Presentation attack detection and biometric recognition in a challenge-response formalism

被引:2
作者
Haasnoot, Erwin [1 ]
Spreeuwers, Luuk J. [1 ]
Veldhuis, Raymond N. J. [1 ]
机构
[1] Univ Twente, Fac EEMCS, Data Sci Grp, Enschede, Netherlands
关键词
Biometric challenge-response; Interactive biometrics; Presentation attack detection; Biometric recognition; AUTHENTICATION;
D O I
10.1186/s13635-022-00131-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-response protocols (BCRP) form an underestimated part of this ecosystem. In this paper, we conceptualize what BCRPs are, and we propose a descriptive formalism and categorization for working with them. We validate the categorization against existing literature that we classified to be describing BCRPs. Lastly, we discuss how strong BCRPs provide advantages over PAD methods, specifically in the protection of individual applications and the protection of other applications from inadvertent leaks in BCRP applications. We note that research in BCRPs is fragmented, and our intent for the proposed formalism and categorization are to give focus and direction to research efforts into biometric challenge-response protocols.
引用
收藏
页数:15
相关论文
共 46 条
  • [1] Liveness Detection using Gaze Collinearity
    Ali, Asad
    Deravi, Farzin
    Hoque, Sanaul
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2012, : 62 - 65
  • [2] Study of Imposter Attacks on Novel Fingerprint Dynamics Based Verfication System
    Bhardwaj, Ishan
    Londhe, Narendra D.
    Kopparapu, Sunil K.
    [J]. IEEE ACCESS, 2017, 5 : 595 - 606
  • [3] Bhaskaran S., 2016, US Patent, Patent No. [9,412,381, 9412381]
  • [4] Reflexive Memory Authenticator: A Proposal for Effortless Renewable Biometrics
    Blanchard, Nikola K.
    Kachanovich, Siargey
    Selker, Ted
    Waligorski, Florentin
    [J]. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 104 - 121
  • [5] Burgbacher U, 2014, IEEE SYS MAN CYBERN, P3328, DOI 10.1109/SMC.2014.6974441
  • [6] Chaudhury K., 2014, US Patent, Patent No. [8,856,541, 8856541]
  • [7] BreathPrint: Breathing Acoustics-based User Authentication
    Chauhan, Jagmohan
    Hu, Yining
    Seneviratne, Suranga
    Misra, Archan
    Seneviratne, Aruna
    Lee, Youngki
    [J]. MOBISYS'17: PROCEEDINGS OF THE 15TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2017, : 278 - 291
  • [8] De Marsico M., 2012, 2012 5th IAPR International Conference on Biometrics (ICB), P73, DOI 10.1109/ICB.2012.6199761
  • [9] Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303
  • [10] Direct voluntary control of pupil constriction and dilation: Exploratory evidence from pupillometry, optometry, skin conductance, perception, and functional MRI
    Eberhardt, Lisa, V
    Groen, Georg
    Ulrich, Martin
    Huckauf, Anke
    Strauch, Christoph
    [J]. INTERNATIONAL JOURNAL OF PSYCHOPHYSIOLOGY, 2021, 168 : 33 - 42