2014
DOI: 10.1049/iet-bmt.2013.0054
|View full text |Cite
|
Sign up to set email alerts
|

Measuring and mitigating targeted biometric impersonation

Abstract: This study is concerned with the reliability of biometric verification systems when used in forensic applications. In particular, when such systems are subjected to targeted impersonation attacks. The authors expand on the existing work in targeted impersonation, focusing on how best to measure the reliability of verification systems in forensic contexts. It identifies two scenarios in which targeted impersonation effects may occur: (i) the forensic investigation of criminal activity involving identity theft; … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…This MRF model does not use high order cliques but still reaches globally coherent solutions. In [18], the mitigation of targeted biometric impersonation has been proposed. Targeted impersonation is defined as a method of spoofing the biometric traits.…”
Section: Frontiers In Applicationsmentioning
confidence: 99%
“…This MRF model does not use high order cliques but still reaches globally coherent solutions. In [18], the mitigation of targeted biometric impersonation has been proposed. Targeted impersonation is defined as a method of spoofing the biometric traits.…”
Section: Frontiers In Applicationsmentioning
confidence: 99%
“…This suggests that interview supporting technologies should be integrated in these machines. From this perspective, our analysis delivers the following technology landscape: 1) Dynamical probabilistic models [64], [89]; they better reflect layered security properties; 2) Deep inference in traveler risk assessment [49]; 3) Predictive analytic and modeling including deep learning in traffic flow prediction [57]; 4) Traveler surveillance in physical world [10], [33], and virtual/digital world [9]; 5) Managing distributed resources [25]; 6) Attack countermeasures [5], [12], [14], [27]; 7) Technology gaps identification [36], [49], [80], including attack mitigation [63].…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…An adequate spoofing detection method should meet a certain number of practical requirements [9, 29]. For instance, (i) the method should be non‐invasive, i.e.…”
Section: Introductionmentioning
confidence: 99%