{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:58:24Z","timestamp":1740178704920,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Presentation attack detection (PAD) is used to mitigate the dangers of the<jats:italic>weakest link problem<\/jats:italic>in biometric recognition, in which failure modes of one application affect the security of all other applications. Strong PAD methods are therefore a must, and we believe biometric challenge-response protocols (BCRP) form an underestimated part of this ecosystem. In this paper, we conceptualize what BCRPs are, and we propose a descriptive formalism and categorization for working with them. We validate the categorization against existing literature that we classified to be describing BCRPs. Lastly, we discuss how strong BCRPs provide advantages over PAD methods, specifically in the protection of individual applications and the protection of<jats:italic>other<\/jats:italic>applications from inadvertent leaks in BCRP applications. We note that research in BCRPs is fragmented, and our intent for the proposed formalism and categorization are to give focus and direction to research efforts into biometric challenge-response protocols.<\/jats:p>","DOI":"10.1186\/s13635-022-00131-y","type":"journal-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T19:02:52Z","timestamp":1662404572000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Presentation attack detection and biometric recognition in a challenge-response formalism"],"prefix":"10.1186","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2753-9634","authenticated-orcid":false,"given":"Erwin","family":"Haasnoot","sequence":"first","affiliation":[]},{"given":"Luuk J.","family":"Spreeuwers","sequence":"additional","affiliation":[]},{"given":"Raymond N. J.","family":"Veldhuis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"key":"131_CR1","unstructured":"G. Fawkes, vpnMentor, Report: Data breach in biometric security platform affecting millions of users. (2019). https:\/\/www.vpnmentor.com\/blog\/report-biostar2-leak\/. Accessed 14 Aug 2019"},{"key":"131_CR2","unstructured":"R. Singh, R. Khaira, Rs 500, 10 minutes, and you have access to [a] billion aadhaar details. (2019). https:\/\/www.tribuneindia.com\/news\/archive\/nation\/rs-500-10-minutes-and-you-have-access-to-billion-aadhaar-details-523361. Accessed 05 Jan 2018"},{"key":"131_CR3","doi-asserted-by":"crossref","unstructured":"R. Dingledine, N. Mathewson, P. Syverson, Tor: The second-generation onion router.\u00a0Technical report (NavalResearch Lab, Washington DC, 2004)","DOI":"10.21236\/ADA465464"},{"key":"131_CR4","unstructured":"S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system. Whitepaper (2008).\u00a0https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"131_CR5","unstructured":"L. Matney, Sam Altman\u2019s Worldcoin wants to scan eyeballs in exchange for crypto (2021). https:\/\/techcrunch.com\/2021\/10\/21\/sam-altmans-worldcoin-wants-to-scan-every-humans-eyeball-and-give-them-crypto-in-exchange\/. Accessed 21 Oct 2021"},{"key":"131_CR6","unstructured":"V. Yano, A. Zimmer, L.L. Ling, in Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012). Multimodal biometric authentication based on iris pattern and pupil light reflex (IEEE, New York, 2012), pp. 2857\u20132860"},{"key":"131_CR7","unstructured":"International Organization for Standardization, vol. 2016 (International Organization for Standardization, Geneva, 2016)"},{"key":"131_CR8","doi-asserted-by":"crossref","unstructured":"R.W. Frischholz, A. Werner, in 2003 IEEE International SOI Conference. Proceedings (Cat. No. 03CH37443). Avoiding replay-attacks in a face recognition system using head-pose estimation (IEEE, New York, 2003), pp. 234\u2013235","DOI":"10.1109\/AMFG.2003.1240849"},{"key":"131_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ijpsycho.2021.08.001","volume":"168","author":"LV Eberhardt","year":"2021","unstructured":"L.V. Eberhardt, G. Gr\u00f6n, M. Ulrich, A. Huckauf, C. Strauch, Direct voluntary control of pupil constriction and dilation: exploratory evidence from pupillometry, optometry, skin conductance, perception, and functional MRI. Int. J. Psychophysiol. 168, 33\u201342 (2021)","journal-title":"Int. J. Psychophysiol."},{"issue":"6","key":"131_CR10","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1037\/h0054651","volume":"18","author":"JR Stroop","year":"1935","unstructured":"J.R. Stroop, Studies of interference in serial verbal reactions. J. Exp. Psychol. 18(6), 643 (1935)","journal-title":"J. Exp. Psychol."},{"key":"131_CR11","doi-asserted-by":"crossref","unstructured":"A. Khodabakhsh, E. Haasnoot, P. Bours, in 2018 International Conference of the Biometrics Special Interest Group (BIOSIG). Predicted templates: learning-curve based template projection for keystroke dynamics (IEEE, New York, 2018), pp. 1\u20135","DOI":"10.23919\/BIOSIG.2018.8553293"},{"key":"131_CR12","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1145\/3023359","volume":"60","author":"I Martinovic","year":"2017","unstructured":"I. Martinovic, K. Rasmussen, M. Roeschlin, G. Tsudik, Authentication using pulse-response biometrics. Commun. ACM. 60, 108\u2013115 (2017)","journal-title":"Commun. ACM."},{"key":"131_CR13","doi-asserted-by":"crossref","unstructured":"I. Sluganovic, M. Roeschlin, K.B. Rasmussen, I. Martinovic, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Using reflexive eye movements for fast challenge-response authentication (ACM, New York, 2016), pp. 1056\u20131067","DOI":"10.1145\/2976749.2978311"},{"key":"131_CR14","doi-asserted-by":"crossref","unstructured":"R. Johnson, T.E. Boult, W.J. Scheirer, in 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS). Voice authentication using short phrases: examining accuracy, security and privacy issues (IEEE, New York, 2013), pp. 1\u20138","DOI":"10.1109\/BTAS.2013.6712713"},{"key":"131_CR15","doi-asserted-by":"crossref","unstructured":"N.K. Blanchard, S. Kachanovich, T. Selker, F. Waligorski, Reflexive memory authenticator: a proposal for effortless renewable biometrics. Emerging technologies for authorization and authentication, 11967, 104\u2013121 (2020)","DOI":"10.1007\/978-3-030-39749-4_7"},{"issue":"1","key":"131_CR16","first-page":"36","volume":"2","author":"J Tan","year":"2018","unstructured":"J. Tan, X. Wang, C..-T.. Nguyen, Y. Shi, SilentKey: A new authentication framework through ultrasonic-based lip reading. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 2(1), 36 (2018)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquit. Technol."},{"issue":"3","key":"131_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3351239","volume":"3","author":"Y Gao","year":"2019","unstructured":"Y. Gao, W. Wang, V.V. Phoha, W. Sun, Z. Jin, EarEcho: Using Ear Canal Echo for Wearable Authentication. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 3(3), 1\u201324 (2019)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquit. Technol."},{"key":"131_CR18","doi-asserted-by":"crossref","unstructured":"U. Burgbacher, M. Pr\u00e4torius, K. Hinrichs, in 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC). A behavioral biometric challenge and response approach to user authentication on smartphones (IEEE, New York, 2014), pp. 3328\u20133335","DOI":"10.1109\/SMC.2014.6974441"},{"key":"131_CR19","doi-asserted-by":"crossref","unstructured":"J. Li, K. Fawaz, Y. Kim, in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Velody: nonlinear vibration challenge-response for resilient user authentication (ACM, New York, 2019). pp. 1201\u20131213","DOI":"10.1145\/3319535.3354242"},{"key":"131_CR20","unstructured":"V. Skerpac, N-dimensional biometric security system (2002). US Patent App. 10\/062,799"},{"key":"131_CR21","unstructured":"S. Simons, J. Zhou, Y. Liao, L. Bradway, M. Aguilar, P.M. Connolly, Cognitive biometrics using mouse perturbation (2014). US Patent App. 14\/011,351"},{"key":"131_CR22","unstructured":"B.M. Jakobsson, Systems and methods for authenticating a user based on a biometric model associated with the user (2015). US Patent 9,203,835"},{"key":"131_CR23","doi-asserted-by":"crossref","unstructured":"S.M. Ganesh, P. Vijayakumar, L.J. Deborah, in 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM). A secure gesture based authentication scheme to unlock the smartphones (IEEE, New York, 2017), pp. 153\u2013158","DOI":"10.1109\/ICRTCCM.2017.31"},{"key":"131_CR24","doi-asserted-by":"crossref","unstructured":"M. De Marsico, M. Nappi, D. Riccio J.-L. Dugelay, in 2012 5th IAPR International Conference on Biometrics (ICB). Moving face spoofing detection via 3D projective invariants (IEEE, New York, 2012), pp. 73\u201378","DOI":"10.1109\/ICB.2012.6199761"},{"key":"131_CR25","unstructured":"A. Saad, M. Moustafa, in Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition. Interactive versus Passive 2D Face Spoofing Detection (ACM, New York, 2014)"},{"issue":"2","key":"131_CR26","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/3463515","volume":"5","author":"M Shen","year":"2021","unstructured":"M. Shen, Y. Wei, Z. Liao, L. Zhu, Iritrack: Face presentation attack detection using iris tracking. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(2), 78\u201317821 (2021). https:\/\/doi.org\/10.1145\/3463515","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"131_CR27","doi-asserted-by":"crossref","unstructured":"A. Ali, F. Deravi, S. Hoque, in 2012 Third International Conference on Emerging Security Technologies. Liveness detection using gaze collinearity (IEEE, New York, 2012), pp. 62\u201365","DOI":"10.1109\/EST.2012.12"},{"key":"131_CR28","doi-asserted-by":"crossref","unstructured":"S. Li, A. Ashok, Y. Zhang, C. Xu, J. Lindqvist, M. Gruteser, in 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns (IEEE, New York, 2016), pp. 1\u20139","DOI":"10.1109\/PERCOM.2016.7456514"},{"key":"131_CR29","doi-asserted-by":"crossref","unstructured":"Y. Zhang, W. Hu, W. Xu, C.T. Chou, J. Hu, Continuous authentication using eye movement response of implicit visual stimuli. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 1(4), 177 (2018)","DOI":"10.1145\/3161410"},{"key":"131_CR30","doi-asserted-by":"crossref","unstructured":"N.Z. Gong, M. Payer, R. Moazzezi, M. Frank, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. Forgery-resistant touch-based authentication on mobile devices (ACM, New York, 2016), pp. 499\u2013510","DOI":"10.1145\/2897845.2897908"},{"key":"131_CR31","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1109\/ACCESS.2016.2646398","volume":"5","author":"I Bhardwaj","year":"2016","unstructured":"I. Bhardwaj, N.D. Londhe, S.K. Kopparapu, Study of imposter attacks on novel fingerprint dynamics based verification system. IEEE Access. 5, 595\u2013606 (2016)","journal-title":"IEEE Access."},{"issue":"9","key":"131_CR32","doi-asserted-by":"publisher","first-page":"2894","DOI":"10.3390\/s18092894","volume":"18","author":"Z Ma","year":"2018","unstructured":"Z. Ma, X. Wang, R. Ma, Z. Wang, J. Ma, Integrating gaze tracking and head-motion prediction for mobile device authentication: a proof of concept. Sensors. 18(9), 2894 (2018)","journal-title":"Sensors."},{"issue":"1","key":"131_CR33","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TDSC.2017.2745575","volume":"17","author":"J Tian","year":"2020","unstructured":"J. Tian, Y. Cao, W. Xu, S. Wang, Challenge-response authentication using in-air handwriting style verification. IEEE Transactions on Dependable and Secure Computing 17(1), 51\u201364 (2020)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"131_CR34","doi-asserted-by":"crossref","unstructured":"N. Sae-Bae, K. Ahmed, K. Isbister, N. Memon, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Biometric-rich gestures: a novel approach to authentication on multi-touch devices (ACM, New York, 2012), pp. 977\u2013986","DOI":"10.1145\/2207676.2208543"},{"key":"131_CR35","doi-asserted-by":"crossref","unstructured":"J. Chauhan, Y. Hu, S. Seneviratne, A. Misra, A. Seneviratne, Y. Lee, in Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. BreathPrint: Breathing acoustics-based user authentication (ACM, New York, 2017), pp. 278\u2013291","DOI":"10.1145\/3081333.3081355"},{"key":"131_CR36","doi-asserted-by":"crossref","unstructured":"N. Sae-Bae, M. Jakobsson, in Proceedings of the 15th Workshop on Mobile Computing Systems and Applications. Hand authentication on multi-touch tablets (ACM, New York, 2014), p. 8","DOI":"10.1145\/2565585.2565586"},{"key":"131_CR37","unstructured":"S. Bhaskaran, Integrated voice biometrics cloud security gateway. (2016). US Patent 9,412,381"},{"key":"131_CR38","unstructured":"K. Chaudhury, A. Devarasetty, Liveness detection (2014). US Patent 8,856,541"},{"key":"131_CR39","unstructured":"R. Lindemann, System and method for eye tracking during authentication (2018). US Patent 9,898,596"},{"key":"131_CR40","unstructured":"D. Roos, System and methods for personal identification number authentication and verification (2018). US Patent 10,049,197"},{"key":"131_CR41","unstructured":"S. Pearson, M. Contolini, System and method for portable authentication (2005). US Patent App. 10\/859,487"},{"key":"131_CR42","unstructured":"D. Roblek, M. Sharifi, Segment-based speaker verification using dynamically generated phrases (2014). US Patent 8,812,320"},{"key":"131_CR43","unstructured":"V. Skerpac, Dynamic pass phrase security system (dpss) (2014). US Patent 8,812,319"},{"key":"131_CR44","doi-asserted-by":"crossref","unstructured":"K. Pearson, VII. Note on regression and inheritance in the case of two parents. Proc. R. Soc. Lond. 58(347\u2013352), 240\u2013242 (1895)","DOI":"10.1098\/rspl.1895.0041"},{"issue":"2","key":"131_CR45","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1167\/13.2.11","volume":"13","author":"M Naber","year":"2013","unstructured":"M. Naber, S. Fr\u00e4ssle, U. Rutishauser, W. Einh\u00e4user, Pupil size signals novelty and predicts later retrieval success for declarative memories of natural scenes. J Vis. 13(2), 11 (2013)","journal-title":"J Vis."},{"key":"131_CR46","unstructured":"H. Murphy, Why a data breach at a genealogy site has privacy experts worried (2020). https:\/\/www.nytimes.com\/2020\/08\/01\/technology\/gedmatch-breach-privacy.html. Accessed 01 Aug 2020"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-022-00131-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-022-00131-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-022-00131-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T07:21:08Z","timestamp":1727940068000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-022-00131-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["131"],"URL":"https:\/\/doi.org\/10.1186\/s13635-022-00131-y","relation":{},"ISSN":["2510-523X"],"issn-type":[{"type":"electronic","value":"2510-523X"}],"subject":[],"published":{"date-parts":[[2022,9,5]]},"assertion":[{"value":"25 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"5"}}