Shopping Cart

No products in the cart.

BS ISO/IEC 30107-3:2017

$167.15

Information technology. Biometric presentation attack detection – Testing and reporting

Published By Publication Date Number of Pages
BSI 2017 44
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document establishes:

  • principles and methods for performance assessment of presentation attack detection mechanisms;

  • reporting of testing results from evaluations of presentation attack detection mechanisms;

  • a classification of known attack types (in an informative annex).

Outside the scope are:

  • standardization of specific PAD mechanisms;

  • detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms, or sensors;

  • overall system-level security or vulnerability assessment.

The attacks considered in this document take place at the sensor during presentation. Any other attacks are considered outside the scope of this document.

PDF Catalog

PDF Pages PDF Title
2 National foreword
7 Foreword
8 Introduction
11 1 Scope
2 Normative references
3 Terms and definitions
12 3.1 Attack elements
13 3.2 Metrics
14 4 Abbreviated terms
15 5 Conformance
16 6 Presentation attack detection overview
7 Levels of evaluation of PAD mechanisms
7.1 Overview
17 7.2 General principles of evaluation of PAD mechanisms
7.3 PAD subsystem evaluation
18 7.4 Data capture subsystem evaluation
7.5 Full-system evaluation
19 8 Artefact properties
8.1 Properties of presentation attack instruments in biometric impostor attacks
20 8.2 Properties of presentation attack instruments in biometric concealer attacks
8.3 Properties of synthesized biometric samples with abnormal characteristics
21 9 Considerations in non-conformant capture attempts of biometric characteristics
9.1 Methods of presentation
9.2 Methods of assessment
10 Artefact creation and usage in evaluations of PAD mechanisms
10.1 General
22 10.2 Artefact creation and preparation
23 10.3 Artefact usage
10.4 Iterative testing to identity effective artefacts
11 Process-dependent evaluation factors
11.1 Overview
24 11.2 Evaluating the enrolment process
11.3 Evaluating the verification process
11.4 Evaluating the identification process
25 11.5 Evaluating offline PAD mechanisms
12 Evaluation using Common Criteria framework
12.1 General
27 12.2 Common Criteria and biometrics
12.2.1 Overview
12.2.2 General evaluation aspects
12.2.3 Error rates in testing
28 12.2.4 PAD evaluation
12.2.5 Vulnerability assessment
29 13 Metrics for the evaluation of biometric systems with PAD mechanisms
13.1 General
30 13.2 Metrics for PAD subsystem evaluation
13.2.1 General
13.2.2 Classification metrics
31 13.2.3 Non-response metrics
32 13.2.4 Efficiency metrics
13.2.5 Summary
13.3 Metrics for data capture subsystem evaluation
13.3.1 General
13.3.2 Classification metrics
13.3.3 Non-response and capture metrics
33 13.3.4 Efficiency metrics
13.3.5 Summary
13.4 Metrics for full-system evaluation
13.4.1 General
13.4.2 Accuracy metrics
34 13.4.3 Efficiency metrics
13.4.4 Summary
35 Annex A (informative) Classification of attack types
41 Annex B (informative) Examples of artefact species used in a PAD subsystem evaluation for fingerprint capture devices
42 Bibliography
BS ISO/IEC 30107-3:2017
$167.15