Stephanie SchuckersRobert Rowe
When any technology starts to become pervasive, malicious parties will always search for methods of circumvention. One methos of circumvention in biometric recognition is a presentation attack (or spoofing), where an individual attempts to masquerade as someone else to either avoid being identified or to fraudulently gain access where they have no right to. A presentation attack is defined as "presentation to the biometric data capture subsystem with the goal of interfering with the operation of the biometric system". This definition includes attempts at avoiding identification, where the individual attempts to portray a nonexistent identity. This may include presentation of synthetic biometric characteristics or the alteration of one's own biometric characteristics in such a way as to portray a new unique identity. To mitigate the risk to biometric recognition technology, automated methods, known as presentation attack detection (PAD), are used to detect such presentation attacks. This chapter provides an overview of presentation attacks, PAD, and associated international standards.
Mona HeidariTomáš GoldmannMichal DvořákMartin Drahanský
Martin DrahanskýOndřej KanichMichal Dvořák