BS ISO/IEC 30107-1:2016
$102.76
Information technology. Biometric presentation attack detection – Framework
Published By | Publication Date | Number of Pages |
BSI | 2016 | 22 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Symbols and abbreviated terms |
11 | 5 Characterisation of presentation attacks 5.1 General |
12 | 5.2 Presentation attack instruments |
13 | 6 Framework for presentation attack detection methods 6.1 Types of presentation attack detection 6.2 The role of challenge-response |
14 | 6.2.1 Challenge-response related to liveness 6.2.2 Liveness not related to challenge-response 6.2.3 Challenge-response not related to biometrics 6.3 Presentation attack detection process |
15 | 6.4 Presentation attack detection within biometric system architecture 6.4.1 Overview in terms of the generalized biometric framework |
16 | 6.4.2 PAD processing considerations relative to the other biometric subsystems |
17 | 6.4.3 PAD location implications regarding data interchange 7 Obstacles to biometric imposter presentation attacks in a biometric system |
19 | Bibliography |