The Face of ‘the Other’: Biometric Facial Recognition, Imposters and the Art of Outplaying Them
Research output: Chapter in Book/Report/Conference proceeding › Book chapter › Research › peer-review
Standard
The Face of ‘the Other’ : Biometric Facial Recognition, Imposters and the Art of Outplaying Them. / Grünenberg, Kristina.
The Imposter as Social Theory: Thinking with Gatecrashers, Cheats and Charlatans. ed. / Steve Woolgar; Else Vogel; David Moats; Claes-Fredrik Helgesson. Bristol : Bristol University Press, 2021. p. 191-217.Research output: Chapter in Book/Report/Conference proceeding › Book chapter › Research › peer-review
Harvard
APA
Vancouver
Author
Bibtex
}
RIS
TY - CHAP
T1 - The Face of ‘the Other’
T2 - Biometric Facial Recognition, Imposters and the Art of Outplaying Them
AU - Grünenberg, Kristina
PY - 2021/4/1
Y1 - 2021/4/1
N2 - This chapter examines the line of biometric research that aims to prevent ‘spoofing’, that is, attempts by individuals to circumvent biometric systems through the presentation of artefacts such as ‘fake fingers’, ‘fake irides’ or facial masks. Through these fake body parts, spoofers attempt to hide their ‘true identity’ by pretending to be someone else, whether a particular individual (known as impostering)or an unknown other (known as obfuscation) (Bhattacharjee et al, 2018). The chapter takes the reader into a laboratory of biometricresearch and focuses on the work with ‘anti- spoofing’, or, in formal biometric vocabulary, ‘presentation attack detection’,4 which focuseson continuously coming up with new ways to circumvent biometric sensors and thus beat spoofers at their own game.
AB - This chapter examines the line of biometric research that aims to prevent ‘spoofing’, that is, attempts by individuals to circumvent biometric systems through the presentation of artefacts such as ‘fake fingers’, ‘fake irides’ or facial masks. Through these fake body parts, spoofers attempt to hide their ‘true identity’ by pretending to be someone else, whether a particular individual (known as impostering)or an unknown other (known as obfuscation) (Bhattacharjee et al, 2018). The chapter takes the reader into a laboratory of biometricresearch and focuses on the work with ‘anti- spoofing’, or, in formal biometric vocabulary, ‘presentation attack detection’,4 which focuseson continuously coming up with new ways to circumvent biometric sensors and thus beat spoofers at their own game.
M3 - Book chapter
SN - 978-1529213072
SP - 191
EP - 217
BT - The Imposter as Social Theory
A2 - Woolgar, Steve
A2 - Vogel, Else
A2 - Moats, David
A2 - Helgesson, Claes-Fredrik
PB - Bristol University Press
CY - Bristol
ER -
ID: 280304417