dc.contributor.author | Gómez-Barrero, Marta | |
dc.contributor.author | Galbally Herrero, Javier | |
dc.contributor.author | Fiérrez Aguilar, Julián | |
dc.contributor.author | Ortega García, Javier | |
dc.contributor.other | UAM. Departamento de Tecnología Electrónica y de las Comunicaciones | es_ES |
dc.date.accessioned | 2015-03-03T16:10:15Z | |
dc.date.available | 2015-03-03T16:10:15Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Biometrics and ID Management: COST 2101 European Workshop, BioID 2011, Brandenburg (Germany), March 8-10, 2011. Proceedings. Lecture Notes in Computer Science, Volumen 6583. Springer, 2011. 83-94 | en_US |
dc.identifier.isbn | 978-3-642-19529-7 (print) | en_US |
dc.identifier.isbn | 978-3-642-19530-3 (online) | en_US |
dc.identifier.issn | 1611-3349 (online) | en_US |
dc.identifier.issn | 0302-9743 (print) | en_US |
dc.identifier.uri | http://hdl.handle.net/10486/664224 | |
dc.description | The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-19530-3_8 | en_US |
dc.description | Proceedings of COST 2101 European Workshop (BioID) held in Brandenburg (Germany) on 2011 | en_US |
dc.description.abstract | A general hill-climbing attack to biometric systems based on a modification of the downhill simplex algorithm is presented. The scores provided by the matcher are used in this approach to adapt iteratively an initial estimate of the attacked template to the specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system over both the MCYT and the BiosecurID databases (comprising 330 and 400 users, respectively). The results show a very high efficiency of the hill-climbing algorithm, which successfully bypassed the system for over 90% of the attacks with a remarkably low number of scores needed. | en_US |
dc.description.sponsorship | This work has been partially supported by projects Contexts (S2009/TIC-1485) from CAM, Bio-Challenge (TEC2009-11186) from Spanish MICINN, TABULA RASA (FP7-ICT-257289) from EU, and Cátedra UAM-Telefónica. | en_US |
dc.format.extent | 12 pág. | es_ES |
dc.format.mimetype | application/pdf | en |
dc.language.iso | eng | en |
dc.publisher | Springer Berlin Heidelberg | |
dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
dc.rights | © Springer-Verlag Berlin Heidelberg 2011 | |
dc.subject.other | Biometrics | en_US |
dc.subject.other | Pattern Recognition | en_US |
dc.subject.other | Computer Imaging, Vision, Pattern Recognition and Graphics | en_US |
dc.subject.other | Information Storage and Retrieval | en_US |
dc.subject.other | Artificial Intelligence | en_US |
dc.subject.other | Computer Vision | en_US |
dc.subject.other | Image Processing | en_US |
dc.title | Hill-climbing attack based on the uphill simplex algorithm and its application to signature verification | en_US |
dc.type | conferenceObject | en |
dc.type | bookPart | en |
dc.subject.eciencia | Telecomunicaciones | es_ES |
dc.relation.publisherversion | http://dx.doi.org/10.1007/978-3-642-19530-3_8 | |
dc.identifier.doi | 10.1007/978-3-642-19530-3_8 | |
dc.identifier.publicationfirstpage | 83 | |
dc.identifier.publicationlastpage | 94 | |
dc.identifier.publicationvolume | 6583 | |
dc.relation.eventdate | March 8-10, 2011 | en_US |
dc.relation.eventnumber | 3 | |
dc.relation.eventplace | Brandenburg (Germany) | en_US |
dc.relation.eventtitle | COST 2101 Third European Workshop on Biometrics and Identity Management, BioID 2011 | en_US |
dc.relation.projectID | Comunidad de Madrid. S2009/TIC-1485/CONTEXTS | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/EC/FP7/257289 | en |
dc.type.version | info:eu-repo/semantics/acceptedVersion | en |
dc.contributor.group | Análisis y Tratamiento de Voz y Señales Biométricas (ING EPS-002) | es_ES |
dc.rights.accessRights | openAccess | en |
dc.authorUAM | Fierrez Aguilar, Julián (261834) | |
dc.authorUAM | Galbally Herrero, Javier (261846) | |
dc.facultadUAM | Escuela Politécnica Superior | |