{"id":440187,"date":"2024-10-20T08:13:28","date_gmt":"2024-10-20T08:13:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-30107-12023\/"},"modified":"2024-10-26T15:22:47","modified_gmt":"2024-10-26T15:22:47","slug":"bs-iso-iec-30107-12023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-30107-12023\/","title":{"rendered":"BS ISO\/IEC 30107-1:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4 Characterization of presentation attacks 4.1 General 4.2 Presentation attack instruments <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5 Framework for presentation attack detection methods 5.1 Types of presentation attack detection <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.2 The role of challenge-response 5.2.1 General <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2.2 Challenge-response related to liveness detection 5.2.3 Liveness detection not related to challenge-response 5.2.4 Challenge-response not related to biometrics 5.3 Presentation attack detection process <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.4 Presentation attack detection within biometric system architecture 5.4.1 Overview in terms of the generalized biometric framework <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.4.2 PAD processing considerations relative to the other biometric subsystems <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.4.3 PAD location implications regarding data interchange 6 Obstacles to biometric impostor presentation attacks in a biometric system <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Biometric presentation attack detection – Framework<\/b><\/p>\n |