{"id":422837,"date":"2024-10-20T06:43:10","date_gmt":"2024-10-20T06:43:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-30107-32023\/"},"modified":"2024-10-26T12:36:05","modified_gmt":"2024-10-26T12:36:05","slug":"bs-iso-iec-30107-32023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-30107-32023\/","title":{"rendered":"BS ISO\/IEC 30107-3:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 3 Terms and definitions 3.1 Attack elements <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.2 Metrics <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3.3 Test roles <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5 Conformance 6 Presentation attack detection (PAD) overview <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7 Levels of evaluation of PAD mechanisms 7.1 Overview <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.2 General principles of evaluation of PAD mechanisms 7.3 PAD subsystem evaluation <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.4 Data capture subsystem evaluation 7.5 Full system evaluation <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8 Artefact properties 8.1 Properties of PAIs in biometric impostor attacks <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.2 Properties of PAIs in biometric concealer attacks 8.3 Properties of synthesized biometric samples with abnormal characteristics <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9 Considerations in non-conformant capture attempts of biometric characteristics 9.1 Methods of presentation 9.2 Methods of assessment 10 Artefact creation and usage in evaluations of PAD mechanisms 10.1 General 10.2 Artefact creation and preparation <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 10.3 Artefact usage <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 10.4 Iterative testing to identity effective artefacts 11 Process-dependent evaluation factors 11.1 Overview 11.2 Evaluating the enrolment process <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 11.3 Evaluating the verification process 11.4 Evaluating the identification process <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 11.5 Evaluating offline PAD mechanisms 12 Evaluation using Common Criteria framework 12.1 General <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 12.2 Common Criteria and biometrics 12.2.1 Overview <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 12.2.2 General evaluation aspects 12.2.3 Error rates in testing 12.2.4 PAD evaluation <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 12.2.5 Vulnerability assessment <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 13 Metrics for the evaluation of biometric systems with PAD mechanisms 13.1 General <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 13.2 Metrics for PAD subsystem evaluation 13.2.1 General 13.2.2 Classification metrics <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 13.2.3 Non-response metrics 13.2.4 Efficiency metrics 13.2.5 Summary 13.3 Metrics for data capture subsystem evaluation 13.3.1 General <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 13.3.2 Acquisition metrics 13.3.3 Non-response metrics 13.3.4 Efficiency metrics 13.3.5 Summary <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 13.4 Metrics for full system evaluation 13.4.1 General 13.4.2 Accuracy metrics 13.4.3 Efficiency metrics <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 13.4.4 Generalized full-system evaluation performance <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 13.4.5 Summary <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex A (informative) Classification of attack types <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Annex B (informative) Examples of artefact species used in a PAD subsystem evaluation for fingerprint capture devices <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Annex C (informative) Roles in PAD testing <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Biometric presentation attack detection – Testing and reporting<\/b><\/p>\n |