Guest editorial special issue on biometric spoofing and countermeasures

17Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

While biometrics technology has created new solutions to person authentication and has evolved to play a critical role in personal, national, and global security, the potential for the technology to be fooled or spoofed is now widely acknowledged. For example, fingerprint verification systems can be spoofed with a synthetic material, such as gelatine, inscribed with the fingerprint ridges of an enrolled individual. Iris and face recognition systems are vulnerable to printed photographs or video sequences of an enrolled user's eye or face. Speaker recognition systems can be spoofed through the use of replayed, synthesized, or converted speech.

Cite

CITATION STYLE

APA

Evans, N., Li, S. Z., Marcel, S., & Ross, A. (2015, April 1). Guest editorial special issue on biometric spoofing and countermeasures. IEEE Transactions on Information Forensics and Security. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/TIFS.2015.2406111

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free