Biometrics in ABC: counter-spoofing research
نویسندگان
چکیده
Automated border cont rol (ABC) is concerned with fast and secure processing for intelligence-led ident if icat ion. The FastPass proj ect aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on board as ident it y, spoofing at tacks become a concern. This paper presents current research in algorithm development for counter-spoofing at tacks in biomet rics. Focussing on three biomet ric t raits, face, f ingerprint , and iris, it examines possible types of spoofing at tacks, and reviews exist ing algorithms reported in relevant academic papers in the area of countering measures to biomet ric spoofing at tacks. It indicates that the new developing t rend is fusion of mult iple biomet rics against spoofing at tacks.
منابع مشابه
Motion-based counter-measures to photo attacks in face recognition
Identity spoofing is a contender for high-security face recognition applications. With the advent of social media and globalized search, our face images and videos are wide-spread on the internet and can be potentially used to attack biometric systems without previous user consent. Yet, research to counter these threats is just on its infancy we lack public standard databases, protocols to meas...
متن کاملMultimedia Security Spoofing of Digital Image Forensics -3d Face Mask
Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or “spoofed”).The recent advances in spoofing detection, current solutions often rely on S domain knowledge, specific biometric reading systems, and attack types. We assume a very limited knowledg...
متن کاملFusion of Multiple Biometric For Photo-Attack Detection in Face Recognition Systems
A spoofing attack is a situation in which one person successfully masquerades as another by falsifying data and gaining illegitimate access. Spoofing attacks are of several types such as photograph, video or mask. Biometrics are playing the role of a password which cannot be replaced if stolen, so there is the necessity of counter-measures to biometric spoofing attacks. Face biometric systems a...
متن کاملGuest Editorial Special Issue on Biometric Spoofing and Countermeasures
While biometrics technology has created new solutions to person authentication and has evolved to play a critical role in personal, national and global security, the potential for the technology to be fooled or spoofed is now widely acknowledged. For example, fingerprint verification systems can be spoofed with a synthetic material, such as gelatine, inscribed with the fingerprint ridges of an ...
متن کاملAnti-spoofing, Voice Databases
As with any task involving statistical pattern recognition, the assessment of spoofing and anti-spoofing approaches for voice recognition calls for significantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoofing attacks performed prior to acquisition at the sensor or microphone. Since the collection of large quantities of any bi...
متن کامل