Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Measuring and mitigating targeted biometric impersonation

This study is concerned with the reliability of biometric verification systems when used in forensic applications. In particular, when such systems are subjected to targeted impersonation attacks. The authors expand on the existing work in targeted impersonation, focusing on how best to measure the reliability of verification systems in forensic contexts. It identifies two scenarios in which targeted impersonation effects may occur: (i) the forensic investigation of criminal activity involving identity theft; and (ii) implicit targeting as a result of the forensic investigation process. Also, the first partial countermeasure to such attacks is presented. The countermeasure uses client-specific Z-score normalisation to provide a more consistent false acceptance rate across all enrolled subjects. This reduces the effectiveness of targeted impersonation without impairing the systems accuracy under random zero-effort attacks.

References

    1. 1)
      • 21. Anjos, A., Marcel, S.: ‘Scoretoolkit documentation’. IDIAP Technical Report, 2012.
    2. 2)
      • 14. Houck, M.M.: ‘CSI the reality’ (Scientific American, 2006).
    3. 3)
      • 16. Phillips, P., Beveridge, J., Draper, B., et al: ‘An introduction to the good, the bad & the ugly face recognition challenge problem’. Int. Conf. Face Gesture, 2011, pp. 346353.
    4. 4)
      • 12. Martin, A., Przybocki, M., Doddington, G., Liggett, W., Reynolds, D.: ‘Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation’. Int. Conf. Spoken Language Processing, 1998.
    5. 5)
      • 4. Bustard, J.D., Carter, J.N., Nixon, M.S.: ‘Targeted biometric impersonation’, Int. Work. Biometrics Forensics, 2013, 1, pp. 14.
    6. 6)
      • 5. Hadid, A., Ghahramani, M., Kellokumpu, V., Pietikainen, M., Bustard, J., Nixon, M.: ‘Can gait biometrics be spoofed?’. Int. Conf. Pattern Recognition, 2012, pp. 32803283.
    7. 7)
    8. 8)
      • 15. Phillips, P.J., Beveridge, J.R., Draper, B.A., et al: ‘An introduction to the good, the bad, & the ugly face recognition challenge problem’. 2011 IEEE Int. Conf. Automatic Face Gesture Recognition and Workshops (FG 2011), 2011, pp. 346353.
    9. 9)
      • 20. Plenty of fish dating website’, http://www.plentyoffish.com.
    10. 10)
      • 21. Anjos, A., Marcel, S.: ‘Scoretoolkit documentation’. IDIAP Technical Report, 2012.
    11. 11)
      • 3. Morphotrust investigative solutions’, http://www.morphotrust.com/pages/1010-investigation.
    12. 12)
    13. 13)
      • 11. Matsumoto, H., Matsumoto, T., Yamada, K., Hoshino, S.: ‘Impact of artificial gummy fingers on fingerprint systems’. SPIE Optical Security and Counterfeit Deterrence Techniques IV, 2002, vol. 4677, pp. 275289.
    14. 14)
    15. 15)
      • 7. Jain, A.K., Li, S.Z.: ‘Handbook of face recognition’ (Springer, Secaucus, NJ, USA, 2005).
    16. 16)
      • 18. Klum, S., Jain, A., Burge, M., Klontz, J., Klare, B.: ‘Open source biometric recognition’. Int. Conf. Biometrics: Theory, Applications and Systems, 2013.
    17. 17)
    18. 18)
      • 17. Beveridge, J.R., Scruggs, W.T., OToole, A.J., et al: ‘Overview of the multiple biometrics grand challenge’. Int. Conf. Advances in Biometrics, 2009, pp. 705714.
    19. 19)
      • 1. Jain, A.K., Flynn, P., Ross, A.A.: ‘Handbook of biometrics’ (Springer, Secaucus, NJ, USA, 2007).
    20. 20)
      • 13. BBC news: Interpol puts Dubai killing suspects on wanted list’, http://news.bbc.co.uk/1/hi/world/middle_east/8522595.stm.
    21. 21)
      • 2. Nickell, J., Fischer, J.F.: ‘Crime science: methods of forensic detection’ (University Press of Kentucky, 1999).
    22. 22)
      • 19. Moon, H., Phillips, P.: ‘The FERET verification testing protocol for face recognition algorithms’. Int. Conf. Automatic Face and Gesture Recognition, 1998, pp. 4853.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2013.0054
Loading

Related content

content/journals/10.1049/iet-bmt.2013.0054
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address