Residential College | false |
Status | 已發表Published |
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks | |
Yu Shilian1,2; Ai Ye1,2; Xu Bo1,2; Zhou Yicong3; Li Weifeng1,2; Liao Qingmin1,2; Poh Norman4 | |
2016-07-20 | |
Source Publication | Information Sciences |
ISSN | 00200255 |
Volume | 352-353Pages:188-202 |
Abstract | A conventional biometric authentication system is often designed to distinguish genuine accesses from zero-effort impostor attacks. However, when operating in an adversarial environment, the system has to be robust against presentation attacks such as spoofing. An effective solution to reduce the impact of spoofing attack is to consider both the matching score and liveness score when making the accept/reject decision. In this paper, we consider the joint decision space of matching and liveness scores in the presence of both spoofing attack and zero-effort attack, with application to signature verification. Our investigation aims to understand how decision thresholds in the above space should be optimized. This leads to two dichotomies of methods, namely brute-force approach versus probabilistic approach; and single threshold versus double-threshold approach. This view leads to three novel methods that have never been reported. Based on the experimental results carried out on an off-line signature database, the novel methods turn out to outperform simpler methods with only matching score. |
Keyword | Biometric Authentication Brute-force Liveness Score Probabilistic Spoofing Attack |
DOI | 10.1016/j.ins.2016.03.005 |
URL | View the original |
Indexed By | SCIE |
Language | 英語English |
WOS Research Area | Computer Science |
WOS Subject | Computer Science, Information Systems |
WOS ID | WOS:000375632000012 |
Scopus ID | 2-s2.0-84962878131 |
Fulltext Access | |
Citation statistics | |
Document Type | Journal article |
Collection | DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE Faculty of Science and Technology |
Affiliation | 1.Department of Electronic Engineering/Graduate School at Shenzhen, Tsinghua University, China 2.Shenzhen Key Laboratory of Information Science and Technology, Shenzhen, China 3.Department of Computer and Information Science, University of Macau, Macau, China 4.Department of Computer Science, University of Surrey, Guildford, Surrey, United Kingdom |
Recommended Citation GB/T 7714 | Yu Shilian,Ai Ye,Xu Bo,et al. Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks[J]. Information Sciences, 2016, 352-353, 188-202. |
APA | Yu Shilian., Ai Ye., Xu Bo., Zhou Yicong., Li Weifeng., Liao Qingmin., & Poh Norman (2016). Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks. Information Sciences, 352-353, 188-202. |
MLA | Yu Shilian,et al."Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks".Information Sciences 352-353(2016):188-202. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment