BS ISO/IEC 30107-3:2017
$167.15
Information technology. Biometric presentation attack detection – Testing and reporting
Published By | Publication Date | Number of Pages |
BSI | 2017 | 44 |
This document establishes:
-
principles and methods for performance assessment of presentation attack detection mechanisms;
-
reporting of testing results from evaluations of presentation attack detection mechanisms;
-
a classification of known attack types (in an informative annex).
Outside the scope are:
-
standardization of specific PAD mechanisms;
-
detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms, or sensors;
-
overall system-level security or vulnerability assessment.
The attacks considered in this document take place at the sensor during presentation. Any other attacks are considered outside the scope of this document.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
7 | Foreword |
8 | Introduction |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
12 | 3.1 Attack elements |
13 | 3.2 Metrics |
14 | 4 Abbreviated terms |
15 | 5 Conformance |
16 | 6 Presentation attack detection overview 7 Levels of evaluation of PAD mechanisms 7.1 Overview |
17 | 7.2 General principles of evaluation of PAD mechanisms 7.3 PAD subsystem evaluation |
18 | 7.4 Data capture subsystem evaluation 7.5 Full-system evaluation |
19 | 8 Artefact properties 8.1 Properties of presentation attack instruments in biometric impostor attacks |
20 | 8.2 Properties of presentation attack instruments in biometric concealer attacks 8.3 Properties of synthesized biometric samples with abnormal characteristics |
21 | 9 Considerations in non-conformant capture attempts of biometric characteristics 9.1 Methods of presentation 9.2 Methods of assessment 10 Artefact creation and usage in evaluations of PAD mechanisms 10.1 General |
22 | 10.2 Artefact creation and preparation |
23 | 10.3 Artefact usage 10.4 Iterative testing to identity effective artefacts 11 Process-dependent evaluation factors 11.1 Overview |
24 | 11.2 Evaluating the enrolment process 11.3 Evaluating the verification process 11.4 Evaluating the identification process |
25 | 11.5 Evaluating offline PAD mechanisms 12 Evaluation using Common Criteria framework 12.1 General |
27 | 12.2 Common Criteria and biometrics 12.2.1 Overview 12.2.2 General evaluation aspects 12.2.3 Error rates in testing |
28 | 12.2.4 PAD evaluation 12.2.5 Vulnerability assessment |
29 | 13 Metrics for the evaluation of biometric systems with PAD mechanisms 13.1 General |
30 | 13.2 Metrics for PAD subsystem evaluation 13.2.1 General 13.2.2 Classification metrics |
31 | 13.2.3 Non-response metrics |
32 | 13.2.4 Efficiency metrics 13.2.5 Summary 13.3 Metrics for data capture subsystem evaluation 13.3.1 General 13.3.2 Classification metrics 13.3.3 Non-response and capture metrics |
33 | 13.3.4 Efficiency metrics 13.3.5 Summary 13.4 Metrics for full-system evaluation 13.4.1 General 13.4.2 Accuracy metrics |
34 | 13.4.3 Efficiency metrics 13.4.4 Summary |
35 | Annex A (informative) Classification of attack types |
41 | Annex B (informative) Examples of artefact species used in a PAD subsystem evaluation for fingerprint capture devices |
42 | Bibliography |