UM  > Faculty of Science and Technology
Combining two strategies to optimize biometric decisions against spoofing attacks
Li W.3; Poh N.2; Zhou Y.1
Conference Name8th Conference of Optics and Photonics for Information Processing
Source PublicationProceedings of SPIE - The International Society for Optical Engineering
Conference DateAUG 18-20, 2014
Conference PlaceSan Diego, CA

Spoof attack by replicating biometric traits represents a real threat to an automatic biometric verification/ authentication system. This is because the system, originally designed to distinguish between genuine users from impostors, simply cannot distinguish between a replicated biometric sample (replica) from a live sample. An effective solution is to obtain some measures that can indicate whether or not a biometric trait has been tempered with, e.g., liveness detection measures. These measures are referred to as evidence of spoofing or anti-spoofing measures. In order to make the final accept/rejection decision, a straightforward solution to define two thresholds: one for the anti-spoofing measure, and another for the verification score. We compared two variants of a method that relies on applying two thresholds - one to the verification (matching) score and another to the anti-spoofing measure. Our experiments carried out using a signature database as well as by simulation show that both the brute-force and its probabilistic variant turn out to be optimal under different operating conditions.

KeywordBiometric Authorization Biometric Verification Spoof Attack
URLView the original
Indexed BySCI
WOS Research AreaEngineering ; Optics ; Physics
WOS SubjectEngineering, Electrical & Electronic ; Optics ; Physics, Applied
WOS IDWOS:000345007500040
Fulltext Access
Citation statistics
Cited Times [WOS]:0   [WOS Record]     [Related Records in WOS]
Document TypeConference paper
CollectionFaculty of Science and Technology
Affiliation1.Universidade de Macau
2.University of Surrey
3.Tsinghua University
Recommended Citation
GB/T 7714
Li W.,Poh N.,Zhou Y.. Combining two strategies to optimize biometric decisions against spoofing attacks[C],2014.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Li W.]'s Articles
[Poh N.]'s Articles
[Zhou Y.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Li W.]'s Articles
[Poh N.]'s Articles
[Zhou Y.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Li W.]'s Articles
[Poh N.]'s Articles
[Zhou Y.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.