Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Biometrics
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Attacks at presentation=== In the context of biometric systems, presentation attacks may also be called "[[spoofing attack]]s". As per the recent ISO/IEC 30107 standard,<ref>{{Cite web|url=http://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/05/32/53227.html|title=ISO/IEC 30107-1:2016|website=iso.org|language=en|access-date=2019-04-23}}</ref> presentation attacks are defined as "presentation to the biometric capture subsystem with the goal of interfering with the operation of the biometric system". These attacks can be either impersonation or [[obfuscation]] attacks. Impersonation attacks try to gain access by pretending to be someone else. Obfuscation attacks may, for example, try to evade [[face detection]] and [[Facial recognition system|face recognition]] systems. Several methods have been proposed to counteract presentation attacks.<ref>{{Cite journal|date=2014|editor-last=Marcel|editor-first=Sébastien|editor2-last=Nixon|editor2-first=Mark S.|editor3-last=Li|editor3-first=Stan Z.|title=Handbook of Biometric Anti-Spoofing|journal=Advances in Computer Vision and Pattern Recognition|doi=10.1007/978-1-4471-6524-8|issn=2191-6586|isbn=978-1-4471-6523-1|s2cid=27594864}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)