Your browser does not support JavaScript!

Measuring and mitigating targeted biometric impersonation

Measuring and mitigating targeted biometric impersonation

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This study is concerned with the reliability of biometric verification systems when used in forensic applications. In particular, when such systems are subjected to targeted impersonation attacks. The authors expand on the existing work in targeted impersonation, focusing on how best to measure the reliability of verification systems in forensic contexts. It identifies two scenarios in which targeted impersonation effects may occur: (i) the forensic investigation of criminal activity involving identity theft; and (ii) implicit targeting as a result of the forensic investigation process. Also, the first partial countermeasure to such attacks is presented. The countermeasure uses client-specific Z-score normalisation to provide a more consistent false acceptance rate across all enrolled subjects. This reduces the effectiveness of targeted impersonation without impairing the systems accuracy under random zero-effort attacks.


    1. 1)
      • 21. Anjos, A., Marcel, S.: ‘Scoretoolkit documentation’. IDIAP Technical Report, 2012.
    2. 2)
      • 14. Houck, M.M.: ‘CSI the reality’ (Scientific American, 2006).
    3. 3)
      • 16. Phillips, P., Beveridge, J., Draper, B., et al: ‘An introduction to the good, the bad & the ugly face recognition challenge problem’. Int. Conf. Face Gesture, 2011, pp. 346353.
    4. 4)
      • 12. Martin, A., Przybocki, M., Doddington, G., Liggett, W., Reynolds, D.: ‘Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation’. Int. Conf. Spoken Language Processing, 1998.
    5. 5)
      • 4. Bustard, J.D., Carter, J.N., Nixon, M.S.: ‘Targeted biometric impersonation’, Int. Work. Biometrics Forensics, 2013, 1, pp. 14.
    6. 6)
      • 5. Hadid, A., Ghahramani, M., Kellokumpu, V., Pietikainen, M., Bustard, J., Nixon, M.: ‘Can gait biometrics be spoofed?’. Int. Conf. Pattern Recognition, 2012, pp. 32803283.
    7. 7)
    8. 8)
      • 15. Phillips, P.J., Beveridge, J.R., Draper, B.A., et al: ‘An introduction to the good, the bad, & the ugly face recognition challenge problem’. 2011 IEEE Int. Conf. Automatic Face Gesture Recognition and Workshops (FG 2011), 2011, pp. 346353.
    9. 9)
      • 20. Plenty of fish dating website’,
    10. 10)
      • 21. Anjos, A., Marcel, S.: ‘Scoretoolkit documentation’. IDIAP Technical Report, 2012.
    11. 11)
      • 3. Morphotrust investigative solutions’,
    12. 12)
    13. 13)
      • 11. Matsumoto, H., Matsumoto, T., Yamada, K., Hoshino, S.: ‘Impact of artificial gummy fingers on fingerprint systems’. SPIE Optical Security and Counterfeit Deterrence Techniques IV, 2002, vol. 4677, pp. 275289.
    14. 14)
    15. 15)
      • 7. Jain, A.K., Li, S.Z.: ‘Handbook of face recognition’ (Springer, Secaucus, NJ, USA, 2005).
    16. 16)
      • 18. Klum, S., Jain, A., Burge, M., Klontz, J., Klare, B.: ‘Open source biometric recognition’. Int. Conf. Biometrics: Theory, Applications and Systems, 2013.
    17. 17)
    18. 18)
      • 17. Beveridge, J.R., Scruggs, W.T., OToole, A.J., et al: ‘Overview of the multiple biometrics grand challenge’. Int. Conf. Advances in Biometrics, 2009, pp. 705714.
    19. 19)
      • 1. Jain, A.K., Flynn, P., Ross, A.A.: ‘Handbook of biometrics’ (Springer, Secaucus, NJ, USA, 2007).
    20. 20)
      • 13. BBC news: Interpol puts Dubai killing suspects on wanted list’,
    21. 21)
      • 2. Nickell, J., Fischer, J.F.: ‘Crime science: methods of forensic detection’ (University Press of Kentucky, 1999).
    22. 22)
      • 19. Moon, H., Phillips, P.: ‘The FERET verification testing protocol for face recognition algorithms’. Int. Conf. Automatic Face and Gesture Recognition, 1998, pp. 4853.

Related content

This is a required field
Please enter a valid email address