Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting
dc.contributor.author | Scherhag,Ulrich | |
dc.contributor.author | Nautsch,Andreas | |
dc.contributor.author | Rathgeb,Christian | |
dc.contributor.author | Gomez-Barrero,Marta | |
dc.contributor.author | Veldhuis,Raymond N.J. | |
dc.contributor.author | Spreeuwers,Luuk | |
dc.contributor.author | Schils,Maikel | |
dc.contributor.author | Maltoni,Davide | |
dc.contributor.author | Grother,Patrick | |
dc.contributor.author | Marcel,Sébastien | |
dc.contributor.author | Breithaupt,Ralph | |
dc.contributor.author | Ramachandra,Raghavendra | |
dc.contributor.author | Busch,Christoph | |
dc.contributor.editor | Brömme,Arslan | |
dc.contributor.editor | Busch,Christoph | |
dc.contributor.editor | Dantcheva,Antitza | |
dc.contributor.editor | Rathgeb,Christian | |
dc.contributor.editor | Uhl,Andreas | |
dc.date.accessioned | 2017-09-26T09:20:59Z | |
dc.date.available | 2017-09-26T09:20:59Z | |
dc.date.issued | 2017 | |
dc.description.abstract | With the widespread deployment of biometric recognition systems, the interest in attacking these systems is increasing. One of the easiest ways to circumvent a biometric recognition system are so-called presentation attacks, in which artefacts are presented to the sensor to either impersonate another subject or avoid being recognised. In the recent past, the vulnerabilities of biometric systems to so-called morphing attacks have been unveiled. In such attacks, biometric samples of multiple subjects are merged in the signal or feature domain, in order to allow a successful verification of all contributing subjects against the morphed identity. Being a recent area of research, there is to date no standardised manner to evaluate the vulnerability of biometric systems to these attacks. Hence, it is not yet possible to establish a common benchmark between different morph detection algorithms. In this paper, we tackle this issue proposing new metrics for vulnerability reporting, which build upon our joint experience in researching this challenging attack scenario. In addition, recommendations on the assessment of morphing techniques and morphing detection metrics are given. | en |
dc.identifier.isbn | 978-3-88579-664-0 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/4644 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik, Bonn | |
dc.relation.ispartof | BIOSIG 2017 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-70 | |
dc.subject | Biometrics | |
dc.subject | Morphing | |
dc.subject | Performance Reporting | |
dc.subject | Attack Detection | |
dc.title | Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting | en |
gi.citation.endPage | 159 | |
gi.citation.startPage | 149 | |
gi.conference.date | 20.-22. September 2017 | |
gi.conference.location | Darmstadt, Germany | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1