We use cookies to give you the best experience and to help improve our website
Find out what cookies we use and how to disable themThis standard establishes methodologies to evaluate the resistance of biometric recognition systems to morphing attacks, including multiple identity attacks. The standard is limited to image-based morphing attacks.
Note 1: Image-based includes modalities such as face and finger image data.
Note 2: The evaluation of the resistance of a biometric recognition system is not a security evaluation.
The standard establishes:
— Taxonomy of biometric sample modifications and manipulation with a specific focus on manipulations that constitute a multiple identity attack. This can be for instance an enrolment attack with face image morphing.
— Methodology to measure the morphing attack potential of a morphing method.
The standard includes informative content on how morphing algorithms can be used for system evaluation.
Required form fields are indicated by an asterisk (*) character.
You are now following this standard. Weekly digest emails will be sent to update you on the following activities:
You can manage your follow preferences from your Account. Please check your mailbox junk folder if you don't receive the weekly email.
You have successfully unsubscribed from weekly updates for this standard.
Comment by: