BSI PD CEN/TS 17262:2018
$142.49
Personal identification. Robustness against biometric presentation attacks. Application to European Automated Border Control
Published By | Publication Date | Number of Pages |
BSI | 2018 | 26 |
This document is an application profile for the International Standard ISO/IEC 30107. It provides requirements and recommendations for the implementation of Automated Border Control (ABC) systems in Europe with Presentation Attack Detection (PAD) capability. This document covers the evaluation of countermeasures from the Biometrics perspective as well as privacy, data protection and usability aspects. Technical descriptions of countermeasures are out of scope. Enrolment, issuance and verification applications of electronic Machine Readable Travel Documents (eMRTD) other than border control are not in scope. In particular, presentation attacks at enrolment are out of scope. The biometric reference data can be stored in an eMRTD and/or in a database of registered travellers. This document covers: – biometric impostor attacks and – biometric concealer attacks in a watchlist scenario. This document addresses PAD for facial and fingerprint biometrics only.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
5 | European foreword |
6 | Introduction |
7 | 1 Scope 2 Normative references 3 Terms and definitions |
8 | 4 Abbreviated terms |
9 | 5 Presentation attack detection overview in ABC system 5.1 Obstacles to presentation attacks in ABC system 5.2 Impostor attacks 5.2.1 General 5.2.2 Verification of an eMRTD credential 5.2.3 Identification in a Registered Traveller Programme use case 5.2.4 Concealer attacks |
10 | 5.3 Level of attack potential to consider 6 Minimal accuracy requirements guideline for ABC systems |
11 | 7 PAD evaluation in ABC systems 7.1 Overview 7.2 Artefacts Properties 7.2.1 Overview 7.2.2 Artefacts for facial biometrics |
12 | 7.2.3 Artefacts for fingerprint biometrics |
13 | 7.3 Artefact creation and usage |
14 | 7.4 Metrics for the evaluation of ABC systems 7.4.1 General metrics 7.4.2 Metrics for an impostor attack scenario with eMRTD credentials 7.4.3 Metrics for an impostor attack scenario in Registered Traveller Programme |
15 | 7.4.4 Metrics for concealer attack scenario 7.4.5 Considerations on statistical relevance 8 Logging, data protection and privacy |
16 | 9 Usability and the environment |
17 | Annex A (informative) Examples of attack potential ratings |
24 | Bibliography |