© The Institution of Engineering and Technology
The vulnerability of biometric systems to external attacks using a physical artefact in order to impersonate the legitimate user has become a major concern over the last decade. Such a threat, commonly known as ‘spoofing’, poses a serious risk to the integrity of biometric systems. The usual low-complexity and low-cost characteristics of these attacks make them accessible to the general public, rendering each user a potential intruder. The present study addresses the spoofing issue analysing the feasibility to perform low-cost attacks with self-manufactured three-dimensional (3D) printed models to 2.5D and 3D face recognition systems. A new database with 2D, 2.5D and 3D real and fake data from 26 subjects was acquired for the experiments. Results showed the high vulnerability of the three tested systems, including a commercial solution, to the attacks.
References
-
-
1)
-
2)
-
3)
-
23. Anjos, A., Marcel, S.: ‘Counter-measures to photo attacks in face recognition: a public database and a baseline’. Proc. IEEE Int. Joint Conf. on Biometrics (IJCB), 2011.
-
4)
-
2. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: ‘Impact of artificial gummy fingers on fingerprint systems’. Proc. SPIE Optical Security and Counterfeit Deterrence Techniques IV, 2002, vol. 4677, pp. 275–289.
-
5)
-
54. Marasco, E., Johnson, P., Sansone, C., Schuckers, S.: ‘Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism’. Proc. Int. Workshop on Multiple Classifier Systems (MCS), , 2011 (, 6713), pp. 309–318.
-
6)
-
15. The Guardian: ‘iPhone 5S fingerprint sensor hacked by Germany's chaos computer club’, 2013, .
-
7)
-
44. Henrikson, J.: ‘Completeness and total boundedness of the Hausdorff metric’, MIT Undergrad. J. Math., 1999, pp. 69–80.
-
8)
-
40. Klare, B., Paulino, A.A., Jain, A.K.: ‘Analysis of facial features in identical twins’. Proc. IEEE Int. Joint Conf. on Biometrics (IJCB), 2011.
-
9)
-
27. Sun, Y., Tistarelli, M., Maltoni, D.: ‘Structural similarity based image quality map for face recognition across plastic surgery’. Proc. IEEE Conf. on Biometrics: Theory, Applications and Systems (BTAS), 2013.
-
10)
-
11)
-
59. Galbally, J., Marcel, S., Fierrez, J.: ‘Image quality assessment for fake biometric detection: application to iris, fingerprint and face recognition’, IEEE Trans. Image Process., 2014, 23, (2), pp. 710–724 (doi: 10.1109/TIP.2013.2292332).
-
12)
-
39. Phillips, P.J., Flynn, P.J., Bowyer, K.W., et al: ‘Distinguishing identical twins by face recognition’. Proc. IEEE Int. Conf. on Automatic Face and Gesture Recognition and Workshops (FG), 2011, pp. 185–192.
-
13)
-
17. The CNN: ‘Man in disguise boards international flight’, 2010, .
-
14)
-
43. Barnsley, M.F.: ‘Fractals everywhere’. , 1993, , pp. 5–41.
-
15)
-
5. Galbally, J.: ‘Vulnerabilities and attack protection in security systems based on biometric recognition’. , Universidad Autonoma de Madrid, 2009.
-
16)
-
18. Kollreider, K., Fronthaler, H., Bigun, J.: ‘Evaluating liveness by face images and the structure tensor’. Proc. IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), 2005, pp. 75–80.
-
17)
-
51. Phillips, P.J., Flynn, P.J., Scruggs, T., et al: ‘Overview of the face recognition grand challenge’. Proc. IEEE Int. Conf. on Computer Vision and Pattern Recognition (CVPR), 2005, pp. 947–954.
-
18)
-
29. Dantcheva, A., Chen, C., Ross, A.: ‘Can facial cosmetics affect the matching accuracy of face recognition systems?’. Proc. IEEE Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), 2013, pp. 391–398.
-
19)
-
42. BEAT: ‘BEAT: biometrics evaluation and testing’, 2012. .
-
20)
-
1. Thalheim, L., Krissler, J.: ‘Body check: biometric access protection devices and their programs put to the test’. , November 2002, pp. 114–121.
-
21)
-
16. Sky News: ‘Fake fingers fool hospital clock-in scanner’, 2013, .
-
22)
-
21. Tan, X., Li, Y., Liu, J., Jiang, L.: ‘Face liveness detection from a single image with sparse low rank bilinear discriminative model’. Proc. European Conf. on Computer Vision (ECCV), , 2010, pp. 504–517.
-
23)
-
30. Tabula Rasa: ‘Tabula rasa spoofing challenge’, 2013. .
-
24)
-
48. Pan, G., Wu, Z., Pan, Y.: ‘Automatic 3D face verification from range data’. Proc. Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2003, pp. 193–196.
-
25)
-
47. Achermann, B., Bunke, H.: ‘Classifying range images of human faces with Hausdorff distance’. Proc. of Int. Conf. on Pattern Recognition (ICPR), 2000, pp. 809–813.
-
26)
-
45. Huttenlocher, D., Rucklidge, W.: ‘A multiresolution technique for comparing images using the Hausdorff distance’. , Cornell University, Department of Computer Science, 1992.
-
27)
-
4. Marasco, E.: ‘Secure multibiometric systems’. , University of Naples Federico II, 2010.
-
28)
-
52. Russ, T., Koch, M., Little, C.: ‘A 2D range Hausdorff approach for 3D face recognition’. Proc. IEEE Workshop on Face Recognition Grand Challenge Experiments, 2005.
-
29)
-
32. Duc, N.M., Minh, B.Q.: ‘Your face is not your password: face authentication bypassing lenovo-asus-toshiba’. Black Hat USA, 2009.
-
30)
-
19. Erdogmus, N., Marcel, S.: ‘Spoofing face recognition with 3D masks’, IEEE Trans. Inf. Forensics Sec., 2014, 9, pp. 1084–1097 (doi: 10.1109/TIFS.2014.2322255).
-
31)
-
31. Li, Y., Xu, K., Yan, Q., Li, Y., Deng, R.: ‘Understanding OSN-based facial disclosure against face authentication systems’. Proc. ACM Asia Symp. on Information, Computer and Communications Security (ASIACCS), 2014, pp. 413–424.
-
32)
-
33)
-
14. Clarkson University: ‘Livdet-iris 2013: Liveness detection-iris competition 2013’, 2013. .
-
34)
-
26. Bhatt, H.S., Bharadwaj, S., Singh, R., Vatsa, M.: ‘Recognizing surgically altered face images using multiobjective evolutionary algorithm’, IEEE Trans. Inf. Forensics Sec., 2013, 8, pp. 89–100 (doi: 10.1109/TIFS.2012.2223684).
-
35)
-
13. Ghiani, L., Mura, V., Tocco, S., Marcialis, G.L., Roli, F.: ‘LivDet 2013 fingerprint liveness detection competition 2013’. Proc. IAPR Int. Conf. on Biometrics (ICB), 2013.
-
36)
-
22. Zhiwei, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: ‘A face antispoofing database with diverse attacks’. Proc. IAPR Int. Conf. on Biometrics (ICB), 2012, pp. 26–31.
-
37)
-
25. Aggarwal, G., Biswas, S., Flynn, P.J., Bowyer, K.W.: ‘A sparse representation approach to face matching across plastic surgery’. Proc. Workshop on the Applications of Computer Vision (WACV), 2012, pp. 113–119.
-
38)
-
28. Singh, R., Vatsa, M., Bhatt, H.S., Bharadwaj, S., Noore, A., Nooreyezdan, S.S.: ‘Plastic surgery: a new dimension to face recognition’, IEEE Trans. Inf. Forensics Sec., 2010, 5, pp. 441–448 (doi: 10.1109/TIFS.2010.2054083).
-
39)
-
62. Kose, N., Dugelay, J.-L.: ‘Reflectance analysis based countermeasure technique to detect face mask attacks’. Proc. IEEE Int. Conf. on Digital Signal Processing (DSP), 2013.
-
40)
-
57. Pan, G., Sun, L., Wu, Z., Lao, S.: ‘Eyeblink-based anti-spoofing in face recognition from a generic webcamera’. Proc. IEEE Int. Conf. on Computer Vision (ICCV), 2007, pp. 14–20.
-
41)
-
56. Chingovska, I., Anjos, A., Marcel, S.: ‘Anti-spoofing in action: joint operation with a verification system’. Proc. IEEE Int. Conf. on Computer Vision and Pattern Recognition Workshops (CVPR-W), 2013, pp. 98–104.
-
42)
-
3. Matsumoto, T.: ‘Artificial irises: importance of vulnerability analysis’. Proc. Asian Biometrics Workshop (AWB), 2004.
-
43)
-
60. de Freitas Pereira, T., Komulainen, J., Anjos, A., et al: ‘Face liveness detection using dynamic texture’, EURASIP J. Image Video Process., 2014, 2, .
-
44)
-
12. Chingovska, I., Yang, J., Lei, Z., et al: ‘The 2nd competition on counter measures to 2D face spoofing attacks’. Proc. IAPR Int. Conf. on Biometrics (ICB), 2013.
-
45)
-
33. Chingovska, I., Anjos, A., Marcel, S.: ‘On the effectiveness of local binary patterns in face anti-spoofing’. Proc. IEEE Int. Conf. of the Biometrics Special Interest Group (BIOSIG), 2012, pp. 1–7.
-
46)
-
55. Johnson, P., Lazarick, R., Marasco, E., Newton, E., Ross, A., Schuckers, S.: ‘Biometric liveness detection: framework and metrics’. Proc. NIST Int. Biometric Performance Conf. (IBPC), 2012.
-
47)
-
41. Sun, Z., Paulino, A.A., Feng, J., Chai, Z., Tan, T., Jain, A.K.: ‘A study of multibiometric traits of identical twins’. Proc. SPIE Biometric Technology for Human Identification (BTHI), 2010.
-
48)
-
37. Peixoto, B., Michelassi, C., Rocha, A.: ‘Face liveness detection under bad illumination conditions’. Proc. IEEE Int. Conf. on Image Processing (ICIP), 2011, pp. 3557–3560.
-
49)
-
49. Russ, T., Koch, K., Little, C.: ‘3D facial recognition: a quantitative analysis’. Annual Meeting of the Institute of Nuclear Materials Management (INMM), 2004.
-
50)
-
38. Vijayan, V., Bowyer, K.W., Flynn, P.J., et al: ‘Twins 3D face recognition challenge’. Proc. IEEE Int. Joint Conf. on Biometrics (IJCB), 2011.
-
51)
-
6. Coli, P.: ‘Vitality detection in personal authentication systems using fingerprints’. , Universita di Cagliari, 2008.
-
52)
-
58. Kollreider, K., Fronthaler, H., Bigun, J.: ‘Non-intrusive liveness detection by face images’, Image Vis. Comput., 2009, 27, pp. 233–244 (doi: 10.1016/j.imavis.2007.05.004).
-
53)
-
34. Kim, Y., Na, J., Yoon, S., Yi, J.: ‘Masked fake face detection using radiance measurements’, J. Opt. Soc. Am., 2009, 26, pp. 760–766 (doi: 10.1364/JOSAA.26.000760).
-
54)
-
9. TABULA RASA: ‘Trusted biometrics under spoofing attacks’, 2010. .
-
55)
-
24. Arora, S.S., Cao, K., Jain, A.K., Paulter, N.G.: ‘3D fingerprint phantoms’. Proc. IEEE Int. Conf. on Pattern Recognition (ICPR), 2014.
-
56)
-
36. Erdogmus, N., Marcel, S.: ‘Spoofing 2D face recognition systems with 3D masks’. Proc. Int. Conf. of the Biometrics Special Interest Group (BIOSIG), 2013.
-
57)
-
35. Erdogmus, N., Marcel, S.: ‘Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect’. Proc. IEEE Biometrics: Theory, Applications and Systems (BTAS), 2013.
-
58)
-
50. Wang, Y., Chua, C.-S.: ‘Robust face recognition from 2D and 3D images using structural Hausdorff distance’, Image Vis. Comput., 2006, 24, pp. 176–185 (doi: 10.1016/j.imavis.2005.09.025).
-
59)
-
46. Cignoni, P., Rocchini, C., Scopigno, R.: ‘Metro: measuring error on simplified surfaces’, Comput. Graph. Forum, 1998, 17, pp. 167–174 (doi: 10.1111/1467-8659.00236).
-
60)
-
20. Kose, N., Dugelay, J.-L.: ‘On the vulnerability of face recognition systems to spoofing mask attacks’. Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), 2013.
-
61)
-
7. Marcel, S., Nixon, M., Li, S.Z. (Eds.): ‘Handbook of biometric anti-spoofing: trusted biometrics under spoofing attacks’ (Springer, London2014).
-
62)
-
61. Maatta, J., Hadid, A., Pietikainen, M.: ‘Face spoofing detection from single images using texture and local shape analysis’, IET Biometrics, 2012, 1, pp. 3–10 (doi: 10.1049/iet-bmt.2011.0009).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2014.0075
Related content
content/journals/10.1049/iet-bmt.2014.0075
pub_keyword,iet_inspecKeyword,pub_concept
6
6