Residential College | false |
Status | 已發表Published |
Combining two strategies to optimize biometric decisions against spoofing attacks | |
Li Weifeng3; Poh N.2; Zhou Yicong1 | |
2014 | |
Conference Name | 8th Conference of Optics and Photonics for Information Processing |
Source Publication | Proceedings of SPIE - The International Society for Optical Engineering |
Volume | 9216 |
Conference Date | AUG 18-20, 2014 |
Conference Place | San Diego, CA |
Abstract | Spoof attack by replicating biometric traits represents a real threat to an automatic biometric verification/ authentication system. This is because the system, originally designed to distinguish between genuine users from impostors, simply cannot distinguish between a replicated biometric sample (replica) from a live sample. An effective solution is to obtain some measures that can indicate whether or not a biometric trait has been tempered with, e.g., liveness detection measures. These measures are referred to as evidence of spoofing or anti-spoofing measures. In order to make the final accept/rejection decision, a straightforward solution to define two thresholds: one for the anti-spoofing measure, and another for the verification score. We compared two variants of a method that relies on applying two thresholds - one to the verification (matching) score and another to the anti-spoofing measure. Our experiments carried out using a signature database as well as by simulation show that both the brute-force and its probabilistic variant turn out to be optimal under different operating conditions. |
Keyword | Biometric Authorization Biometric Verification Spoof Attack |
DOI | 10.1117/12.2061785 |
URL | View the original |
Indexed By | SCIE |
Language | 英語English |
WOS Research Area | Engineering ; Optics ; Physics |
WOS Subject | Engineering, Electrical & Electronic ; Optics ; Physics, Applied |
WOS ID | WOS:000345007500040 |
Scopus ID | 2-s2.0-84922933770 |
Fulltext Access | |
Citation statistics | |
Document Type | Conference paper |
Collection | DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE Faculty of Science and Technology |
Affiliation | 1.University of Macau 2.University of Surrey 3.Tsinghua University |
Recommended Citation GB/T 7714 | Li Weifeng,Poh N.,Zhou Yicong. Combining two strategies to optimize biometric decisions against spoofing attacks[C], 2014. |
APA | Li Weifeng., Poh N.., & Zhou Yicong (2014). Combining two strategies to optimize biometric decisions against spoofing attacks. Proceedings of SPIE - The International Society for Optical Engineering, 9216. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment