IEEE Signal Processing Magazine, Vol. 32, N°5, September 2015
Biometrics already form a significant component of current and emerging identification technologies. Biometrics systems aim to determine or verify the identity of an individual from their behavioural and/or biological characteristics. Despite significant progress, some biometric systems fail to meet the multitude of stringent security and robustness requirements to support their deployment in some practical scenarios. Among current concerns are vulnerabilities to spoofing, namely persons who masquerade as others in
order to gain illegitimate accesses to protected data, services or facilities. While the study of spoofing, or rather anti-spoofing, has attracted growing interest in recent years, the problem is far from being solved and will require far greater attention in coming years. This tutorial article presents an introduction to spoofing and anti-spoofing research. It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future.
© 2015 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.