You are here: Resources > FIDIS Deliverables > Forensic Implications > D6.5/D6.6: Second thematic Workshop forensic implications > 
Presentation 2: Time stamp interpretation in relation to identity  Title:
PRESENTATION 3: BIOMETRIC DEVICES METHODS FOR SPOOFING AND CIRCUMVENTING
 Presentation 4: Profiling issues and due process

 

Presentation 3: Biometric devices methods for spoofing and circumventing

The third presentation by Arnout Ruifrok from the NFI (NL) was on Biometric Devices, methods for Spoofing, and circumventing. Biometrics is defined as the (automatic) identification of an individual’s identity by electronic means. There are a number of identification modalities including, facial, fingerprint, iris, hand scans, vascular pattern, signature writing, speech, and keystroke analysis. 

 

Each of these systems has different false acceptance rates and false rejection rates. Three systems were looked at in detail: Facial, fingerprint and iris recognition systems. Each of these have their own individual problems – i.e. facial recognition systems will have difficulties in operating correctly as a result of different lighting conditions, pose and position of the subject, the background and also the expression on a persons face. 

 

Presentation 2: Time stamp interpretation in relation to identity  fidis-wp6-del6_5_del6_6_workshop_on_forensic_implications.sxw  Presentation 4: Profiling issues and due process
6 / 9