Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Characterisation of presentation attacks
6 Framework for presentation attack detection methods
7 Obstacles to biometric imposter presentation
attacks in a biometric system
Bibliography