Multimodal Anti-spoofing in Biometric Recognition Systems

  • Giorgio FumeraEmail author
  • Gian Luca Marcialis
  • Battista Biggio
  • Fabio Roli
  • Stephanie Caswell Schuckers
Part of the Advances in Computer Vision and Pattern Recognition book series (ACVPR)


While multimodal biometric systems were commonly believed to be intrinsically more robust to spoof attacks than unimodal systems, recent results provided clear evidence that they can be evaded by spoofing a single biometric trait. This pointed out that also multimodal systems require specific anti-spoofing measures. In this chapter, we introduce the issue of multimodal anti-spoofing, and give an overview of state-of-the-art anti-spoofing measures. Such measures mainly consist of developing ad hoc score fusion rules that are based on assumptions about the match score distribution produced by fake biometric traits. We discuss the pros and cons of existing measures, and point out the current challenges in multimodal anti-spoofing.


Fusion Rule Biometric System Fingerprint Image False Acceptance Rate False Rejection Rate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work has been partly supported by the TABULA RASA project, 7th Framework Research Programme of the European Union (EU), grant agreement number: 257289; by the project CRP-18293 funded by Regione Autonoma della Sardegna (RAS), L.R. 7/2007, Bando 2009; and by a grant awarded to B. Biggio by RAS, PO Sardegna FSE 2007-2013, L.R. 7/2007 “Promotion of the scientific research and technological innovation in Sardinia.”


  1. 1.
    Marcialis GL, Coli P, Roli F (2012) Fingerprint liveness detection based on fake finger characteristics. Int J Digital Crime Forensics (IJDCF) 4(3):1–19CrossRefGoogle Scholar
  2. 2.
    Ghiani L, Marcialis GL, Roli F (2012) Fingerprint liveness detection by local phase quantization. In: International conference pattern record (ICPR), IEEE pp 537–540.Google Scholar
  3. 3.
    Ghiani L, Marcialis GL, Roli F (2012) Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms. Proceedings of 14th ACM workshop on multimedia and security (MMSec). ACM, Coventry, UK, pp 157–164Google Scholar
  4. 4.
    Marasco E, Sansone C (2012) Combining perspiration- and morphology-based static features for fingerprint liveness detection. Pattern Recogn Lett 33(9):1148–1156CrossRefGoogle Scholar
  5. 5.
    Abhyankar A, Schuckers SAC (2009) Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recogn 42(3):452–464CrossRefzbMATHGoogle Scholar
  6. 6.
    Marasco E, Ding Y, Ross A (2012) Combining match scores with liveness values in a fingerprint verification system. In: Proceedings of IEEE 5th International conference biometrics: theory, applications and systems (BTAS), Washington DC (USA).Google Scholar
  7. 7.
    Marasco E, Johnson PA, Sansone C, Schuckers SAC (2011) Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism. In: Sansone C, Kittler J, Roli F (eds) Proceedings of the 10th International workshop multiple classifier systems (MCS), LNCS, vol 6713, pp 309–318. Springer, Naples, ItalyGoogle Scholar
  8. 8.
    Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics. Springer Publishers, New YorkGoogle Scholar
  9. 9.
    Rodrigues RN, Ling LL, Govindaraju V (2009) Robustness of multimodal biometric fusion methods against spoof attacks. J Vis Lang Comput 20(3):169–179CrossRefGoogle Scholar
  10. 10.
    Rodrigues RN, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system. In: International conference biometrics: theory applications and systems (BTAS), pp 1–5.Google Scholar
  11. 11.
    Biggio B, Akhtar Z, Fumera G, Marcialis G, Roli F (2012) Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics 1:11–24CrossRefGoogle Scholar
  12. 12.
    Johnson P, Tan B, Schuckers S (2010) Multimodal fusion vulnerability to non-zero effort (spoof) imposters. In: IEEE International workshop on information forensics and security (WIFS), pp 1–5.Google Scholar
  13. 13.
    Jain AK, Ross A (2004) Multibiometric systems. Commun ACM 47(1):34–40CrossRefGoogle Scholar
  14. 14.
    Jain AK, Ross A, Pankanti S, Member S (2006) Biometrics: A tool for information security. IEEE Trans Inf Forensics Secur 1:125–143CrossRefGoogle Scholar
  15. 15.
    Ross A (2007) An introduction to multibiometrics. Proceedings of 15th european signal processing conference (EUSIPCO 2007). Poznan, Poland, pp 20–24Google Scholar
  16. 16.
    Marcialis GL, Lewicke A, Tan B, Coli P, Grimberg D, Congiu A, Tidu A, Roli F, Schuckers SAC (2009) 1st International fingerprint liveness detection competition—LivDet (2009) In: Foggia P, Sansone C, Vento M (eds) Proceedings of 15th International conference image analysis and processing (ICIAP), LNCS, vol 5716, pp 12–23 . Springer, Vietri sul Mare, ItalyGoogle Scholar
  17. 17.
    Adler A, Schuckers SAC (2009) Security and liveness, overview. In: Li SZ, Jain AK (eds) Encycl Biometrics. Springer, US, pp 1146–1152Google Scholar
  18. 18.
    Biggio B, Akhtar Z, Fumera G, Marcialis GL, Roli F (2011) Robustness of multi-modal biometric verification systems under realistic spoofing attacks. In: Ross A, Prabhakar S, Kim J (eds) Jain AK. International joint conference on biometrics (IJCB), IEEE, pp 1–6Google Scholar
  19. 19.
    Akhtar Z, Biggio B, Fumera G, Marcialis G (2011) Robustness of multi-modal biometric systems under realistic spoof attacks against all traits. Proceedings of IEEE workshop on biometric measurements and systems for security and medical applications (BioMS 2011). Milan, Italy, pp 5–10Google Scholar
  20. 20.
    Akhtar Z, Fumera G, Marcialis G, Roli F (2012) Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: Proceedings of IEEE 5th International conference biometrics: theory, applications and systems (BTAS), Washington DC, USA, pp 283–288.Google Scholar
  21. 21.
    Akhtar Z, Fumera G, Marcialis G, Roli F (2011) Evaluation of multimodal biometric score fusion rules under spoof attacks. Proceedings of 5th IEEE/IAPR International conference biometrics (ICB). New Delhi, India, pp 402–407Google Scholar
  22. 22.
    Biggio B, Fumera G, Roli F (2011) Design of robust classifiers for adversarial environments. In: IEEE International conference on systems, Man, and Cybernetics (SMC), pp 977–982.Google Scholar
  23. 23.
    Yambay D, Ghiani L, Denti P, Marcialis GL, Roli F, Schuckers S (2012) LivDet2011 - Fingerprint liveness detection competition 2011. In: 5th International conference biometrics (ICB).Google Scholar
  24. 24.
    Coli P, Marcialis GL, Roli F (2007) Vitality detection from fingerprint images: a critical survey. In: Lee SW, Li SZ (eds) Proceedings of international conference biometrics (ICB), LNCS, vol 4642., SpringerSeoul, Korea, pp 722–731Google Scholar
  25. 25.
    Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International joint conference on biometrics (IJCB).Google Scholar
  26. 26.
    Chakka MM, Anjos A, Marcel S, Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F, Yan J, Yi D, Lei Z, Zhang Z, Li ZS, Schwartz WR, Rocha A, Pedrini H, Lorenzo-Navarro J, Castrillón-Santana M, Maatta J, Hadid A, Pietikainen M (2011) Competition on counter measures to 2-D facial spoofing attacks. In: Proceedings of IAPR IEEE International joint conference on biometrics (IJCB). Washington DC, USA.Google Scholar
  27. 27.
    Zhang Z, Yi D, Lei Z, Li SZ (2011) Face liveness detection by learning multispectral reflectance distributions. In: International conference automatic face and gesture recognition, pp 436–441.Google Scholar
  28. 28.
    Akhtar Z, Fumera G, Marcialis G, Roli F (2011) Robustness evaluation of biometric systems under spoof attacks. In: Maino G, Foresti G (eds) International Conference on Image Analysis and Processing (ICIAP), LNCS, vol 6978, pp 159–168. Springer, BerlinGoogle Scholar
  29. 29.
    Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Transactions on Knowledge and Data Engineering 99(PrePrints), 1 (2013).Google Scholar

Copyright information

© Springer-Verlag London 2014

Authors and Affiliations

  • Giorgio Fumera
    • 1
    Email author
  • Gian Luca Marcialis
    • 1
  • Battista Biggio
    • 1
  • Fabio Roli
    • 1
  • Stephanie Caswell Schuckers
    • 2
  1. 1.Department of Electrical and Electronic EngineeringUniversity of CagliariCagliariItaly
  2. 2.Department of Electrical and Computer EngineeringClarkson UniversityPotsdamUSA

Personalised recommendations