Biometric Presentation Attack Detection in Mobile Devices

A special issue of Digital (ISSN 2673-6470).

Deadline for manuscript submissions: closed (1 May 2021) | Viewed by 1031

Special Issue Editors


E-Mail Website
Guest Editor
Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA
Interests: pattern recognition; machine learning; image processing; computer vision; biometrics

E-Mail Website
Guest Editor
Associate Professor, Department of Electrical and Electronic Engineering, University of Cagliari, Cagliari, Italy
Interests: pattern recognition; computer vision; biometrics; digital forensics
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, Sapienza University, Rome, Italy
Interests: image processing; biometric systems; Human-Computer Interaction

Special Issue Information

Dear Colleague,

Biometric authentication mechanisms in mobile phone applications come with vulnerabilities to presentation attacks (PAs), challenging the effectiveness of this technology. PAs refer to techniques that inhibit the intended operation of a biometric capture system, interfering with the acquisition of the true identity. An impersonation attack can occur when a malicious individual tries to unlock the phone of someone else, for example, by presenting a printed facial image of the genuine user or a photo of his/her finger displayed using an iPad. Biometric spoofs can be detected through accurate and robust presentation attack detection (PAD) algorithms. PAD modules classify biometric samples as either live (non-spoof) or fake (spoof). The specificity of the sensor in determining a live biometric—as opposed to a recording, picture, or another non-living spoof—is commonly known as liveness detection. The latest development is therefore a subset of the potential attacks that might be detected through PAD. Despite the significant attention given to the problem of face spoofing and fingerprint recognition, PAD systems still produce poor results, through either false alarms or poor usability, lacking generalized presentation attack detection (PAD) methods performing robustly in a practical environment.

Dr. Emanuela Marasco
Dr. Gian Luca Marcialis
Dr. Maria De Marsico
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Digital is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Biometrics
  • Spoofing
  • Impersonation
  • Mobile phones
  • Security
  • Presentation attacks
  • Presentation attack detection algorithms

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop