• DocumentCode
    40258
  • Title

    Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned

  • Author

    Hadid, Abdenour ; Evans, Nicholas ; Marcel, Sebastien ; Fierrez, Julian

  • Author_Institution
    Dept. of Electr. & Inf. Eng., Univ. of Oulu, Oulu, Finland
  • Volume
    32
  • Issue
    5
  • fYear
    2015
  • fDate
    Sept. 2015
  • Firstpage
    20
  • Lastpage
    30
  • Abstract
    Biometrics already form a significant component of current and emerging identification technologies. Biometrics systems aim to determine or verify the identity of an individual from their behavioral and/or biological characteristics. Despite significant progress, some biometric systems fail to meet the multitude of stringent security and robustness requirements to support their deployment in some practical scenarios. Among current concerns are vulnerabilities to spoofing?persons who masquerade as others to gain illegitimate accesses to protected data, services, or facilities. While the study of spoofing, or rather antispoofing, has attracted growing interest in recent years, the problem is far from being solved and will require far greater attention in the coming years. This tutorial article presents an introduction to spoofing and antispoofing research. It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future.
  • Keywords
    biometrics (access control); face recognition; identification technology; antispoofing; biological characteristic; biometrics system; face-recognition system; identification technology; illegitimate access; spoofing attack; Face; Feature extraction; Fingerprint recognition; Iris recognition; Measurement;
  • fLanguage
    English
  • Journal_Title
    Signal Processing Magazine, IEEE
  • Publisher
    ieee
  • ISSN
    1053-5888
  • Type

    jour

  • DOI
    10.1109/MSP.2015.2437652
  • Filename
    7194916