Skip to main content

Related Standards

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Part of the book series: Advances in Computer Vision and Pattern Recognition ((ACVPR))

  • 2052 Accesses

Abstract

This chapter reports about the relevant international standardization activities in the field of biometrics and describes a harmonized taxonomy for terms in the field of liveness detection. The scope and progress of the presentation attack detection standard ISO/IEC 30107 is discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. International Civil Aviation Organization (2004) TAG 15 MRTD/NTWG: biometrics deployment of machine readable travel documents. Version 2.0

    Google Scholar 

  2. International Civil Aviation Organization (2011) NTWG: supplement to Doc9303-version 11. http://www2.icao.int/en/MRTD/Downloads/Supplements

  3. ISO/IEC (2011) JTC1 SC37 biometrics: ISO/IEC 19794–1:2011 information technology—biometric data interchange formats—part 1: framework. International Organization for Standardization

    Google Scholar 

  4. ISO/IEC (2004) TC JTC1 SC 29 coding of audio, picture, multimedia and hypermedia information: ISO/IEC 15444–1:2004—ITU-T Rec. T.800. Information technology—JPEG2000 image coding system: core coding system. International Organization for Standardization

    Google Scholar 

  5. Bradley J, Brislawn C (1994) The wavelet/scalar quantization compression standard for digital fingerprint images. In: Circuits and systems, 1994. ISCAS ’94, 1994 IEEE international symposium on, vol 3, pp 205–208. doi:10.1109/ISCAS.1994.409142

  6. ISO/IEC (2011) JTC1 SC37 biometrics: ISO/IEC 19794–4:2011 information technology—biometric data interchange formats—part 4: finger image data. International Organization for Standardization

    Google Scholar 

  7. ISO/IEC (2011) JTC1 SC37 biometrics: ISO/IEC 19794–5:2011. Information technology—biometric data interchange formats—part 5: face image data. International Organization for Standardization

    Google Scholar 

  8. ISO/IEC (2012) JTC1 SC37 biometrics: ISO/IEC 2382–37 harmonized biometric vocabulary. International Organization for Standardization

    Google Scholar 

  9. ISO/IEC (2012) JTC1 SC37 biometrics: ISO/IEC 2382–37 harmonized biometric vocabulary. http://www.christoph-busch.de/standards.html

  10. ISO/IEC (2008) JTC1 SC37 biometrics: ISO/IEC SC37 SD11 general biometric system. International Organization for Standardization

    Google Scholar 

  11. ISO/IEC (2006) TC JTC1 SC37 biometrics: ISO/IEC 19784–1:2006. Information technology—biometric application programming interface—part 1: BioAPI specification. International Organization for Standardization

    Google Scholar 

  12. Zwiesele A, Munde A, Busch C, Daum H (2000) Biois study—comparative study of biometric identification systems. In: 34th annual 2000 IEEE international carnahan conference on security technology (CCST), IEEE Computer Society, pp 60–63

    Google Scholar 

  13. Matsumoto T, Matsumoto H, Yamada K, Yoshino S (2002) Impact of artificial "Gummy" fingers on fingerprint systems. SPIE conference on optical security and counterfeit deterrence techniques IV 4677:275–289

    Google Scholar 

  14. Schuckers SAC (2002) Spoofing and anti-spoofing measures. Inf secur tech rep 7:56–62

    Article  Google Scholar 

  15. ISO/IEC (2013) JTC1 SC37 biometrics: 5th WD ISO/IEC 30107. Information technology—biometrics—presentation attack detection. International Organization for Standardization

    Google Scholar 

  16. Cummins H (1935) Attempts to alter and obliterate finger-prints. J Crim Law Criminol 25:982–991

    Google Scholar 

  17. ISO/IEC (2009) JTC1 SC37 biometrics: ISO/IEC 29794–1:2009 information technology—biometric sample quality—part 1: framework. International Organization for Standardization

    Google Scholar 

  18. ISO/IEC (2006) TC JTC1 SC37 biometrics: ISO/IEC 19795–1:2006. Information technology—biometric performance testing and reporting—part 1: principles and framework. International Organization for Standardization and International Electrotechnical Committee

    Google Scholar 

  19. Mansfield T, Wayman J (2002) Best practices in testing and reporting performance of biometric devices. CMSC 14/02 Version 2.01, NPL

    Google Scholar 

  20. Criteria C (2012) Common methodology for information technology security evaluation—evaluation methodology. http://www.commoncriteriaportal.org/cc/

Download references

Acknowledgments

The author would like to thank Elaine Newton for all the hard work of being editor of ISO/IEC 30107 and also all SC37 WG3 experts for their valuable contributions to this standard.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christoph Busch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Busch, C. (2014). Related Standards. In: Marcel, S., Nixon, M., Li, S. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, London. https://doi.org/10.1007/978-1-4471-6524-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6524-8_11

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6523-1

  • Online ISBN: 978-1-4471-6524-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics