure the security of a multimodal system, where the contribution provided by each single modality matcher is weighted based on the ease to spoof that biometric trait.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, a biometric spoofing attack is fairly simple to execute [179]. Even though biometrics can improve the performance of the MFA system, they can also increase the number of vulnerabilities that can be exploited by an intruder.…”
Section: Security and Privacymentioning
confidence: 99%