Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective

@article{Biggio2015AdversarialBR,
  title={Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective},
  author={B. Biggio and G. Fumera and P. Russu and Luca Didaci and F. Roli},
  journal={IEEE Signal Processing Magazine},
  year={2015},
  volume={32},
  pages={31-41}
}
  • B. Biggio, G. Fumera, +2 authors F. Roli
  • Published 2015
  • Computer Science
  • IEEE Signal Processing Magazine
  • In this article, we review previous work on biometric security under a recent framework proposed in the field of adversarial machine learning. This allows us to highlight novel insights on the security of biometric systems when operating in the presence of intelligent and adaptive attackers that manipulate data to compromise normal system operation. We show how this framework enables the categorization of known and novel vulnerabilities of biometric recognition systems, along with the… CONTINUE READING
    Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating
    • 5
    • Highly Influenced
    • PDF
    Characterizing and Evaluating Adversarial Examples for Offline Handwritten Signature Verification
    • 9
    • Highly Influenced
    • PDF
    Protection of Privacy in Biometric Data
    • 37
    • PDF
    Adaptive Biometric Systems: Review and Perspectives
    • 4
    Secure Detection of Image Manipulation by Means of Random Feature Selection
    • 11
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 34 REFERENCES
    Biometric Template Security
    • 711
    • PDF
    Poisoning Adaptive Biometric Systems
    • 41
    • PDF
    Security Evaluation of Pattern Classifiers under Attack
    • 294
    • PDF
    Vulnerabilities in Biometric Encryption Systems
    • 157
    • PDF
    Robustness of multimodal biometric fusion methods against spoof attacks
    • 169
    • PDF
    An evaluation of indirect attacks and countermeasures in fingerprint verification systems
    • 38
    • PDF