UM  > 科技學院
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks
Yu S.1,2; Ai Y.1,2; Xu B.1,2; Zhou Y.3; Li W.1,2; Liao Q.1,2; Poh N.4
2016-07-20
Source PublicationInformation Sciences
ISSN00200255
Volume352-353Pages:188-202
Abstract

A conventional biometric authentication system is often designed to distinguish genuine accesses from zero-effort impostor attacks. However, when operating in an adversarial environment, the system has to be robust against presentation attacks such as spoofing. An effective solution to reduce the impact of spoofing attack is to consider both the matching score and liveness score when making the accept/reject decision. In this paper, we consider the joint decision space of matching and liveness scores in the presence of both spoofing attack and zero-effort attack, with application to signature verification. Our investigation aims to understand how decision thresholds in the above space should be optimized. This leads to two dichotomies of methods, namely brute-force approach versus probabilistic approach; and single threshold versus double-threshold approach. This view leads to three novel methods that have never been reported. Based on the experimental results carried out on an off-line signature database, the novel methods turn out to outperform simpler methods with only matching score.

KeywordBiometric Authentication Brute-force Liveness Score Probabilistic Spoofing Attack
DOI10.1016/j.ins.2016.03.005
URLView the original
Indexed BySCI
Language英语
WOS Research AreaComputer Science
WOS SubjectComputer Science, Information Systems
WOS IDWOS:000375632000012
Fulltext Access
Citation statistics
Cited Times [WOS]:3   [WOS Record]     [Related Records in WOS]
Document TypeJournal article
CollectionFaculty of Science and Technology
DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
Affiliation1.Department of Electronic Engineering/Graduate School at Shenzhen, Tsinghua University, China
2.Shenzhen Key Laboratory of Information Science and Technology, Shenzhen, China
3.Department of Computer and Information Science, University of Macau, Macau, China
4.Department of Computer Science, University of Surrey, Guildford, Surrey, United Kingdom
Recommended Citation
GB/T 7714
Yu S.,Ai Y.,Xu B.,et al. Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks[J]. Information Sciences,2016,352-353:188-202.
APA Yu S..,Ai Y..,Xu B..,Zhou Y..,Li W..,...&Poh N..(2016).Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks.Information Sciences,352-353,188-202.
MLA Yu S.,et al."Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks".Information Sciences 352-353(2016):188-202.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Yu S.]'s Articles
[Ai Y.]'s Articles
[Xu B.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Yu S.]'s Articles
[Ai Y.]'s Articles
[Xu B.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Yu S.]'s Articles
[Ai Y.]'s Articles
[Xu B.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.