Presentation attack detection and biometric recognition in a challenge-response formalism
Abstract Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-resp...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2022-09-01
|
Series: | EURASIP Journal on Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1186/s13635-022-00131-y |
_version_ | 1798003129007996928 |
---|---|
author | Erwin Haasnoot Luuk J. Spreeuwers Raymond N. J. Veldhuis |
author_facet | Erwin Haasnoot Luuk J. Spreeuwers Raymond N. J. Veldhuis |
author_sort | Erwin Haasnoot |
collection | DOAJ |
description | Abstract Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-response protocols (BCRP) form an underestimated part of this ecosystem. In this paper, we conceptualize what BCRPs are, and we propose a descriptive formalism and categorization for working with them. We validate the categorization against existing literature that we classified to be describing BCRPs. Lastly, we discuss how strong BCRPs provide advantages over PAD methods, specifically in the protection of individual applications and the protection of other applications from inadvertent leaks in BCRP applications. We note that research in BCRPs is fragmented, and our intent for the proposed formalism and categorization are to give focus and direction to research efforts into biometric challenge-response protocols. |
first_indexed | 2024-04-11T12:02:49Z |
format | Article |
id | doaj.art-62f97334d71d4f2dbacabd8db69ef970 |
institution | Directory Open Access Journal |
issn | 2510-523X |
language | English |
last_indexed | 2024-04-11T12:02:49Z |
publishDate | 2022-09-01 |
publisher | SpringerOpen |
record_format | Article |
series | EURASIP Journal on Information Security |
spelling | doaj.art-62f97334d71d4f2dbacabd8db69ef9702022-12-22T04:24:48ZengSpringerOpenEURASIP Journal on Information Security2510-523X2022-09-012022111510.1186/s13635-022-00131-yPresentation attack detection and biometric recognition in a challenge-response formalismErwin Haasnoot0Luuk J. Spreeuwers1Raymond N. J. Veldhuis2Data Science Group, Faculty of EEMCS, University of TwenteData Science Group, Faculty of EEMCS, University of TwenteData Science Group, Faculty of EEMCS, University of TwenteAbstract Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-response protocols (BCRP) form an underestimated part of this ecosystem. In this paper, we conceptualize what BCRPs are, and we propose a descriptive formalism and categorization for working with them. We validate the categorization against existing literature that we classified to be describing BCRPs. Lastly, we discuss how strong BCRPs provide advantages over PAD methods, specifically in the protection of individual applications and the protection of other applications from inadvertent leaks in BCRP applications. We note that research in BCRPs is fragmented, and our intent for the proposed formalism and categorization are to give focus and direction to research efforts into biometric challenge-response protocols.https://doi.org/10.1186/s13635-022-00131-yBiometric challenge-responseInteractive biometricsPresentation attack detectionBiometric recognition |
spellingShingle | Erwin Haasnoot Luuk J. Spreeuwers Raymond N. J. Veldhuis Presentation attack detection and biometric recognition in a challenge-response formalism EURASIP Journal on Information Security Biometric challenge-response Interactive biometrics Presentation attack detection Biometric recognition |
title | Presentation attack detection and biometric recognition in a challenge-response formalism |
title_full | Presentation attack detection and biometric recognition in a challenge-response formalism |
title_fullStr | Presentation attack detection and biometric recognition in a challenge-response formalism |
title_full_unstemmed | Presentation attack detection and biometric recognition in a challenge-response formalism |
title_short | Presentation attack detection and biometric recognition in a challenge-response formalism |
title_sort | presentation attack detection and biometric recognition in a challenge response formalism |
topic | Biometric challenge-response Interactive biometrics Presentation attack detection Biometric recognition |
url | https://doi.org/10.1186/s13635-022-00131-y |
work_keys_str_mv | AT erwinhaasnoot presentationattackdetectionandbiometricrecognitioninachallengeresponseformalism AT luukjspreeuwers presentationattackdetectionandbiometricrecognitioninachallengeresponseformalism AT raymondnjveldhuis presentationattackdetectionandbiometricrecognitioninachallengeresponseformalism |