Presentation attack detection and biometric recognition in a challenge-response formalism

被引:0
作者
Erwin Haasnoot
Luuk J. Spreeuwers
Raymond N. J. Veldhuis
机构
[1] University of Twente,Data Science Group, Faculty of EEMCS
来源
EURASIP Journal on Information Security | / 2022卷
关键词
Biometric challenge-response; Interactive biometrics; Presentation attack detection; Biometric recognition;
D O I
暂无
中图分类号
学科分类号
摘要
Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-response protocols (BCRP) form an underestimated part of this ecosystem. In this paper, we conceptualize what BCRPs are, and we propose a descriptive formalism and categorization for working with them. We validate the categorization against existing literature that we classified to be describing BCRPs. Lastly, we discuss how strong BCRPs provide advantages over PAD methods, specifically in the protection of individual applications and the protection of other applications from inadvertent leaks in BCRP applications. We note that research in BCRPs is fragmented, and our intent for the proposed formalism and categorization are to give focus and direction to research efforts into biometric challenge-response protocols.
引用
收藏
相关论文
共 39 条
  • [1] Eberhardt LV(2021)Direct voluntary control of pupil constriction and dilation: Exploratory evidence from pupillometry, optometry, skin conductance, perception, and functional MRI Int. J. Psychophysiol. 168 33-42
  • [2] Grön G(1935)Studies of interference in serial verbal reactions J. Exp. Psychol. 18 643-115
  • [3] Ulrich M(2017)Authentication using pulse-response biometrics Commun. ACM. 60 108-24
  • [4] Huckauf A(2018)SilentKey: A new authentication framework through ultrasonic-based lip reading Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 2 36-17821
  • [5] Strauch C(2019)EarEcho: Using Ear Canal Echo for Wearable Authentication Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 3 1-606
  • [6] Stroop JR(2021)Iritrack: Face presentation attack detection using iris tracking Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5 78-64
  • [7] Martinovic I(2016)Study of imposter attacks on novel fingerprint dynamics based verification system IEEE Access. 5 595-undefined
  • [8] Rasmussen K(2018)Integrating gaze tracking and head-motion prediction for mobile device authentication: a proof of concept Sensors. 18 2894-undefined
  • [9] Roeschlin M(2020)Challenge-response authentication using in-air handwriting style verification IEEE Transactions on Dependable and Secure Computing 17 51-undefined
  • [10] Tsudik G(2013)Pupil size signals novelty and predicts later retrieval success for declarative memories of natural scenes J Vis. 13 11-undefined