Information technology — Methodologies to evaluate the resistance of biometric systems to morphing attacks
This document establishes a methodology to evaluate the resistance of BSs to morphing attacks, including multiple identity attacks. The document is limited to image-based morphing attacks. The term "image-based" includes modalities such as face, iris and finger image data.
The document establishes:
— a definition of biometric sample modifications and manipulation with a specific focus on manipulations that constitute a multiple identity attack. This can be, for instance, an enrolment attack with face image morphing;
— a methodology to measure the morphing attack potential of a morphing method.
The document also describes how morphing algorithms can be used for system evaluation.
Currently Viewing
Expand Your Knowledge and Unlock Your Learning Potential - Your One-Stop Source for Information!
© Copyright 2025 BSB Edge Private Limited.