Evaluation Methodologies for Biometric Presentation Attack Detection

Presentation attack detection (PAD, also known as anti-spoofing) systems, regardless of the technique, biometric mode or degree of independence of external equipment, are most commonly treated as binary classification systems. The two classes that they differentiate are bona-fide and presentation attack samples. From this perspective, their evaluation is equivalent to the established evaluation standards for the binary classification systems. However, PAD systems are designed to operate in conjunction with recognition systems and as such can affect their performance. From the point of view of a recognition system, the presentation attacks are a separate class that they need to be detected and rejected. As the problem of presentation attack detection grows to this pseudo-ternary status, the evaluation methodologies for the recognition systems need to be revised and updated. Consequentially, the database requirements for presentation attack databases become more specific. The focus of this chapter is the task of biometric verification and its scope is three-fold: firstly, it gives the definition of the presentation attack detection problem from the two perspectives. Secondly, it states the database requirements for a fair and unbiased evaluation. Finally, it gives an overview of the existing evaluation techniques for presentation attacks detection systems and verification systems under presentation attacks.


Editor(s):
Marcel, Sébastien
Nixon, Mark
Fierrez, Julian
Evans, Nicholas
Published in:
Handbook of Biometric Anti-Spoofing, 457-480
Year:
2019
Publisher:
Springer International Publishing
ISBN:
978-3-319-92627-8
Laboratories:




 Record created 2018-12-28, last modified 2019-05-07

External links:
Download fulltextRelated documents
Download fulltextURL
Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)