GSO ISO/IEC 30107-1:2021

ISO/IEC 30107-1:2016
Gulf Standard   Current Edition · Approved on 01 July 2021

Information technology — Biometric presentation attack detection — Part 1: Framework

GSO ISO/IEC 30107-1:2021 Files

GSO ISO/IEC 30107-1:2021 Scope

Abstract:

In recent years, there has been an increase in the availability and interest in using biometric sensors for authenticating users, but the potential for attacks on a system through the biometric sensor has limited the use of biometrics in applications which are unsupervised by an agent of the system owner, such as remote authentication over untrusted networks. Biometric data can be easily obtained directly from a person, online, or through existing databases and then used to create spoofs (or fakes) to mount an attack. The presentation of a biometric spoof (e.g. a facial image or video of a person on a tablet or a fake silicone or gelatin fingerprint) to a biometric sensor can be detected by methods broadly referred to as presentation attack detection, PAD.

The purpose of ISO/IEC 30107-1 is to provide a foundation for PAD through defining terms and establishing a framework through which presentation attack events can be specified and detected so that they can be categorized, detailed and communicated for subsequent decision making and performance assessment activities. This foundation is intended to not only introduce and frame the topics of presentation attacks and PAD but also to benefit other standards projects. This standard does not advocate a specific standard PAD method. The scope is limited to describing attacks that take place at the sensor during the presentation and collection of biometric characteristics.

There are two other parts of ISO/IEC 30107, under the general title Information Technology - Biometric presentation attack detection:

- Part 2:Data Formats

- Part 3: Testing and reporting.

Keywords:

Liveness, liveness detection, biometric liveness detection, spoof detection, biometric spoof, biometric spoof detection, fake, fake biometric, fake biometrics, arefact, artefact detection.

.

Best Sellers From Information Sector

OS GSO ISO/TR 18492:2017
ISO/TR 18492:2005 
Omani Standard
Long-term preservation of electronic document-based information
GSO ISO/TR 18492:2017
ISO/TR 18492:2005 
Gulf Standard
Long-term preservation of electronic document-based information
GSO ISO/TS 23635:2024
ISO/TS 23635:2022 
Gulf Standard
Blockchain and distributed ledger technologies — Guidelines for governance
GSO ISO/IEC 15773:2013
ISO/IEC 15773:1998 
Gulf Standard
Information technology -- Telecommunications and information exchange between systems -- Broadband Private Integrated Services Network -- Inter-exchange signalling protocol -- Transit counter additional network feature

Recently Published from Information Sector

GSO ISO/IEC 27005:2025
ISO/IEC 27005:2022 
Gulf Standard
Information security, cybersecurity and privacy protection — Guidance on managing information security risks
GSO ISO 18128:2025
ISO 18128:2024 
Gulf Standard
Information and documentation — Records risks — Risk assessment for records management
GSO ISO/IEC TR 5891:2025
ISO/IEC TR 5891:2024 
Gulf Standard
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment
GSO ISO/IEC 30137-1:2025
ISO/IEC 30137-1:2024 
Gulf Standard
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and specification