CHAPTER Chingovska_SPRINGER_2019/IDIAP Evaluation Methodologies for Biometric Presentation Attack Detection Chingovska, Ivana Mohammadi, Amir Anjos, André Marcel, Sébastien Marcel, Sébastien Ed. Nixon, Mark Ed. Fierrez, Julian Ed. Evans, Nicholas Ed. EXTERNAL https://publications.idiap.ch/attachments/papers/2018/Chingovska_SPRINGER_2019.pdf PUBLIC Handbook of Biometric Anti-Spoofing 2019 Springer International Publishing 978-3-319-92627-8 https://www.springer.com/us/book/9783319926261 URL 10.1007/978-3-319-92627-8 doi Presentation attack detection (PAD, also known as anti-spoofing) systems, regardless of the technique, biometric mode or degree of independence of external equipment, are most commonly treated as binary classification systems. The two classes that they differentiate are bona-fide and presentation attack samples. From this perspective, their evaluation is equivalent to the established evaluation standards for the binary classification systems. However, PAD systems are designed to operate in conjunction with recognition systems and as such can affect their performance. From the point of view of a recognition system, the presentation attacks are a separate class that they need to be detected and rejected. As the problem of presentation attack detection grows to this pseudo-ternary status, the evaluation methodologies for the recognition systems need to be revised and updated. Consequentially, the database requirements for presentation attack databases become more specific. The focus of this chapter is the task of biometric verification and its scope is three-fold: firstly, it gives the definition of the presentation attack detection problem from the two perspectives. Secondly, it states the database requirements for a fair and unbiased evaluation. Finally, it gives an overview of the existing evaluation techniques for presentation attacks detection systems and verification systems under presentation attacks.