DocumentCode :
256451
Title :
Introduction to identity usurpation applied to biometric modalities
Author :
Ichahane, My Youssef ; Chiny, Mohamed ; Abou Elkalam, Anas ; Ouahman, Abdellah Ait
Author_Institution :
Nat. Sch. of Appl. Sci., Cadi Ayaad Univ., Morocco
fYear :
2014
fDate :
14-16 April 2014
Firstpage :
1248
Lastpage :
1255
Abstract :
In this paper, we first discussed the rationale behind the attacks on biometric authentication systems. We also discussed the eight conceptual points of vulnerability that an attacker can use to bypass a biometric recognition system. Among all the attacks, the spoofing attacks (providing false biometric features for the sensor) gained much attention and therefore we have defined and discussed them in detail. Indeed, we will present thorough review of the state of the art of usurpation methods of both faces a biometric digital fingerprint. Then, we will give the review of the literature on the evaluation of the robustness of multimodal biometric systems against spoofing attacks. Various existing studies concluded the popular thought that the multimodal biometric systems are vulnerable to spoofing attacks and can be cracked even by usurping a single feature.
Keywords :
cryptography; face recognition; fingerprint identification; biometric authentication systems; biometric digital fingerprint; biometric recognition system; identity usurpation; multimodal biometric systems; spoofing attacks; usurpation methods; Classification algorithms; Robustness; biometric systems; liveliness detection; multibiometric; robustness; spoof attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Computing and Systems (ICMCS), 2014 International Conference on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4799-3823-0
Type :
conf
DOI :
10.1109/ICMCS.2014.6911332
Filename :
6911332
Link To Document :
بازگشت