Guest Editorial special issue on biometric spoofing and countermeasures

Evans, Nicholas; Li, S.Z ; Marcel, S ; Ross, A
IEEE Transactions on Information Forensics and Security, Volume 10, N°4, April 2015, ISSN: 1556-6013

While biometrics technology has created new solutions to person authentication and has evolved to play a critical role in personal, national, and global security, the potential for the technology to be fooled or spoofed is now widely acknowledged. For example, fingerprint verification systems can be spoofed with a synthetic material, such as gelatine, inscribed with the fingerprint ridges of an enrolled individual. Iris and face recognition systems are vulnerable to printed photographs or video sequences of an enrolled user's eye or face. Speaker recognition systems can be spoofed through the use of replayed, synthesized, or converted speech.

Sécurité numérique
Eurecom Ref:
© 2015 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
See also: