Presentation Attacks in Signature Biometrics: Types and Introduction to Attack Detection
Authentication applications based on the use of biometric methods have received a lot of interest during the last years due to the breathtaking results obtained using personal traits such as face or fingerprint. However, it is important not to forget that these biometric systems have to withstand different types of possible attacks. This work carries out an analysis of different Presentation Attack (PA) scenarios for on-line handwritten signature verification. The main contributions of the present work are: (1) short overview of representative methods for Presentation Attack Detection (PAD) in signature biometrics; (2) to describe the different levels of PAs existing in on-line signature verification regarding the amount of information available to the attacker, as well as the training, effort and ability to perform the forgeries; and (3) to report an evaluation of the system performance in signature biometrics under different PAs and writing tools considering freely available signature databases. Results obtained for both BiosecurID and e-BioSign databases show the high impact on the system performance regarding not only the level of information that the attacker has but also the training and effort performing the signature. This work is in line with recent efforts in the Common Criteria standardization community towards security evaluation of biometric systems, where attacks are rated depending on, among other factors, time spent, effort and expertise of the attacker, as well as the information available and used from the target being attacked.
This work has been supported by projects: Bio-Guard (Ayudas Fundación BBVA a Equipos de Investigación Científica 2017), UAM-CecaBank, and by TEC2015-70627-R (MINECO/FEDER). Ruben Tolosana is supported by a FPU Fellowship from the Spanish MECD.
- 2.Zhang DD (2013) Automated biometrics: technologies and systems. Springer Science & Business Media, BerlinGoogle Scholar
- 4.Taigman Y, Yang M, Ranzato MA, Wolf L (2014) Deepface: closing the gap to human-level performance in face verification. In: The IEEE conference on computer vision and pattern recognition (CVPR)Google Scholar
- 9.Galbally J, Gomez-Barrero M, Ross A (2017) Accuracy evaluation of handwritten signature verification: rethinking the random-skilled forgeries dichotomy. In Proceedings of IEEE international joint conference on biometrics, pp 302–310Google Scholar
- 11.Tolosana R, Vera-Rodriguez R, Ortega-Garcia J, Fierrez J (2015) Increasing the robustness of biometric templates for dynamic signature biometric systems. In: Proceedings of 49th annual international Carnahan conference on security technologyGoogle Scholar
- 13.Eden M (1961) On the formalization of handwriting. Structure of language and its mathematical aspects (Proceedings of symposia in applied mathematics), vol 12. American Mathematical Society, Providence, pp 83–88Google Scholar
- 15.Madasu VK, Lovell BC (2008) An automatic off-line signature verification and forgery detection system. In: Verma B, Blumenstein M (eds) Pattern recognition technologies and applications: recent advances. IGI Global, USA, pp 63–88Google Scholar
- 17.Gomez-Barrero M, Galbally J, Fierrez J, Ortega-Garcia J, Plamondon R (2015) Enhanced on-line signature verification based on skilled forgery detection using sigma-lognormal features. In: Proceedings of IEEE/IAPR international conference on biometrics. ICB, pp 501–506Google Scholar
- 21.Doddington G, Liggett W, Martin A, Przybocki M, Reynolds D (1998) Sheeps, goats, lambs and wolves: a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. In: Proceedings of international conference on spoken language processingGoogle Scholar
- 26.Vielhauer C, Zbisch F (2003) A test tool to support brute-force online and offline signature forgery tests on mobile devices. In: Proceedings of international conference on multimedia and expo, vol 3, pp 225–228Google Scholar
- 27.Alonso-Fernandez F, Fierrez J, Gilperez A, Galbally J, Ortega-Garcia J (2009) Robustness of signature verification systems to imitators with increasing skills. In: Proceedings of 10th international conference on document analysis and recognition, pp 728–732Google Scholar
- 29.Fierrez-Aguilar J, Alonso-Hermira N, Moreno-Marquez G, Ortega-Garcia J (2004) An off-line signature verification system based on fusion of local and global information. In: Proceedings of European conference on computer vision, workshop on biometric authentication, BIOAW, LNCS, vol. 3087. Springer, Berlin, pp 295–306CrossRefGoogle Scholar
- 30.Tolosana R, Vera-Rodriguez R, Ortega-Garcia J, Fierrez J (2015) Update strategies for HMM-based dynamic signature biometric systems. In: Proceedings of 7th IEEE international workshop on information forensics and security, WIFSGoogle Scholar
- 39.Tekampe N, Merle A, Bringer J, Gomez-Barrero M, Fierrez J, Galbally J (2016) Toward Common Criteria evaluations of biometric systems. BEAT public deliverable D6.5. https://www.beat-eu.org/project/deliverables-public/d6-5-toward-common-criteria-evaluations-of-biometric-systems