Presentation attack detection and biometric recognition in a challenge-response formalism

Abstract Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-resp...

Full description

Bibliographic Details
Main Authors: Erwin Haasnoot, Luuk J. Spreeuwers, Raymond N. J. Veldhuis
Format: Article
Language:English
Published: SpringerOpen 2022-09-01
Series:EURASIP Journal on Information Security
Subjects:
Online Access:https://doi.org/10.1186/s13635-022-00131-y
_version_ 1798003129007996928
author Erwin Haasnoot
Luuk J. Spreeuwers
Raymond N. J. Veldhuis
author_facet Erwin Haasnoot
Luuk J. Spreeuwers
Raymond N. J. Veldhuis
author_sort Erwin Haasnoot
collection DOAJ
description Abstract Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-response protocols (BCRP) form an underestimated part of this ecosystem. In this paper, we conceptualize what BCRPs are, and we propose a descriptive formalism and categorization for working with them. We validate the categorization against existing literature that we classified to be describing BCRPs. Lastly, we discuss how strong BCRPs provide advantages over PAD methods, specifically in the protection of individual applications and the protection of other applications from inadvertent leaks in BCRP applications. We note that research in BCRPs is fragmented, and our intent for the proposed formalism and categorization are to give focus and direction to research efforts into biometric challenge-response protocols.
first_indexed 2024-04-11T12:02:49Z
format Article
id doaj.art-62f97334d71d4f2dbacabd8db69ef970
institution Directory Open Access Journal
issn 2510-523X
language English
last_indexed 2024-04-11T12:02:49Z
publishDate 2022-09-01
publisher SpringerOpen
record_format Article
series EURASIP Journal on Information Security
spelling doaj.art-62f97334d71d4f2dbacabd8db69ef9702022-12-22T04:24:48ZengSpringerOpenEURASIP Journal on Information Security2510-523X2022-09-012022111510.1186/s13635-022-00131-yPresentation attack detection and biometric recognition in a challenge-response formalismErwin Haasnoot0Luuk J. Spreeuwers1Raymond N. J. Veldhuis2Data Science Group, Faculty of EEMCS, University of TwenteData Science Group, Faculty of EEMCS, University of TwenteData Science Group, Faculty of EEMCS, University of TwenteAbstract Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-response protocols (BCRP) form an underestimated part of this ecosystem. In this paper, we conceptualize what BCRPs are, and we propose a descriptive formalism and categorization for working with them. We validate the categorization against existing literature that we classified to be describing BCRPs. Lastly, we discuss how strong BCRPs provide advantages over PAD methods, specifically in the protection of individual applications and the protection of other applications from inadvertent leaks in BCRP applications. We note that research in BCRPs is fragmented, and our intent for the proposed formalism and categorization are to give focus and direction to research efforts into biometric challenge-response protocols.https://doi.org/10.1186/s13635-022-00131-yBiometric challenge-responseInteractive biometricsPresentation attack detectionBiometric recognition
spellingShingle Erwin Haasnoot
Luuk J. Spreeuwers
Raymond N. J. Veldhuis
Presentation attack detection and biometric recognition in a challenge-response formalism
EURASIP Journal on Information Security
Biometric challenge-response
Interactive biometrics
Presentation attack detection
Biometric recognition
title Presentation attack detection and biometric recognition in a challenge-response formalism
title_full Presentation attack detection and biometric recognition in a challenge-response formalism
title_fullStr Presentation attack detection and biometric recognition in a challenge-response formalism
title_full_unstemmed Presentation attack detection and biometric recognition in a challenge-response formalism
title_short Presentation attack detection and biometric recognition in a challenge-response formalism
title_sort presentation attack detection and biometric recognition in a challenge response formalism
topic Biometric challenge-response
Interactive biometrics
Presentation attack detection
Biometric recognition
url https://doi.org/10.1186/s13635-022-00131-y
work_keys_str_mv AT erwinhaasnoot presentationattackdetectionandbiometricrecognitioninachallengeresponseformalism
AT luukjspreeuwers presentationattackdetectionandbiometricrecognitioninachallengeresponseformalism
AT raymondnjveldhuis presentationattackdetectionandbiometricrecognitioninachallengeresponseformalism