• DocumentCode
    256451
  • Title

    Introduction to identity usurpation applied to biometric modalities

  • Author

    Ichahane, My Youssef ; Chiny, Mohamed ; Abou Elkalam, Anas ; Ouahman, Abdellah Ait

  • Author_Institution
    Nat. Sch. of Appl. Sci., Cadi Ayaad Univ., Morocco
  • fYear
    2014
  • fDate
    14-16 April 2014
  • Firstpage
    1248
  • Lastpage
    1255
  • Abstract
    In this paper, we first discussed the rationale behind the attacks on biometric authentication systems. We also discussed the eight conceptual points of vulnerability that an attacker can use to bypass a biometric recognition system. Among all the attacks, the spoofing attacks (providing false biometric features for the sensor) gained much attention and therefore we have defined and discussed them in detail. Indeed, we will present thorough review of the state of the art of usurpation methods of both faces a biometric digital fingerprint. Then, we will give the review of the literature on the evaluation of the robustness of multimodal biometric systems against spoofing attacks. Various existing studies concluded the popular thought that the multimodal biometric systems are vulnerable to spoofing attacks and can be cracked even by usurping a single feature.
  • Keywords
    cryptography; face recognition; fingerprint identification; biometric authentication systems; biometric digital fingerprint; biometric recognition system; identity usurpation; multimodal biometric systems; spoofing attacks; usurpation methods; Classification algorithms; Robustness; biometric systems; liveliness detection; multibiometric; robustness; spoof attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Multimedia Computing and Systems (ICMCS), 2014 International Conference on
  • Conference_Location
    Marrakech
  • Print_ISBN
    978-1-4799-3823-0
  • Type

    conf

  • DOI
    10.1109/ICMCS.2014.6911332
  • Filename
    6911332