Logo des Repositoriums
 

Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting

dc.contributor.authorScherhag,Ulrich
dc.contributor.authorNautsch,Andreas
dc.contributor.authorRathgeb,Christian
dc.contributor.authorGomez-Barrero,Marta
dc.contributor.authorVeldhuis,Raymond N.J.
dc.contributor.authorSpreeuwers,Luuk
dc.contributor.authorSchils,Maikel
dc.contributor.authorMaltoni,Davide
dc.contributor.authorGrother,Patrick
dc.contributor.authorMarcel,Sébastien
dc.contributor.authorBreithaupt,Ralph
dc.contributor.authorRamachandra,Raghavendra
dc.contributor.authorBusch,Christoph
dc.contributor.editorBrömme,Arslan
dc.contributor.editorBusch,Christoph
dc.contributor.editorDantcheva,Antitza
dc.contributor.editorRathgeb,Christian
dc.contributor.editorUhl,Andreas
dc.date.accessioned2017-09-26T09:20:59Z
dc.date.available2017-09-26T09:20:59Z
dc.date.issued2017
dc.description.abstractWith the widespread deployment of biometric recognition systems, the interest in attacking these systems is increasing. One of the easiest ways to circumvent a biometric recognition system are so-called presentation attacks, in which artefacts are presented to the sensor to either impersonate another subject or avoid being recognised. In the recent past, the vulnerabilities of biometric systems to so-called morphing attacks have been unveiled. In such attacks, biometric samples of multiple subjects are merged in the signal or feature domain, in order to allow a successful verification of all contributing subjects against the morphed identity. Being a recent area of research, there is to date no standardised manner to evaluate the vulnerability of biometric systems to these attacks. Hence, it is not yet possible to establish a common benchmark between different morph detection algorithms. In this paper, we tackle this issue proposing new metrics for vulnerability reporting, which build upon our joint experience in researching this challenging attack scenario. In addition, recommendations on the assessment of morphing techniques and morphing detection metrics are given.en
dc.identifier.isbn978-3-88579-664-0
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/4644
dc.language.isoen
dc.publisherGesellschaft für Informatik, Bonn
dc.relation.ispartofBIOSIG 2017
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-70
dc.subjectBiometrics
dc.subjectMorphing
dc.subjectPerformance Reporting
dc.subjectAttack Detection
dc.titleBiometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reportingen
gi.citation.endPage159
gi.citation.startPage149
gi.conference.date20.-22. September 2017
gi.conference.locationDarmstadt, Germany
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
paper14.pdf
Größe:
610.58 KB
Format:
Adobe Portable Document Format