• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ISO/IEC 30107-1:2016

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

Information technology — Biometric presentation attack detection — Part 1: Framework
Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Superseded date

10-08-2023

Language(s)

English

Published date

14-01-2016

Abstract:

In recent years, there has been an increase in the availability and interest in using biometric sensors for authenticating users, but the potential for attacks on a system through the biometric sensor has limited the use of biometrics in applications which are unsupervised by an agent of the system owner, such as remote authentication over untrusted networks. Biometric data can be easily obtained directly from a person, online, or through existing databases and then used to create spoofs (or fakes) to mount an attack. The presentation of a biometric spoof (e.g. a facial image or video of a person on a tablet or a fake silicone or gelatin fingerprint) to a biometric sensor can be detected by methods broadly referred to as presentation attack detection, PAD.

The purpose of ISO/IEC 30107-1 is to provide a foundation for PAD through defining terms and establishing a framework through which presentation attack events can be specified and detected so that they can be categorized, detailed and communicated for subsequent decision making and performance assessment activities. This foundation is intended to not only introduce and frame the topics of presentation attacks and PAD but also to benefit other standards projects. This standard does not advocate a specific standard PAD method. The scope is limited to describing attacks that take place at the sensor during the presentation and collection of biometric characteristics.

There are two other parts of ISO/IEC 30107, under the general title Information Technology - Biometric presentation attack detection:

- Part 2:Data Formats

- Part 3: Testing and reporting.

Keywords:

Liveness, liveness detection, biometric liveness detection, spoof detection, biometric spoof, biometric spoof detection, fake, fake biometric, fake biometrics, arefact, artefact detection.

.

Committee
ISO/IEC JTC 1/SC 37
DocumentType
Standard
Pages
11
PublisherName
International Organization for Standardization
Status
Superseded
SupersededBy

Standards Relationship
DS ISO/IEC 30107-1 : 2016 Identical
NEN ISO/IEC 30107-1 : 2016 Identical
BS ISO/IEC 30107-1:2016 Identical
CAN/CSA-ISO/IEC 30107-1:18 Identical

BS ISO/IEC 30107-3:2017 Information technology. Biometric presentation attack detection Testing and reporting
16/30329605 DC : 0 BS ISO/IEC 30107-3 - INFORMATION TECHNOLOGY - BIOMETRIC PRESENTATION ATTACK DETECTION - PART 3: TESTING AND REPORTING
16/30321954 DC : 0 BS ISO/IEC 30107-2 - INFORMATION TECHNOLOGY - BIOMETRICS - PRESENTATION ATTACK DETECTION - PART 2: DATA FORMATS
ISO/IEC 30107-3:2017 Information technology — Biometric presentation attack detection — Part 3: Testing and reporting
ISO/IEC 30107-2:2017 Information technology — Biometric presentation attack detection — Part 2: Data formats
ISO/IEC TR 24741:2018 Information technology Biometrics Overview and application

ISO/IEC 2382-37:2017 Information technology Vocabulary Part 37: Biometrics

View more information
£58.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.