ISO/IEC JTC 1/SC 37
| Projekta Nr. | ISO/IEC 20059:2025 |
|---|---|
| Nosaukums | <p class="MsoBodyText"><span lang="EN-GB">This document establishes a methodology to evaluate the resistance of BSs to morphing attacks, including multiple identity attacks. The document is limited to image-based morphing attacks. The term "image-based" includes modalities such as face, iris and finger image data.</span></p> <p class="MsoBodyText"><span lang="EN-GB">The document establishes:</span></p> <p class="ListContinue1" style="mso-list: l0 level1 lfo1;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">—<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">a definition of biometric sample modifications and manipulation with a specific focus on manipulations that constitute a multiple identity attack. This can be, for instance, an enrolment attack with face image morphing;</span></p> <p class="ListContinue1" style="mso-list: l0 level1 lfo1;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">—<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">a methodology to measure the morphing attack potential of a morphing method.</span></p> <p class="MsoBodyText"><span lang="EN-GB">The document also describes how morphing algorithms can be used for system evaluation.</span></p> |
| Reģistrācijas numurs (WIID) | 86084 |
| Darbības sfēra | <p class="MsoBodyText"><span lang="EN-GB">This document establishes a methodology to evaluate the resistance of BSs to morphing attacks, including multiple identity attacks. The document is limited to image-based morphing attacks. The term "image-based" includes modalities such as face, iris and finger image data.</span></p> <p class="MsoBodyText"><span lang="EN-GB">The document establishes:</span></p> <p class="ListContinue1" style="mso-list: l0 level1 lfo1;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">—<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">a definition of biometric sample modifications and manipulation with a specific focus on manipulations that constitute a multiple identity attack. This can be, for instance, an enrolment attack with face image morphing;</span></p> <p class="ListContinue1" style="mso-list: l0 level1 lfo1;"><!-- [if !supportLists]--><span lang="EN-GB" style="mso-fareast-font-family: Cambria; mso-bidi-font-family: Cambria;"><span style="mso-list: Ignore;">—<span style="font: 7.0pt 'Times New Roman';"> </span></span></span><!--[endif]--><span lang="EN-GB">a methodology to measure the morphing attack potential of a morphing method.</span></p> <p class="MsoBodyText"><span lang="EN-GB">The document also describes how morphing algorithms can be used for system evaluation.</span></p> |
| Statuss | Standarts spēkā |
| ICS grupa | 35.030 35.240.15 |
