2015
DOI: 10.1109/msp.2015.2437652
|View full text |Cite
|
Sign up to set email alerts
|

Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned

Abstract: Biometrics already form a significant component of current and emerging identification technologies.Biometrics systems aim to determine or verify the identity of an individual from their behavioural and/or biological characteristics. Despite significant progress, some biometric systems fail to meet the multitude of stringent security and robustness requirements to support their deployment in some practical scenarios.Among current concerns are vulnerabilities to spoofing, namely persons who masquerade as others… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
113
0
2

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
4
1

Relationship

3
7

Authors

Journals

citations
Cited by 188 publications
(116 citation statements)
references
References 16 publications
1
113
0
2
Order By: Relevance
“…ese schemes suffer from their data leakage; that is, a user's face can be easily found on social media websites, or his or her fingerprints can be extracted from the photos from their gestures, to mount a presentation attack [96] against them. Additionally, these solutions also suffer from lack of secrecy [97] and vulnerability to various spoofing attacks [98].…”
Section: Something You Are: Physiological Biometricsmentioning
confidence: 99%
“…ese schemes suffer from their data leakage; that is, a user's face can be easily found on social media websites, or his or her fingerprints can be extracted from the photos from their gestures, to mount a presentation attack [96] against them. Additionally, these solutions also suffer from lack of secrecy [97] and vulnerability to various spoofing attacks [98].…”
Section: Something You Are: Physiological Biometricsmentioning
confidence: 99%
“…These ideas have generated much research in biometrics towards understanding possible attacks [84], and the generation of protection methods against attacks [85]. When MCS approaches are applied to biometrics, specific vulnerabilities appear [86], and protection methods can be generated by exploiting specific MCS fusion strategies [87].…”
Section: Challenges In Biometrics: Role Of Mcsmentioning
confidence: 99%
“…[1]. Several studies [3,12,14] addressed users cognizance about the possible threats associated with biometrics and their reluctance to use the biometric based systems.…”
Section: Introductionmentioning
confidence: 99%