• CAN/CSA-ISO/IEC 30107-1:18

    Current The latest, up-to-date edition.

    Information technology — Biometric presentation attack detection — Part 1: Framework (Adopted ISO/IEC 30107-1:2016, first edition, 2016-01-15)

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-2018

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
    5 Characterisation of presentation attacks
    6 Framework for presentation attack detection methods
    7 Obstacles to biometric imposter presentation attacks
      in a biometric system
    Bibliography

    Abstract - (Show below) - (Hide below)

    Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). Scope This part of ISO/IEC 30107 establishes terms and definitions that are useful in the specification, characterization and evaluation of presentation attack detection methods. Outside the scope are standardization of specific PAD detection methods; detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms, or sensors; and overall system-level security or vulnerability assessment. The attacks to be considered in ISO/IEC 30107 are those that take place at the sensor during the presentation and collection of the biometric characteristics. Any other attacks are considered outside the scope of ISO/IEC 30107.

    Scope - (Show below) - (Hide below)

    Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T). Scope This part of ISO/IEC 30107 establishes terms and definitions that are useful in the specification, characterization and evaluation of presentation attack detection methods. Outside the scope are standardization of specific PAD detection methods; detailed information about countermeasures (i.e. anti-spoofing techniques), algorithms, or sensors; and overall system-level security or vulnerability assessment. The attacks to be considered in ISO/IEC 30107 are those that take place at the sensor during the presentation and collection of the biometric characteristics. Any other attacks are considered outside the scope of ISO/IEC 30107.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Canadian Standards Association
    Status Current
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective