Security of multimodal biometric systems against spoof attacks

作者: Zahid Akhtar Shabbeer Ahmad Momin

DOI:

关键词:

摘要: A biometric system is essentially a pattern recognition being used in ad-versarial environment. Since, like any conventional security exposed to malicious adversaries, who can manipulate data make the ineffective by compromising its integrity. Current theory and de- sign methods of systems do not take into account vulnerability such adversary attacks. Therefore, evaluation classical design an open problem investigate whether they lead secure systems. In order it necessary understand evalu-ate threats thus develop effective countermeasures robust designs, both technical procedural, if necessary. Accordingly, extension of mandatory safeguard reliability adversarial environments. In this thesis, we provide some contributions towards this direction. Among all potential attacks discussed literature, spoof are one main against for identity recognition. Multimodal commonly believed be in-trinsically more than based on single biomet-ric trait, as combine information coming from different traits. However, recent works have question belief shown that multimodal misled attacker (impostor) even spoofing only traits. first detailed review state-of-the-art The scope ofstate-of-the-art results very limited, since were obtained under very restrictive “worst-case” hypothesis, where assumed able fabricate perfect replica trait whose matching score distribu-tion identical genuine Thus, argue validity hypothesis using large set real empirical evidence scenario representa- ixtive attacks: suitability may depend specific algorithm, techniques counterfeit spoofed Then, propose methodology applications, does require fabricating fake traits, allows designer possible qualities traits attackers, exploits impostor samples which col- lected training system. Our evaluates performances simulated attack model distribution takes explicitly degrees quality particular, two models match factors affect particular biometric, sensor, algorithm computation, technique construct biometrics, skills attacker. All these summarized parameter, call “attack strength”. Further, extension our method rank several biometric score fusion rules according their relative robustness This choose most rule prediction. We then present analysis, sets face fingerprints including show proposed good approximation traits’ our method providing adequate estimation security1 also use how evaluate publicly available benchmark data without experimental strongly depends rule, strength eventually evidence, considering fingerprint score fusion capable correct ranking

参考文章(37)
Nimalan Solayappan, Shahram Latifi, A Survey of Unimodal Biometric Methods. Security and Management. pp. 57- 63 ,(2006)
Kevin D. Mitnick, William L. Simon, The Art of Deception: Controlling the Human Element of Security John Wiley & Sons, Inc.. ,(2001)
Guiyu Feng, Kaifeng Dong, Dewen Hu, David Zhang, When faces are combined with palmprints : a novel biometric fusion strategy Lecture Notes in Computer Science. pp. 701- 707 ,(2004) , 10.1007/978-3-540-25948-0_95
Rein-Lien Hsu, Anil K. Jain, Face detection and modeling for recognition Michigan State University. ,(2002)
Gian Luca Marcialis, Aaron Lewicke, Bozhao Tan, Pietro Coli, Dominic Grimberg, Alberto Congiu, Alessandra Tidu, Fabio Roli, Stephanie Schuckers, None, First International Fingerprint Liveness Detection Competition—LivDet 2009 Image Analysis and Processing – ICIAP 2009. ,vol. 5716, pp. 12- 23 ,(2009) , 10.1007/978-3-642-04146-4_4
Karthik Nandakumar, Arun A. Ross, Anil K. Jain, Handbook of Multibiometrics ,(2006)
Mark Ordowski, Mark A. Przybocki, Alvin F. Martin, George R. Doddington, Terri Kamm, The DET Curve in Assessment of Detection Task Performance conference of the international speech communication association. ,(1997)
Nalini K. Ratha, Jonathan H. Connell, Ruud M. Bolle, An Analysis of Minutiae Matching Strength Lecture Notes in Computer Science. pp. 223- 228 ,(2001) , 10.1007/3-540-45344-X_32