DocumentCode
256451
Title
Introduction to identity usurpation applied to biometric modalities
Author
Ichahane, My Youssef ; Chiny, Mohamed ; Abou Elkalam, Anas ; Ouahman, Abdellah Ait
Author_Institution
Nat. Sch. of Appl. Sci., Cadi Ayaad Univ., Morocco
fYear
2014
fDate
14-16 April 2014
Firstpage
1248
Lastpage
1255
Abstract
In this paper, we first discussed the rationale behind the attacks on biometric authentication systems. We also discussed the eight conceptual points of vulnerability that an attacker can use to bypass a biometric recognition system. Among all the attacks, the spoofing attacks (providing false biometric features for the sensor) gained much attention and therefore we have defined and discussed them in detail. Indeed, we will present thorough review of the state of the art of usurpation methods of both faces a biometric digital fingerprint. Then, we will give the review of the literature on the evaluation of the robustness of multimodal biometric systems against spoofing attacks. Various existing studies concluded the popular thought that the multimodal biometric systems are vulnerable to spoofing attacks and can be cracked even by usurping a single feature.
Keywords
cryptography; face recognition; fingerprint identification; biometric authentication systems; biometric digital fingerprint; biometric recognition system; identity usurpation; multimodal biometric systems; spoofing attacks; usurpation methods; Classification algorithms; Robustness; biometric systems; liveliness detection; multibiometric; robustness; spoof attacks;
fLanguage
English
Publisher
ieee
Conference_Titel
Multimedia Computing and Systems (ICMCS), 2014 International Conference on
Conference_Location
Marrakech
Print_ISBN
978-1-4799-3823-0
Type
conf
DOI
10.1109/ICMCS.2014.6911332
Filename
6911332
Link To Document