{"id":352975,"date":"2024-10-20T00:55:26","date_gmt":"2024-10-20T00:55:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-30107-32017\/"},"modified":"2024-10-26T00:59:31","modified_gmt":"2024-10-26T00:59:31","slug":"bs-iso-iec-30107-32017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-30107-32017\/","title":{"rendered":"BS ISO\/IEC 30107-3:2017"},"content":{"rendered":"
This document establishes:<\/p>\n
principles and methods for performance assessment of presentation attack detection mechanisms;<\/p>\n<\/li>\n
reporting of testing results from evaluations of presentation attack detection mechanisms;<\/p>\n<\/li>\n
a classification of known attack types (in an informative annex).<\/p>\n<\/li>\n<\/ul>\n
Outside the scope are:<\/p>\n
standardization of specific PAD mechanisms;<\/p>\n<\/li>\n
detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms, or sensors;<\/p>\n<\/li>\n
overall system-level security or vulnerability assessment.<\/p>\n<\/li>\n<\/ul>\n
The attacks considered in this document take place at the sensor during presentation. Any other attacks are considered outside the scope of this document.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3.1 Attack elements <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.2 Metrics <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5 Conformance <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6 Presentation attack detection overview 7 Levels of evaluation of PAD mechanisms 7.1 Overview <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.2 General principles of evaluation of PAD mechanisms 7.3 PAD subsystem evaluation <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.4 Data capture subsystem evaluation 7.5 Full-system evaluation <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8 Artefact properties 8.1 Properties of presentation attack instruments in biometric impostor attacks <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.2 Properties of presentation attack instruments in biometric concealer attacks 8.3 Properties of synthesized biometric samples with abnormal characteristics <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 9 Considerations in non-conformant capture attempts of biometric characteristics 9.1 Methods of presentation 9.2 Methods of assessment 10 Artefact creation and usage in evaluations of PAD mechanisms 10.1 General <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 10.2 Artefact creation and preparation <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 10.3 Artefact usage 10.4 Iterative testing to identity effective artefacts 11 Process-dependent evaluation factors 11.1 Overview <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 11.2 Evaluating the enrolment process 11.3 Evaluating the verification process 11.4 Evaluating the identification process <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 11.5 Evaluating offline PAD mechanisms 12 Evaluation using Common Criteria framework 12.1 General <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 12.2 Common Criteria and biometrics 12.2.1 Overview 12.2.2 General evaluation aspects 12.2.3 Error rates in testing <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 12.2.4 PAD evaluation 12.2.5 Vulnerability assessment <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 13 Metrics for the evaluation of biometric systems with PAD mechanisms 13.1 General <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 13.2 Metrics for PAD subsystem evaluation 13.2.1 General 13.2.2 Classification metrics <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 13.2.3 Non-response metrics <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 13.2.4 Efficiency metrics 13.2.5 Summary 13.3 Metrics for data capture subsystem evaluation 13.3.1 General 13.3.2 Classification metrics 13.3.3 Non-response and capture metrics <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 13.3.4 Efficiency metrics 13.3.5 Summary 13.4 Metrics for full-system evaluation 13.4.1 General 13.4.2 Accuracy metrics <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 13.4.3 Efficiency metrics 13.4.4 Summary <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex\u00a0A (informative) Classification of attack types <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex\u00a0B (informative) Examples of artefact species used in a PAD subsystem evaluation for fingerprint capture devices <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Biometric presentation attack detection – Testing and reporting<\/b><\/p>\n |