2014
DOI: 10.1109/tifs.2014.2349158
|View full text |Cite
|
Sign up to set email alerts
|

Biometrics Evaluation Under Spoofing Attacks

Abstract: While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes. However, an important, but often overlooked issue regards their engagement into a verification task and how to measure their impact on the verification systems themselves. A novel evaluation framework fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 93 publications
(82 citation statements)
references
References 41 publications
0
82
0
Order By: Relevance
“…Again, just like the biometric system, it will also make mistakes, leading to Even as independent sub-systems, spoofing countermeasures impact directly on the performance of the biometric system as a whole; while aiming to reduce vulnerabilities to spoofing, they also have potential to reject genuine trials [7]. Thus, while countermeasure sub-systems can be assessed independently, it is often of greater interest to assess the performance of the system as a whole, for example using a score fusion strategy illustrated in Fig.…”
Section: Evaluation Methodology: Spoofing Countermeasuresmentioning
confidence: 99%
“…Again, just like the biometric system, it will also make mistakes, leading to Even as independent sub-systems, spoofing countermeasures impact directly on the performance of the biometric system as a whole; while aiming to reduce vulnerabilities to spoofing, they also have potential to reject genuine trials [7]. Thus, while countermeasure sub-systems can be assessed independently, it is often of greater interest to assess the performance of the system as a whole, for example using a score fusion strategy illustrated in Fig.…”
Section: Evaluation Methodology: Spoofing Countermeasuresmentioning
confidence: 99%
“…In this paper, we adopt an evaluation methodology specifically designed for performance assessment of fusion system proposed in [25]. …”
Section: Score Fusionmentioning
confidence: 99%
“…Such flexibility can be valuable in practical systems. See [25] for a detailed comparison of the different fusion schemes and their discussion.…”
Section: Asv Systemsmentioning
confidence: 99%
“…In the upcoming parts of this chapter, we therefore adopt and experimentally apply an evaluation methodology specifically designed for performance assessment of fusion system proposed in [29].…”
Section: Fusionmentioning
confidence: 99%
“…Such flexibility can be valuable in practical systems. See [29] for a detailed comparison of the different fusion schemes and their discussion.…”
Section: Integration Of Pad and Asvmentioning
confidence: 99%