2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2013
DOI: 10.1109/btas.2013.6712744
|View full text |Cite
|
Sign up to set email alerts
|

Targeted impersonation as a tool for the detection of biometric system vulnerabilities

Abstract: This paper argues that biometric verification evaluations can obscure vulnerabilities that increase the chances that an attacker could be falsely accepted. This can occur because existing evaluations implicitly assume that an imposter claiming a false identity would claim a random identity rather than consciously selecting a target to impersonate. This paper shows how an attacker can select a target with a similar biometric signature in order to increase their chances of false acceptance. It demonstrates this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…In some particular cases, a person of interest can be introduced by synthetic facial images constructed by composite machines [35]. The phenomenon of impersonation (passive or zero-effort attack) has been experimentally detected in speech recognition by Doddington et al [36] and in other forms of biometric modalities [37][38][39]. Unfortunately, not only are passive attacks an inherent property of watchlist technology, impersonation from other sources, such as social networks, can also influence the reliability of the watchlist [40,41].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In some particular cases, a person of interest can be introduced by synthetic facial images constructed by composite machines [35]. The phenomenon of impersonation (passive or zero-effort attack) has been experimentally detected in speech recognition by Doddington et al [36] and in other forms of biometric modalities [37][38][39]. Unfortunately, not only are passive attacks an inherent property of watchlist technology, impersonation from other sources, such as social networks, can also influence the reliability of the watchlist [40,41].…”
Section: Literature Reviewmentioning
confidence: 99%
“…1. Sources of personal information, such as national and international databases [2] and virtual sources (media and social networks) [37,41,70].…”
Section: Definitionmentioning
confidence: 99%
“…The DRC helps assess the effects of impersonation and mis-identification [5]; to combat these effects, many studies suggest the use of multiple biometrics [18]. However, in the current ABC machines, the persons of interest are mostly represented by facial traits from both the physical and digital world, and are less likely to be represented by fingerprints or irises [3].…”
Section: Related Work and Contributionmentioning
confidence: 99%
“…Impersonation can only be observed in an A-machine based on identification, i.e., when using databases. Multibiometrics mitigates these effects by consolidating evidence from multiple sources of information [41]- [43]. There is no impersonation effect in the verification mode of the A-machine, such as the one for e-passport holders [4], [44], [45].…”
Section: Impersonation In Authentication Machinesmentioning
confidence: 99%