ISO/IEC 30107-1:2023

ISO/IEC 30107-1:2023

August 2023
International standard Current

Information technology - Biometric presentation attack detection - Part 1: Framework

This document establishes terms and definitions that are useful in the specification, characterization and evaluation of presentation attack detection (PAD) methods.This document does not provide the following:—     standardization of specific PAD detection methods;—     detailed information about countermeasures (i.e. anti-spoofing mechanisms), algorithms or sensors;—     overall system-level security or vulnerability assessment.The attacks to be considered in this document are those that take place at the capture device during the presentation and collection of the biometric characteristics. Any other attacks are considered outside the scope of this document.

View the extract
Main informations

Collections

International ISO standards
International IEC standards

Publication date

August 2023

Number of pages

11 p.

Reference

ISO/IEC 30107-1:2023

ICS Codes

35.240.15   Identification cards. Chip cards. Biometrics

Print number

1
Sumary
Information technology - Biometric presentation attack detection - Part 1: Framework

This document establishes terms and definitions that are useful in the specification, characterization and evaluation of presentation attack detection (PAD) methods.

This document does not provide the following:

     standardization of specific PAD detection methods;

     detailed information about countermeasures (i.e. anti-spoofing mechanisms), algorithms or sensors;

     overall system-level security or vulnerability assessment.

The attacks to be considered in this document are those that take place at the capture device during the presentation and collection of the biometric characteristics. Any other attacks are considered outside the scope of this document.

Replaced standards (1)
ISO/IEC 30107-1:2016
January 2016
International standard Cancelled
Information technology - Biometric presentation attack detection - Part 1 : framework

Abstract: In recent years, there has been an increase in the availability and interest in using biometric sensors for authenticating users, but the potential for attacks on a system through the biometric sensor has limited the use of biometrics in applications which are unsupervised by an agent of the system owner, such as remote authentication over untrusted networks. Biometric data can be easily obtained directly from a person, online, or through existing databases and then used to create spoofs (or fakes) to mount an attack. The presentation of a biometric spoof (e.g. a facial image or video of a person on a tablet or a fake silicone or gelatin fingerprint) to a biometric sensor can be detected by methods broadly referred to as presentation attack detection, PAD. The purpose of ISO/IEC 30107-1 is to provide a foundation for PAD through defining terms and establishing a framework through which presentation attack events can be specified and detected so that they can be categorized, detailed and communicated for subsequent decision making and performance assessment activities. This foundation is intended to not only introduce and frame the topics of presentation attacks and PAD but also to benefit other standards projects. This standard does not advocate a specific standard PAD method. The scope is limited to describing attacks that take place at the sensor during the presentation and collection of biometric characteristics. There are two other parts of ISO/IEC 30107, under the general title Information Technology - Biometric presentation attack detection: - Part 2:Data Formats - Part 3: Testing and reporting. Keywords: Liveness, liveness detection, biometric liveness detection, spoof detection, biometric spoof, biometric spoof detection, fake, fake biometric, fake biometrics, arefact, artefact detection. .

ZOOM ON ... the Requirements department
To comply with a standard, you need to quickly understand its issues in order to determine its impact on your activity.

The Requirements department helps you quickly locate within the normative text:
- mandatory clauses to satisfy,
- non-essential but useful clauses to know, such as permissions and recommendations.

The identification of these types of clauses is based on the document “ISO / IEC Directives, Part 2 - Principles and rules of structure and drafting of ISO documents ”as well as on a constantly enriched list of verbal forms.

With Requirements, quickly access the main part of the normative text!

With Requirements, quickly access the main part of the normative text!
Need to identify, monitor and decipher standards?

COBAZ is the simple and effective solution to meet the normative needs related to your activity, in France and abroad.

Available by subscription, CObaz is THE modular solution to compose according to your needs today and tomorrow. Quickly discover CObaz!

Request your free, no-obligation live demo

I discover COBAZ