© The Institution of Engineering and Technology
Multimodal biometric systems are commonly believed to be more robust to spoofing attacks than unimodal systems, as they combine information coming from different biometric traits. Recent work has shown that multimodal systems can be misled by an impostor even by spoofing only one biometric trait. This result was obtained under a ‘worst-case’ scenario, by assuming that the distribution of fake scores is identical to that of genuine scores (i.e. the attacker is assumed to be able to perfectly replicate a genuine biometric trait). This assumption also allows one to evaluate the robustness of score fusion rules against spoofing attacks, and to design robust fusion rules, without the need of actually fabricating spoofing attacks. However, whether and to what extent the ‘worst-case’ scenario is representative of real spoofing attacks is still an open issue. In this study, we address this issue by an experimental investigation carried out on several data sets including real spoofing attacks, related to a multimodal verification system based on face and fingerprint biometrics. On the one hand, our results confirm that multimodal systems are vulnerable to attacks against a single biometric trait. On the other hand, they show that the ‘worst-case’ scenario can be too pessimistic. This can lead to two conservative choices, if the ‘worst-case’ assumption is used for designing a robust multimodal system. Therefore developing methods for evaluating the robustness of multimodal systems against spoofing attacks, and for designing robust ones, remain a very relevant open issue.
References
-
-
1)
-
Chakka, M.M., Anjos, A., Marcel, S.: `Competition on counter measures to 2-D facial spoofing attacks', Int. Joint Conf. on Biometrics (IJCB), 2011, p. 1–6.
-
2)
-
Anjos, A., Marcel, S.: `Counter-measures to photo attacks in face recognition: a public database and a baseline', Int. Joint Conf. on Biometrics (IJCB), 2011, p. 1–7.
-
3)
-
A.K. Jain ,
A. Ross ,
S. Pankanti
.
Biometrics: a tool for information security.
IEEE Trans. Inf. Forensics Sec.
,
125 -
143
-
4)
-
Akhtar, Z., Fumera, G., Marcialis, G.L., Roli, F.: `Evaluation of multimodal biometric score fusion rules under spoof attacks', Fifth Int. Conf. on Biometrics (ICB), 2012, 1–6.
-
5)
-
B. Geller ,
J. Almog ,
P. Margot ,
E. Springer
.
A chronological review of fingerprint forgery.
J. Forensic Sci.
,
5 ,
963 -
968
-
6)
-
J. Galbally ,
C. McCool ,
J. Fierrez ,
S. Marcel ,
J. Ortega-Garcia
.
On the vulnerability of face verification systems to hill-climbing attacks.
Pattern Recognit.
,
3 ,
1027 -
1038
-
7)
-
Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: `Face liveness detection by learning multispectral reflectance distributions', Int. Conf. on Automatic Face and Gesture Recognition, 2011, p. 436–441.
-
8)
-
L. Thalheim ,
J. Krissler
.
Body check: biometric access protection devices and their programs put to the test.
Comput. Mag.
,
114 -
121
-
9)
-
Rodrigues, R.N., Kamat, N., Govindaraju, V.: `Evaluation of biometric spoofing in a multimodal system', Int. Conf. Biometrics: Theory Applications and Systems (BTAS), 2010, p. 1–5.
-
10)
-
M. Martinez-Diaz ,
J. Fierrez ,
J. Galbally ,
J. Ortega-Garcia
.
An evaluation of indirect attacks and countermeasures in fingerprint verification systems.
Pattern Recognit. Lett.
,
12 ,
1643 -
1651
-
11)
-
A. Godil ,
S. Ressler ,
P. Grother
.
Face recognition using 3D facial shape and color map information: comparison and combination.
Proc. SPIE Biometric Technol. Hum. Identif., SPIE
,
351 -
361
-
12)
-
Yambay, D., Ghiani, L., Denti, P., Marcialis, G.L., Roli, F., Schuckers, S.: `LivDet2011 – fingerprint liveness detection competition 2011', Fifth Int. Conf. on Biometrics (ICB), 2012, p. 1–6.
-
13)
-
Adler, A.: `Vulnerabilities in biometric encryption systems', Fifth Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA), 2005, p. 1100–1109, (LNCS, 3546).
-
14)
-
Akhtar, Z., Biggio, B., Fumera, G., Marcialis, G.L.: `Robustness of multi-modal biometric systems under realistic spoof attacks against all traits', IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), 2011, p. 5–10.
-
15)
-
S.A. Cole
.
(2001)
Suspect identities – a history of fingerprinting and criminal identification.
-
16)
-
Biggio, B., Akhtar, Z., Fumera, G., Marcialis, G.L., Roli, F.: `Robustness of multi-modal biometric verification systems under realistic spoofing attacks', Int. Joint Conf. on Biometrics (IJCB), 2011, p. 1–6.
-
17)
-
Uludag, U., Jain, A.K.: `Attacks on biometric systems: A case study in fingerprints', Proc. SPIE – EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, 2004, p. 622–633.
-
18)
-
He, X., Lu, Y., Shi, P.: `A fake iris detection method based on fft and quality assessment', Chinese Conf. on Pattern Recognition, 2008, p. 316–319.
-
19)
-
Putte, T., Keuning, J.: `Biometrical fingerprint recognition: Don't get your fingers burned', Fourth Working Conf. on Smart Card Research and Advanced Applications, 2000, p. 289–303.
-
20)
-
J. Li ,
Y. Wang ,
T. Tan ,
A.K. Jain
.
Live face detection based on the analysis of fourier spectra.
Proc SPIE – Biometr. Technol. Hum. Identif.
,
296 -
303
-
21)
-
N.K. Ratha ,
J.H. Connell ,
R.M. Bolle
.
(2001)
An analysis of minutiae matching strength’, Proc. Third Int. Conf. Audio- and Video-Based Biometric Person Authentication (AVBPA).
-
22)
-
A.K. Jain ,
K. Nandakumar ,
A. Nagar
.
Biometric template security.
EURASIP J. Adv. Signal Process
,
1 -
17
-
23)
-
R.N. Rodrigues ,
L.L. Ling ,
V. Govindaraju
.
Robustness of multimodal biometric fusion methods against spoof attacks.
J. Vis. Lang. Comput.
,
3 ,
169 -
179
-
24)
-
Johnson, P., Tan, B., Schuckers, S.: `Multimodal fusion vulnerability to non-zero effort (spoof) imposters', IEEE Int. Workshop on Information Forensics and Security (WIFS), December 2010, p. 1–5.
-
25)
-
Marcialis, G.L., Lewicke, A., Tan, B.: `First Int'l fingerprint liveness detection competition – LivDet 2009', 15thInt. Conf. Image Analysis and Processing (ICIAP), 2009, p. 12–23, (LNC, 5716).
-
26)
-
T. Matsumoto ,
H. Matsumoto ,
K. Yamada ,
S. Hoshino
.
Impact of artificial “gummy” fingers on fingerprint systems.
Proc. SPIE – Opt. Sec. Counterfeit Deterrence Tech. IV
,
275 -
289
-
27)
-
Kollreider, K., Fronthaler, H., Bigun, J.: `Verifying liveness by multiple experts in face biometrics', IEEE Computer Vision and Pattern Recognition Workshop on Biometrics, 2008, p. 1–6.
-
28)
-
R. Derakhshani ,
S.A.C. Schuckers ,
L.A. Hornak ,
L.O. Gorman
.
Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners.
Pattern Recognit.
,
2 ,
383 -
396
-
29)
-
Kang, H., Lee, B., Kim, H., Shin, D., Kim, J.: `A study on performance evaluation of the liveness detection for various fingerprint sensor modules', Seventh Int. Conf. on Knowledge-Based Intelligent Information and Engineering Systems, 2003, p. 1245–1253.
-
30)
-
Coli, P., Marcialis, G.L., Roli, F.: `Vitality detection from fingerprint images: a critical survey', Int. Conf. on Biometrics (ICB), 2007, p. 722–731.
-
31)
-
P. Coli ,
G.L. Marcialis ,
F. Roli
.
Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device.
Int. J. Image Graph.
,
495 -
512
-
32)
-
Galbally, J., Cappelli, R., Lumini, A., Maltoni, D., Fierrez, J.: `Fake fingertip generation from a minutiae template', Int. Conf. on Pattern Recognition (ICPR), 2008, p. 1–4.
-
33)
-
J. Chirillo ,
S. Blaul
.
(2003)
Implementing biometric security.
-
34)
-
A.A. Ross ,
K. Nandakumar ,
A.K. Jain
.
(2006)
Handbook of multibiometrics.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2011.0012
Related content
content/journals/10.1049/iet-bmt.2011.0012
pub_keyword,iet_inspecKeyword,pub_concept
6
6