Spoofing detection on adaptive authentication System-A survey

被引:2
作者
Baaqeel, Hind [1 ]
Olatunji, Sunday [1 ,2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Comp Sci Dept, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, SAUDI ARAMCO Cybersecur Chair, Coll Comp Sci & Informat Technol, Dammam, Saudi Arabia
关键词
adaptive authentication; biometrics; security and privacy; user authentication; CANCELABLE FUSION; FACE; ENCRYPTION; SECURITY;
D O I
10.1049/bme2.12060
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the widespread of computing and mobile devices, authentication using biometrics has received greater attention. Although biometric systems usually provide efficient solutions, the recognition performance tends to be affected over time due to changing conditions and the ageing of biometric data, which results in intra-class variability. This issue is one of the leading causes of the high false rejection rate in biometric authentication systems. Fortunately, this issue has been addressed by using adaptive biometric solutions in which the system gradually adapts to new changes in user biometrics. However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. In this work, the authors will carry out a systematic literature review by conducting a comparative study on state-of-the-art solutions for spoofing detection on adaptive authentication systems. This paper will identify the main issues that need to be addressed in adaptive authentication systems. Thus, the authors aim to encourage researchers to develop more robust adaptive solutions to overcome the identified gaps in this research.
引用
收藏
页码:87 / 96
页数:10
相关论文
共 68 条
  • [1] Anti-spoofing's state-of-the-art: deep learning meets super sensors
    AbdAlmageed W.
    [J]. Biometric Technology Today, 2019, 2019 (07): : 8 - 11
  • [2] Cancelable fusion-based face recognition
    Abdellatef, Essam
    Ismail, Nabil A.
    Abd Elrahman, Salah Eldin S. E.
    Ismail, Khalid N.
    Rihan, Mohamed
    Abd El-Samie, Fathi E.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 31557 - 31580
  • [3] Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption
    Abou Elazm, Lamiaa A.
    Ibrahim, Sameh
    Egila, Mohamed G.
    Shawky, H.
    Elsaid, Mohamed K. H.
    El-Shafai, Walid
    Abd El-Samie, Fathi E.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 14053 - 14078
  • [4] Akhtar Zahid, 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM). Proceedings, P9, DOI 10.1109/CIBIM.2014.7015437
  • [5] [Anonymous], 2010, THESIS U CAGLIARI CA
  • [6] [Anonymous], 2020, FACE ID ADV TECHN
  • [7] A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system
    Ben Tarif, Eyad
    Wibowo, Santoso
    Wasimi, Saleh
    Tareef, Afaf
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2485 - 2503
  • [8] Adversarial Biometric Recognition [A review on biometric system security from the adversarial machine-learning perspective]
    Biggio, Battista
    Fumera, Giorgio
    Russu, Paolo
    Didaci, Luca
    Roli, Fabio
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2015, 32 (05) : 31 - 41
  • [9] Biggio B, 2012, LECT NOTES COMPUT SC, V7626, P417, DOI 10.1007/978-3-642-34166-3_46
  • [10] Chen H., 2019, IEEE T INF FOREN SEC, V1