While biometrics technology has created new solutions to person authentication and has evolved to play a critical role in personal, national, and global security, the potential for the technology to be fooled or spoofed is now widely acknowledged. For example, fingerprint verification systems can be spoofed with a synthetic material, such as gelatine, inscribed with the fingerprint ridges of an enrolled individual. Iris and face recognition systems are vulnerable to printed photographs or video sequences of an enrolled user's eye or face. Speaker recognition systems can be spoofed through the use of replayed, synthesized, or converted speech.
CITATION STYLE
Evans, N., Li, S. Z., Marcel, S., & Ross, A. (2015, April 1). Guest editorial special issue on biometric spoofing and countermeasures. IEEE Transactions on Information Forensics and Security. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/TIFS.2015.2406111
Mendeley helps you to discover research relevant for your work.