Residential Collegefalse
Status已發表Published
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks
Yu Shilian1,2; Ai Ye1,2; Xu Bo1,2; Zhou Yicong3; Li Weifeng1,2; Liao Qingmin1,2; Poh Norman4
2016-07-20
Source PublicationInformation Sciences
ISSN00200255
Volume352-353Pages:188-202
Abstract

A conventional biometric authentication system is often designed to distinguish genuine accesses from zero-effort impostor attacks. However, when operating in an adversarial environment, the system has to be robust against presentation attacks such as spoofing. An effective solution to reduce the impact of spoofing attack is to consider both the matching score and liveness score when making the accept/reject decision. In this paper, we consider the joint decision space of matching and liveness scores in the presence of both spoofing attack and zero-effort attack, with application to signature verification. Our investigation aims to understand how decision thresholds in the above space should be optimized. This leads to two dichotomies of methods, namely brute-force approach versus probabilistic approach; and single threshold versus double-threshold approach. This view leads to three novel methods that have never been reported. Based on the experimental results carried out on an off-line signature database, the novel methods turn out to outperform simpler methods with only matching score.

KeywordBiometric Authentication Brute-force Liveness Score Probabilistic Spoofing Attack
DOI10.1016/j.ins.2016.03.005
URLView the original
Indexed BySCIE
Language英語English
WOS Research AreaComputer Science
WOS SubjectComputer Science, Information Systems
WOS IDWOS:000375632000012
Scopus ID2-s2.0-84962878131
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
Faculty of Science and Technology
Affiliation1.Department of Electronic Engineering/Graduate School at Shenzhen, Tsinghua University, China
2.Shenzhen Key Laboratory of Information Science and Technology, Shenzhen, China
3.Department of Computer and Information Science, University of Macau, Macau, China
4.Department of Computer Science, University of Surrey, Guildford, Surrey, United Kingdom
Recommended Citation
GB/T 7714
Yu Shilian,Ai Ye,Xu Bo,et al. Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks[J]. Information Sciences, 2016, 352-353, 188-202.
APA Yu Shilian., Ai Ye., Xu Bo., Zhou Yicong., Li Weifeng., Liao Qingmin., & Poh Norman (2016). Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks. Information Sciences, 352-353, 188-202.
MLA Yu Shilian,et al."Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks".Information Sciences 352-353(2016):188-202.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Yu Shilian]'s Articles
[Ai Ye]'s Articles
[Xu Bo]'s Articles
Baidu academic
Similar articles in Baidu academic
[Yu Shilian]'s Articles
[Ai Ye]'s Articles
[Xu Bo]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Yu Shilian]'s Articles
[Ai Ye]'s Articles
[Xu Bo]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.