Spoofing Attacks: Attacks on Biometric Systems - Where does Research Stand?
Modern biometric systems are vulnerable to so-called spoofing attacks, in which an attacker attempts to impersonate a biometric system. Common attacks are presentation attacks, in which biometric characteristics of another person are presented to the system, or morphine attacks, in which the identities of several persons are mixed in order to circumvent the biometric recognition system. In the lecture, the current attacks will be presented in more detail and the current state of research will be presented and discussed.
Note: If you continue, the contact data you provided during registration may be transmitted to the respective provider in accordance with our General Terms and Conditions.
Please log in or register in advance so that you can take part in actions or watch the action videos!
This action has already taken place. This action will soon be available as a video.
This action has already taken place. Please scroll down to watch the video.
This action has already taken place. Please login or register to watch the video.
This action has already taken place. It's not available any more.
You are in!
Your ticket / access to the action was sent to you by email.
Marco Huber, M. Sc.: Research assistant at Fraunhofer IGD within the framework of ATHENE, the National Research Center for Applied Cybersecurity and PhD student at the Technical University of Darmstadt... read more