ГОСТ Р 58624.3-2019 (ИСО/МЭК 30107-3:2017). Национальный стандарт Российской Федерации. Информационные технологии. Биометрия. Обнаружение атаки на биометрическое предъявление. Часть 3. Испытания и протоколы испытаний
БИБЛИОГРАФИЯ
[1] | Н.М. Костылев, А.В. Горевой "Модуль обнаружения витальности лица по спектральным характеристикам отражения кожи человека". Инженерный журнал: "Наука и инновации", 2013, вып. 9. http://engjournal.ru/catalog/pribor/optica/925.html |
[2] | И.А. Калиновский, Г.М. Лаврентьева "Обнаружение спуфинг-атак на систему лицевой биометрии". Computer Vision, 2018, с. 204 - 207, http://www.graphicon.ru/html/2018/papers/204-207.pdf |
[3] | Marcialis G.L., Lewicke A., Tan B., Coli P., Grimberg D., Congiu A. First International Fingerprint Liveness Detection Competition - LivDet 2009, http://www.clarkson.edu/biosal/pdf/first.pdf |
[4] | Une M., Otsuka A., Imai H. Wolf attack probability: a new security measure in biometric authentication systems. In: Advances in Biometrics, 2007, pp. 396 - 406 |
[5] | Barral C., & Tria A. Fake fingers in fingerprint recognition: glycerin supersedes gelatin. In: Formal to Practical Security, Vol. 5458, Springer Berlin, Heidelberg, 2009, pp. 57 - 69 |
[6] | Lefohn A., Budge B., Shirley P., Caruso R., Reinhard E. An ocularist's approach to human iris synthesis. IEEE Comput. Graph. Appl. 2003, pp. 70 - 75 |
[7] | http://findbiometrics.com/million-dollar-border-security-machines-fooled-with-ten-cent-tape/ |
[8] | Matsumoto T., Matsumoto H., Yamada K., Yoshino S. Impact of Artificial "Gummy" Fingers on Fingerprint Systems, Proc. Of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, Vol. 4677, January 2002, pp. 275 - 289 |
[9] | Cappelli R., Maio D., Maltoni D., Erol A. "Synthetic fingerprint-image generation", 15th International Conference on Pattern Recognition, Vol. 3, pp. 471 - 474, 2000 |
[10] | Bunnell H.T., Pennington C., Yarrington D., Gray J. "Automatic personal synthetic voice construction", Ninth European Conference on Speech Communication and Technology, 2005 |
[11] | Adler A. "Can Images be Regenerated from Biometric Templates?", Biometrics Conference, Vol. 1, Sept. 22 - 24, 2003 |
[12] | Saintourens M., Tramus M.H., Huitric H., Nahas M. "Creation of a synthetic face speaking in real time with a synthetic voice", The ESCA Workshop on Speech Synthesis, 1991 |
[13] | Makthal S., & Ross A. "Synthesis of iris images using Markov random fields", Proc. 13th European Signal Processing Conf, 2005 |
[14] | Zwiesele A., Munde A., Busch C., Daum H. Comparative Study of Biometric Identification Systems, in: 34th Annual 2000 IEEE International Carnahan Conference on Security Technology, Ottawa, pp. 60 - 63, (2000) |
[15] | Pacut A., & Czajka A. "Aliveness detection for iris biometrics", 2006 IEEE International Carnahan Conference on Security Technology, 40th Annual Conference, October 17 - 19, Lexington, Kentucky, IEEE 2006 |
[16] | Thalheim L., Krissler J., Ziegler P.-M. "Body Check Biometric Access Protection Devices and their Programs Put to the Test", http://www.cse.chalmers.se/edu/course/EDA263/oh10/L03_DL2_Biometric%20access%20protection%20devices.pdf |
[17] | Fingerprint Spoof Detection Protection Profile (FSDPP) v1.8 |
[18] | Fingerprint Spoof Detection Evaluation Guidance, Version 2.1, 2009-12-18 |
[19] | Stein C., Bouatou V., Busch C. "Video-based Fingerphoto Recognition with Anti-spoofing Techniques with Smartphone Cameras", in Proceedings of the IEEE 12th International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, September 5 - 6, (2013), available online at http://www.christoph-busch.de/files/Stein-VideoFingerphoto-BIOSIG-2013.pdf |
УДК 004.93'1:006.89:006.354 | ОКС 35.240.15 |
Ключевые слова: информационные технологии, атака на биометрическое предъявление, инструмент атаки на биометрическое предъявление, испытания биометрической системы, протоколы испытаний |