Show simple item record

dc.contributor.authorGómez-Barrero, Marta
dc.contributor.authorGalbally Herrero, Javier
dc.contributor.authorFiérrez Aguilar, Julián 
dc.contributor.authorOrtega García, Javier 
dc.contributor.otherUAM. Departamento de Tecnología Electrónica y de las Comunicacioneses_ES
dc.date.accessioned2015-03-03T16:10:15Z
dc.date.available2015-03-03T16:10:15Z
dc.date.issued2011
dc.identifier.citationBiometrics and ID Management: COST 2101 European Workshop, BioID 2011, Brandenburg (Germany), March 8-10, 2011. Proceedings. Lecture Notes in Computer Science, Volumen 6583. Springer, 2011. 83-94en_US
dc.identifier.isbn978-3-642-19529-7 (print)en_US
dc.identifier.isbn978-3-642-19530-3 (online)en_US
dc.identifier.issn1611-3349 (online)en_US
dc.identifier.issn0302-9743 (print)en_US
dc.identifier.urihttp://hdl.handle.net/10486/664224
dc.descriptionThe final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-19530-3_8en_US
dc.descriptionProceedings of COST 2101 European Workshop (BioID) held in Brandenburg (Germany) on 2011en_US
dc.description.abstractA general hill-climbing attack to biometric systems based on a modification of the downhill simplex algorithm is presented. The scores provided by the matcher are used in this approach to adapt iteratively an initial estimate of the attacked template to the specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system over both the MCYT and the BiosecurID databases (comprising 330 and 400 users, respectively). The results show a very high efficiency of the hill-climbing algorithm, which successfully bypassed the system for over 90% of the attacks with a remarkably low number of scores needed.en_US
dc.description.sponsorshipThis work has been partially supported by projects Contexts (S2009/TIC-1485) from CAM, Bio-Challenge (TEC2009-11186) from Spanish MICINN, TABULA RASA (FP7-ICT-257289) from EU, and Cátedra UAM-Telefónica.en_US
dc.format.extent12 pág.es_ES
dc.format.mimetypeapplication/pdfen
dc.language.isoengen
dc.publisherSpringer Berlin Heidelberg
dc.relation.ispartofLecture Notes in Computer Scienceen_US
dc.rights© Springer-Verlag Berlin Heidelberg 2011
dc.subject.otherBiometricsen_US
dc.subject.otherPattern Recognitionen_US
dc.subject.otherComputer Imaging, Vision, Pattern Recognition and Graphicsen_US
dc.subject.otherInformation Storage and Retrievalen_US
dc.subject.otherArtificial Intelligenceen_US
dc.subject.otherComputer Visionen_US
dc.subject.otherImage Processingen_US
dc.titleHill-climbing attack based on the uphill simplex algorithm and its application to signature verificationen_US
dc.typeconferenceObjecten
dc.typebookParten
dc.subject.ecienciaTelecomunicacioneses_ES
dc.relation.publisherversionhttp://dx.doi.org/10.1007/978-3-642-19530-3_8
dc.identifier.doi10.1007/978-3-642-19530-3_8
dc.identifier.publicationfirstpage83
dc.identifier.publicationlastpage94
dc.identifier.publicationvolume6583
dc.relation.eventdateMarch 8-10, 2011en_US
dc.relation.eventnumber3
dc.relation.eventplaceBrandenburg (Germany)en_US
dc.relation.eventtitleCOST 2101 Third European Workshop on Biometrics and Identity Management, BioID 2011en_US
dc.relation.projectIDComunidad de Madrid. S2009/TIC-1485/CONTEXTSes_ES
dc.relation.projectIDinfo:eu-repo/grantAgreement/EC/FP7/257289en
dc.type.versioninfo:eu-repo/semantics/acceptedVersionen
dc.contributor.groupAnálisis y Tratamiento de Voz y Señales Biométricas (ING EPS-002)es_ES
dc.rights.accessRightsopenAccessen
dc.authorUAMFierrez Aguilar, Julián (261834)
dc.authorUAMGalbally Herrero, Javier (261846)
dc.facultadUAMEscuela Politécnica Superior


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record