ISO/IEC 20059:2025
(Main)Information technology - Methodologies to evaluate the resistance of biometric systems to morphing attacks
Information technology - Methodologies to evaluate the resistance of biometric systems to morphing attacks
This document establishes a methodology to evaluate the resistance of BSs to morphing attacks, including multiple identity attacks. The document is limited to image-based morphing attacks. The term "image-based" includes modalities such as face, iris and finger image data. The document establishes: - a definition of biometric sample modifications and manipulation with a specific focus on manipulations that constitute a multiple identity attack. This can be, for instance, an enrolment attack with face image morphing; - a methodology to measure the morphing attack potential of a morphing method. The document also describes how morphing algorithms can be used for system evaluation.
Technologies de l'information — Méthodologies pour l'évaluation de la résistance des systèmes biométriques aux attaques par morphing
General Information
- Status
- Published
- Publication Date
- 24-Aug-2025
- Technical Committee
- ISO/IEC JTC 1/SC 37 - Biometrics
- Drafting Committee
- ISO/IEC JTC 1/SC 37 - Biometrics
- Current Stage
- 6060 - International Standard published
- Start Date
- 25-Aug-2025
- Due Date
- 09-Feb-2026
- Completion Date
- 25-Aug-2025
Overview
ISO/IEC 20059:2025 - "Information technology - Methodologies to evaluate the resistance of biometric systems to morphing attacks" defines a standardized methodology to assess how image-based biometric systems resist morphing attacks, including multiple identity attacks (MIA). The standard is limited to image-based modalities such as face, iris and finger image data and provides definitions, evaluation metrics and procedures to measure the morphing attack potential (MAP) of morphing methods. It also describes how morphing algorithms can be used to evaluate biometric systems and includes informative annexes for reference implementation and visualization.
Key technical topics and requirements
- Scope and terminology: Clear definitions of image modification, image manipulation, biometric morphing, and related attack/detection concepts (e.g., S-MAD, D-MAD).
- Morphing attack potential (MAP): A methodology and matrix-based metrics to quantify a morphing method’s capability to deceive one or more biometric systems across multiple verification attempts.
- Detection and error rates: Standardized metrics for morphing attack detection performance, including BSCER (bona fide sample classification error rate) and MACER (morphing attack classification error rate), with procedures to report these values.
- Multiple contributing subject generalization: Treatment of morphed samples that combine multiple identities and how to measure their effect on system vulnerability.
- Benchmarking and influencing factors: Guidelines for benchmarking morphing methods, visualizing morphed samples, and understanding factors that impact MAP (e.g., number of systems, thresholds, probe attempts).
- Reporting and reproducibility: Guidance for consistent measurement, visualization (examples in Annex B), and a reference implementation (Annex A) to support reproducible evaluation.
- Limitations: The standard focuses on evaluation methodology and explicitly notes that resistance evaluation is not a full security evaluation.
Practical applications
- Evaluating the robustness of automated border control (ABC) gates, passport issuance workflows and enrolment systems against image-based morphing attacks.
- Benchmarking morphing and morph-detection algorithms in laboratories and testbeds.
- Integrating MAP and MACER metrics into procurement, conformance testing and risk assessments for biometric systems.
- Supporting research into morphing generation and detection methods and informing operational policies for trusted capture and enrolment.
Who should use ISO/IEC 20059:2025
- Biometric system vendors and integrators
- Border control and identity document authorities
- Testing laboratories and certification bodies
- Security architects, risk managers and policy makers
- Researchers developing morphing or morph-detection algorithms
Related standards
Normative references include:
- ISO/IEC 2382-37 (Biometrics vocabulary)
- ISO/IEC 30107-1 and ISO/IEC 30107-3 (Biometric presentation attack detection frameworks and testing)
- ISO/IEC 39794-5 (Face image data interchange formats)
ISO/IEC 20059:2025 provides a consistent, repeatable framework for assessing image-based morphing threats and integrating quantitative MAP metrics into biometric security programs.
Frequently Asked Questions
ISO/IEC 20059:2025 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Methodologies to evaluate the resistance of biometric systems to morphing attacks". This standard covers: This document establishes a methodology to evaluate the resistance of BSs to morphing attacks, including multiple identity attacks. The document is limited to image-based morphing attacks. The term "image-based" includes modalities such as face, iris and finger image data. The document establishes: - a definition of biometric sample modifications and manipulation with a specific focus on manipulations that constitute a multiple identity attack. This can be, for instance, an enrolment attack with face image morphing; - a methodology to measure the morphing attack potential of a morphing method. The document also describes how morphing algorithms can be used for system evaluation.
This document establishes a methodology to evaluate the resistance of BSs to morphing attacks, including multiple identity attacks. The document is limited to image-based morphing attacks. The term "image-based" includes modalities such as face, iris and finger image data. The document establishes: - a definition of biometric sample modifications and manipulation with a specific focus on manipulations that constitute a multiple identity attack. This can be, for instance, an enrolment attack with face image morphing; - a methodology to measure the morphing attack potential of a morphing method. The document also describes how morphing algorithms can be used for system evaluation.
ISO/IEC 20059:2025 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.240.15 - Identification cards. Chip cards. Biometrics. The ICS classification helps identify the subject area and facilitates finding related standards.
You can purchase ISO/IEC 20059:2025 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
International
Standard
ISO/IEC 20059
First edition
Information technology —
2025-08
Methodologies to evaluate the
resistance of biometric systems to
morphing attacks
Technologies de l'information — Méthodologies pour l'évaluation
de la résistance des systèmes biométriques aux attaques par
morphing
Reference number
© ISO/IEC 2025
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2025 – All rights reserved
ii
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms. 4
5 Morphing attacks . 6
6 Measuring and reporting morphing attack potential . 7
6.1 Morphing attack potential .7
6.2 Multiple contributing subject generalization .9
6.3 Visualisation .9
6.4 Benchmarking of morphing methods and impacting factors . 12
7 Morph detection error rates .12
Annex A (informative) Reference implementation .13
Annex B (informative) Example of morphed sample visualization. 14
Bibliography .16
© ISO/IEC 2025 – All rights reserved
iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations,
governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types
of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/
IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had not
received notice of (a) patent(s) which may be required to implement this document. However, implementers
are cautioned that this may not represent the latest information, which may be obtained from the patent
database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall not be held
responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso.org/iso/foreword.html.
In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 37, Biometrics.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
© ISO/IEC 2025 – All rights reserved
iv
Introduction
Many application processes for ID documents do not implement trusted capture. For example, as long as
printed biometric samples (e.g. face images) are accepted, morphing attacks, where biometric references
are manipulated to match two or more biometric data subjects submitted during enrolment, pose a threat
to image-based biometric systems (BSs). Morphing attack detection is possible, though the ability to detect
morphing attacks can differ based on the morphing attack techniques.
Not all morphing techniques pose the same risk for an operational BS. This document establishes morphing
attack potential (MAP) as a measure of the capability of a class of morphing attacks to deceive one or more BSs.
The user of this document can simulate a real use case such as issuance of documents or border control.
The use case can consider a variable number of attempts and BSs to determine the MAP against automated
border control (ABC) gates from different vendors.
NOTE The evaluation of the resistance of a BS is not a security evaluation.
© ISO/IEC 2025 – All rights reserved
v
International Standard ISO/IEC 20059:2025(en)
Information technology — Methodologies to evaluate the
resistance of biometric systems to morphing attacks
1 Scope
This document establishes a methodology to evaluate the resistance of BSs to morphing attacks, including
multiple identity attacks. The document is limited to image-based morphing attacks. The term "image-
based" includes modalities such as face, iris and finger image data.
The document establishes:
— a definition of biometric sample modifications and manipulation with a specific focus on manipulations
that constitute a multiple identity attack. This can be, for instance, an enrolment attack with face image
morphing;
— a methodology to measure the morphing attack potential of a morphing method.
The document also describes how morphing algorithms can be used for system evaluation.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes
requirements of this document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 2382-37, Information technology — Vocabulary — Part 37: Biometrics
ISO/IEC 30107-1, Information technology — Biometric presentation attack detection — Part 1: Framework
ISO/IEC 30107-3, Information technology — Biometric presentation attack detection — Part 3: Testing and
reporting
ISO/IEC 39794-5, Information technology — Extensible biometric data interchange formats — Part 5: Face
image data
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 2382-37, ISO/IEC 30107-1,
ISO/IEC 30107-3, ISO/IEC 39794-5 and the following apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org/
3.1
image content
visual information within an image, such as the face of a subject
Note 1 to entry: Artefacts like an iris shadow, caused by a poor quality morphing method, are potentially contained in
the image content.
Note 2 to entry: Artefacts by compression also belong to the image content.
© ISO/IEC 2025 – All rights reserved
3.2
image generation
creation of still or animated content with imaging software
Note 1 to entry: For instance, the generation of a synthetic image (e.g. with GANs) and subsequent morphing of the
accomplice image with the synthetic.
Note 2 to entry: Morphing can be a part of that process.
3.3 Terms related to image substitution
3.3.1
image substitution attack
replacement of the printed image in the physical passport booklet with the intention to fool the human
examiner
Note 1 to entry: Could also be used to fool the face recognition system, if the image from the passport data page is
scanned.
Note 2 to entry: The attack takes the target photo and puts parts of it on top of the original printed image on the data page.
Note 3 to entry: The image in the chip is not affected by the attack.
3.3.2
image substitution attack detection
revealing deviations to expected properties of the original portrait image area
Note 1 to entry: An image substitution attack can cause image artefacts in the scanned facial image or its surroundings.
Note 2 to entry: The expected UV pattern cannot be observed.
Note 3 to entry: This is complementary action to other measures, like validating the document numbers.
3.4 Terms related to image manipulation
3.4.1
image modification
act of effect of changing the image content or metadata of an image
Note 1 to entry: Typical signal modifications are beautifications, compression, sharpening, contrast enhancement,
cropping, geometry change.
Note 2 to entry: Typical metadata modification could be change of location, date or time of capturing.
3.4.2
image manipulation
act of effect of intentionally altering the visual appearance or specific properties of an image resulting in
misrepresentation or misinterpretation
Note 1 to entry: The difference to an image modification is the intention of the malicious actor.
Note 2 to entry: A manipulation is a subset of a modification.
3.4.3
digital image manipulation
act or effect of intentionally altering digitally the visual appearance or specific properties of an image
resulting in misrepresentation or misinterpretation
Note 1 to entry: Alteration can be morphing of two parent images or replacing of certain parts/regions of the image.
Note 2 to entry: Manipulation can target elements of metadata (e.g. the capture date field).
© ISO/IEC 2025 – All rights reserved
3.4.4
biometric image manipulation
image modification intended to influence either the output of a biometric system or the decision of a human
examiner, or both
Note 1 to entry: Possible intentions are for criminal attacks (impersonation) or for protecting privacy (avoiding
recognition by means of de-identification).
Note 2 to entry: Using a filter on the face represented in the image, can influence the error rates of the biometric
[5]
system (e.g. increased false reject rate or false accept rate, or both) .
Note 3 to entry: Alteration before the capture process (e.g. manipulating the facial appearance with makeup) is not a
digital manipulation. This is a presentation attack as defined in ISO/IEC 30107-1.
3.4.5
biometric image manipulation attack
submission of an image containing a manipulated representation of a biometric trait to the identity
document application process with the goal of interfering with the operation of either the biometric system
or the human examiner, or both
3.4.6
image manipulation attack detection
detecting traces of image manipulation conducted by either an algorithm or a human examiner, or both
Note 1 to entry: Detection algorithms typically operate on the suspected images, potentially supported with a trusted
live capture image.
Note 2 to entry: The detection algorithm has typically no information about the enrolment process (i.e. the details of
the attack vector).
3.5 Terms related to image morphing
3.5.1
biometric morphing
combining two or more biometric samples into one signal
Note 1 to entry: A biometric sample is defined in ISO/IEC 2382-37.
3.5.2
face image morphing
morphing process executed with facial portrait images
3.5.3
face image morphing attack
biometric image manipulation attack based on morphing two or more facial images
Note 1 to entry: The morphing can be executed on the holistic facial image or on selected areas of interest (e.g. the
periocular region).
3.5.4
morphing attack detection
MAD
observing a biometric morphing attack through either an algorithmic or a human method, or both
Note 1 to entry: The attack detection can be conducted based on a single image (single image morphing attack
detection, i.e. S-MAD) or based on a pair of images (differential image morphing attack detection, i.e. D-MAD).
3.5.5
single image morphing attack detection
S-MAD
morphing attack detection that is based on a single image
© ISO/IEC 2025 – All rights reserved
3.5.6
differential image morphing attack detection
D-MAD
morphing attack detection that is based on a pair of images
Note 1 to entry: D-MAD can be implemented by quantifying the similarity between a suspected morph image and a
trusted-capture (i.e. bona fide image).
3.5.7
multiple identity attack
MIA
biometric morphing attack with the intention of obtaining an identity document that can be successfully
used by multiple subjects
3.5.8
morphing attack potential
MAP
measure of the capability of a class of morphing attacks to deceive one or more biometric systems using
multiple recognition attempts
3.5.9
bona fide sample classification error rate
BSCER
proportion of bona fide samples incorrectly classified as morphed samples in a specific scenario
3.5.10
morphing attack classification error rate
MACER
proportion of morphed samples incorrectly classified as bona fide samples in a specific scenario
3.5.11
morphing attack classification error rate at a given morphing attack potential
MACER
MAPr[],c
MACER computed on the subset of morphed images that can successfully reach a match decision with both
contributing subjects in at least r verification attempts by at least c biometric systems
Note 1 to entry: See Clause 7 for further details.
4 Symbols and abbreviated terms
The following abbreviated terms and symbols are used in this document.
ABC automated border control
BS biometric system
BSCER bona fide sample classification error rate
D-MAD differential image morphing attack detection
FAR false accept rate
FRR false reject rate
FMMPMR fully mated morph presentation match rate
MACER morphing attack classification error rate
MAD morphing attack detection
© ISO/IEC 2025 – All rights reserved
MAP morphing attack potential
MIA multiple identity attack
MMPMR mated morph presentation match rate
S-MAD single image morphing attack detection
V
a generic vulnerability indicator
D
a set of morphed samples
M
M
a morphed sample
a condition that the morphed sample M must satisfy in the computation of the vul-
CM()
V
nerability indicator V
D
a set of probe samples
P
P
a probe sample
D
a set of biometric systems
F
F
a biometric system
the similarity (or dissimilarity) score between the morphed sample M and the probe
sM ,P
()
F
sample P using the biometric system F
the threshold used by the biometric system F to determine whether a similarity (or
τ
F
dissimilarity) score indicates that two biometric samples have the same biometric
source
a function that returns the comparison decision made by the biometric system F
mM ,,PF
()
when comparing the morphed sample M and the probe sample P
mc MD,,F a function that counts the number of probe samples in D that are successfully ver-
()
P P
ified against the morphed sample M by the biometric system F
m
in the computation of the MAP metric, it is the number of probe samples for each
contributing subject
n
the number of biometric systems used in the computation of the MAP metric
the value of the element of the MAP matrix at row r and column c
MAPr ,c
[]
fmcM(),,DD ,r a function that returns the number of biometric systems in D for which at least r
PF F
probe samples in D are successfully verified against the morphed image M
P
N
the number of subjects involved in the generation of a morphed sample
S
the weight factor assigned to all values in the column c of a MAP matrix in the com-
wc[]
col
putation of the robustness curve and the weighted average MAP
the weight factor assigned to all values in the row r of a MAP matrix in the compu-
wr
[]
row
tation of the generality curve and c
R
the robustness curve derived from a MAP matrix
MAP[]r
G
the generality curve derived from a MAP matrix
MAP[]c
© ISO/IEC 2025 – All rights reserved
MAP
the weighted average MAP
Avg
N
the number of bona fide samples used to compute the BSCER and MACER metrics
BF
N
the number of morphed samples used to compute the BSCER and MACER metrics
M
th
Res
i
a function used to compute the BSCER and MACER metrics that returns 1 if the i
sample is classified as morphed and 0 if it is classified as a bona fide
D the subset of morphed image in D for which fmcM,,DD ,r is above or equal to
()
MAP,rc M PF
[]
c for both contributing subjects
5 Morphing attacks
Biometric recognition is nowadays widely in use in border control applications, both automat
...
ISO/IEC 20059:2025は、生体認証システム(BS)がモーフィング攻撃、特に複数のアイデンティティ攻撃に対する耐性を評価するための方法論を確立した文書です。この基準は、主に画像ベースのモーフィング攻撃に焦点を当てており、顔、虹彩、指紋画像データなどのモダリティを含みます。 この標準の強みは、具体的な定義を提供することにあります。特に、複数のアイデンティティ攻撃を構成する生体サンプルの修正や操作に対する詳細な焦点を持っていることが挙げられます。たとえば、顔画像のモーフィングによる登録攻撃が具体的な例として示されています。このような明確な枠組みにより、研究者や開発者はモーフィング攻撃の脅威をより深く理解し、対策を講じることが可能になります。 また、基準はモーフィング攻撃の潜在能力を評価するための体系的な方法論も提供しています。この方法論により、モーフィングアルゴリズムがどのようにシステム評価に使用されるかが明確に説明されており、技術者にとって信頼性の高い評価手法を助長しています。これにより、生体認証システムの設計や実装における安全基準が向上し、より高い防御力を持つシステムを構築するための指針を提供しています。 ISO/IEC 20059:2025の関連性は、サイバーセキュリティの分野が進化し続ける中でますます重要になっています。特にモーフィング攻撃が新たな脅威として浮上する中、この文書は専門家らが対策を講じるための基盤を提供し、ユーザーの信頼性を確保する重要な役割を果たしています。生体認証技術の進化に伴い、この標準は不可欠なリソースとなるでしょう。
The ISO/IEC 20059:2025 standard is a crucial document that establishes comprehensive methodologies to evaluate the resistance of biometric systems (BSs) to morphing attacks, specifically focusing on image-based attacks. The standard's scope is clearly defined, emphasizing the evaluation of biometric modalities such as face, iris, and fingerprint image data. This focus on image-based morphing attacks positions the standard as a vital reference point for organizations concerned with biometric security. One of the key strengths of ISO/IEC 20059:2025 is its meticulous approach to defining biometric sample modifications and manipulations, particularly regarding multiple identity attacks. By identifying scenarios such as enrolment attacks using face image morphing, the standard helps delineate the specific threats that biometric systems face today. This clarity enhances the understanding of how morphing attacks can be executed and highlights the urgency for robust evaluation methodologies. Additionally, the document introduces a systematic methodology for measuring the morphing attack potential of various morphing methods. This is particularly relevant in today's context, where biometric security is increasingly implemented across various sectors. The standard's detailed descriptions of how morphing algorithms can be incorporated into system evaluation underscore its practical applicability for developers and security analysts alike, ensuring they are equipped to assess and enhance the security posture of biometric deployments. In conclusion, the ISO/IEC 20059:2025 standard provides a critical framework for understanding and evaluating the vulnerability of biometric systems against morphing attacks. Its focused scope, coupled with its methodological rigor, makes it an essential tool for professionals in the information technology and biometric security fields, enhancing their ability to safeguard against emerging threats.
Le document ISO/IEC 20059:2025 présente une norme essentielle dans le domaine de la technologie de l'information, en particulier concernant l'évaluation de la résistance des systèmes biométriques aux attaques de morphing. Son champ d'application est clairement défini : il se concentre sur l'évaluation des attaques de morphing basées sur les images, englobant divers types de données biométriques, telles que les images de visage, d'iris et d'empreintes digitales. Les forces de cette norme résident dans son approche méthodologique rigoureuse. Elle fournit une définition claire des modifications et manipulations d'échantillons biométriques, mettant en avant les manœuvres qui constituent des attaques à multiples identités. Cela est particulièrement pertinent dans un contexte où la sécurité des systèmes biométriques est primordiale. Par exemple, l'attaque d'enrôlement par morphing d'images faciales est détaillée de manière à permettre une meilleure compréhension des vulnérabilités potentielles. Une autre force de la norme est sa capacité à proposer une méthodologie pour mesurer le potentiel des attaques de morphing. Cela offre aux chercheurs et aux praticiens une base solide pour évaluer l'efficacité de différentes méthodes de morphing. De plus, l'inclusion des algorithmes de morphing pour l'évaluation des systèmes représente une avancée significative, permettant d’établir des critères clairs et mesurables pour la résistance des systèmes biométriques. En termes de pertinence, le document ISO/IEC 20059:2025 répond à un besoin croissant de sécurisation des systèmes biométriques face à des menaces de plus en plus sophistiquées. À une époque où les cyberattaques se multiplient, cette norme apporte une réponse ciblée et méthodique pour évaluer et renforcer la sécurité des identités numériques. Grâce à ses contributions précises, elle s'inscrit comme une référence incontournable pour les professionnels et les institutions préoccupés par la sécurité biométrique.
Die ISO/IEC 20059:2025 bietet ein umfassendes Rahmenwerk zur Bewertung der Widerstandsfähigkeit biometrischer Systeme (BS) gegen Morphing-Angriffe. Der Fokus dieser Norm liegt auf bildbasierten Morphing-Angriffen, was bedeutet, dass sie spezifische Modalitäten wie Gesichtsbilder, Iris- und Fingerabdruckdaten umfasst. Durch die klare Abgrenzung des Geltungsbereichs wird sichergestellt, dass nur relevante Angriffe, einschließlich Mehrfachidentitätsangriffe, in die Bewertung einfließen. Eine der Stärken der ISO/IEC 20059:2025 ist die präzise Definition von Modifikationen und Manipulationen biometrischer Proben, insbesondere im Hinblick auf Angriffe, die auf mehreren Identitäten basieren. Dies ist besonders wichtig in einer Zeit, in der die Sicherheit biometrischer Systeme zunehmend fraglich ist. Die Norm erfasst auch Beispiele wie Enrollment-Angriffe mittels Face-Image-Morphing, wodurch potenzielle Bedrohungen klar benannt und kategorisiert werden. Die Einführung einer Methodik zur Messung des Morphing-Angriffspotenzials stellt einen weiteren bedeutenden Fortschritt dar. Diese Methodik ermöglicht nicht nur eine standardisierte Bewertung, sondern fördert auch das Verständnis der Wirksamkeit verschiedener Morphing-Methoden. Dadurch können Systeme effektiver evaluiert und gegebenenfalls verbessert werden, um die Anfälligkeit gegen solche Angriffe zu minimieren. Insgesamt ist die ISO/IEC 20059:2025 von hoher Relevanz für die Entwicklung und Sicherstellung der Sicherheit biometrischer Systeme. Dank ihrer strukturierten Vorgehensweise und umfassenden Analyse der Morphing-Angriffe bietet sie einen wertvollen Beitrag zur Verbesserung der Integrität biometrischer Identifikationsprozesse.
ISO/IEC 20059:2025 문서는 생체 시스템의 변형 공격에 대한 저항성을 평가하기 위한 방법론을 수립하고 있습니다. 이 표준은 이미지 기반 변형 공격, 특히 여러 정체성 공격에 중점을 두고 있으며, 얼굴, 홍채, 손가락 이미지 데이터와 같은 다양한 생체 정보 모달리티를 포함합니다. 이 표준의 강점 중 하나는 생체 샘플 수정 및 조작에 대한 명확한 정의를 제공하여, 여러 정체성 공격에 해당하는 조작에 집중한다는 점입니다. 예를 들어, 얼굴 이미지 변형을 통한 등록 공격이 이에 해당할 수 있습니다. 이러한 정의는 생체인식 시스템에 대한 평가를 더욱 정밀하게 진행할 수 있도록 합니다. 또한, 표준은 특정 변형 방법의 변형 공격 잠재력을 측정하기 위한 방법론을 제시하고 있습니다. 이는 생체 인식 시스템의 취약점을 평가하는 데 중요한 기반이 됩니다. 모핑 알고리즘을 시스템 평가에 활용하는 방법에 대한 설명도 포함되어 있어, 실제 적용 가능성을 높이고 있습니다. ISO/IEC 20059:2025은 생체 인식 기술의 발전에 따라 필수적인 표준으로 자리매김하며, 생체 시스템이 직면한 보안 위협을 더 효과적으로 관리할 수 있는 프레임워크를 제공합니다. 이 표준은 생체 인식 기술의 신뢰성을 높이고, 다양한 공격으로부터 사용자 정보를 보호하는 데 기여할 것입니다.










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...