Advertisement

Robustness Evaluation of Biometric Systems under Spoof Attacks

  • Zahid Akhtar
  • Giorgio Fumera
  • Gian Luca Marcialis
  • Fabio Roli
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6978)

Abstract

In spite of many advantages, multi-modal biometric recognition systems are vulnerable to spoof attacks, which can decrease their level of security. Thus, it is fundamental to understand and analyse the effects of spoof attacks and propose new methods to design robust systems against them. To this aim, we are developing a method based on simulating the fake score distributions of individual matchers, to evaluate the relative robustness of different score fusion rules. We model the score distribution of fake traits by assuming it lies between the one of genuine and impostor scores, and parametrize it by a measure of the relative distance to the latter, named attack strength. Different values of the attack strength account for the many different factors which can affect the distribution of fake scores. In this paper we present preliminary results aimed at evaluating the capability of our model to approximate realistic fake score distributions. To this aim we use a data set made up of faces and fingerprints, including realistic spoof attacks traits.

Keywords

Biometric systems Performance evaluation Spoof attacks Adversarial pattern recognition 

References

  1. 1.
    Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial “gummy” fingers on fingerprint systems. In: Optical Security and Counterfeit Deterrence Techniques IV. Proc. of SPIE, vol. 4677, pp. 275–289 (2002)Google Scholar
  2. 2.
    Kim, Y., Na, J., Yoon, S., Yi, J.: Masked Fake Face Detection using Radiance Measurements. J. Opt. Soc. Am. - A 26(4), 760–766 (2009)CrossRefGoogle Scholar
  3. 3.
    Kang, H., Lee, B., Kim, H., Shin, D., Kim, J.: A study on performance evaluation of the liveness detection for various fingerprint sensor modules. In: Proc. Seventh Int. Conf. on Know. Based Intel. Info. and Engg. Sys., pp. 1245–1253 (2003)Google Scholar
  4. 4.
    Marcialis, G.L., Lewicke, A., Tan, B., Coli, P., Grimberg, D., Congiu, A., Tidu, A., Roli, F., Schuckers, S.: First International Fingerprint Liveness Detection Competition. In: Proc. 14th Intl. Conf. on Image Analysis and Proc., pp. 12–23 (2009)Google Scholar
  5. 5.
    Rodrigues, R.N., Ling, L.L., Govindaraju, V.: Robustness of Multimodal Biometric Methods against Spoof Attacks. JVLC 20(3), 169–179 (2009)Google Scholar
  6. 6.
    Abhyankar, A., Schuckers, S.: Integrating a Wavelet Based Perspiration Liveness Check with Fingerprint Recognition. Patt. Rec. 42(3), 452–464 (2009)CrossRefzbMATHGoogle Scholar
  7. 7.
    Coli, P., Marcialis, G.L., Roli, F.: Fingerprint Silicon Replicas: Static and Dynamic Features for Vitality Detection using an Optical Capture Device. Int’l J. of Image and Graphics 8(4), 495–512 (2008)CrossRefGoogle Scholar
  8. 8.
    Marcialis, G.L., Roli, F., Tidu, A.: Analysis of Fingerprint Pores for Vitality Detection. In: Proc. 12th Int’l Conf. on Pattern Recognition, pp. 1289-1292 (2010)Google Scholar
  9. 9.
    Bolme, D.S.: Elastic Bunch Graph Matching. Master’s Thesis: Dept. of Comp. Science, Colorado State University (2003)Google Scholar
  10. 10.
    Jain, A.K., Prabhakar, S., Chen, S.: Combining Multiple Matchers for a High Security Fingerprint Verification System. PRL 20(11-13), 1371–1379 (1999)CrossRefGoogle Scholar
  11. 11.
    Pan, G., Wu, Z., Sun, L.: Liveness detection for face recognition. In: Recent Advances in Face Recognition, pp. 236–252 (2008)Google Scholar
  12. 12.
  13. 13.
    LeCam, L.: Asymptotic Methods in Statistical Decision Theory. Springer, Heidelberg (1986)Google Scholar
  14. 14.
    Rodrigues, R.N., Kamat, N., Govindaraju, V.: Evaluation of Biometric Spoofing in a Multimodal System. In: Proc. Fourth IEEE Int. Conf. Biometrics: Theory Applications and Systems, pp. 1–5 (2010)Google Scholar
  15. 15.
    Johnson, P.A., Tan, B., Schuckers, S.: Multimodal Fusion Vulnerability to Non-Zero Effort (Spoof) Imposters. In: Proc. IEEE Workshop on Information Forensics and Security, pp. 1–5 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Zahid Akhtar
    • 1
  • Giorgio Fumera
    • 1
  • Gian Luca Marcialis
    • 1
  • Fabio Roli
    • 1
  1. 1.Dept. of Electrical and Electronic Eng.Univ. of Cagliari, Piazza d’ArmiCagliariItaly

Personalised recommendations