Security evaluation of biometric authentication systems under real spoofing attacks
Top Cited Papers
- 1 January 2012
- journal article
- research article
- Published by Institution of Engineering and Technology (IET) in IET Biometrics
- Vol. 1 (1), 11-24
- https://doi.org/10.1049/iet-bmt.2011.0012
Abstract
Multimodal biometric systems are commonly believed to be more robust to spoofing attacks than unimodal systems, as they combine information coming from different biometric traits. Recent work has shown that multimodal systems can be misled by an impostor even by spoofing only one biometric trait. This result was obtained under a ‘worst-case’ scenario, by assuming that the distribution of fake scores is identical to that of genuine scores (i.e. the attacker is assumed to be able to perfectly replicate a genuine biometric trait). This assumption also allows one to evaluate the robustness of score fusion rules against spoofing attacks, and to design robust fusion rules, without the need of actually fabricating spoofing attacks. However, whether and to what extent the ‘worst-case’ scenario is representative of real spoofing attacks is still an open issue. In this study, we address this issue by an experimental investigation carried out on several data sets including real spoofing attacks, related to a multimodal verification system based on face and fingerprint biometrics. On the one hand, our results confirm that multimodal systems are vulnerable to attacks against a single biometric trait. On the other hand, they show that the ‘worst-case’ scenario can be too pessimistic. This can lead to two conservative choices, if the ‘worst-case’ assumption is used for designing a robust multimodal system. Therefore developing methods for evaluating the robustness of multimodal systems against spoofing attacks, and for designing robust ones, remain a very relevant open issue.Keywords
This publication has 23 references indexed in Scilit:
- An evaluation of indirect attacks and countermeasures in fingerprint verification systemsPattern Recognition Letters, 2011
- On the vulnerability of face verification systems to hill-climbing attacksPattern Recognition, 2009
- Robustness of multimodal biometric fusion methods against spoof attacksJournal of Visual Languages & Computing, 2009
- FINGERPRINT SILICON REPLICAS: STATIC AND DYNAMIC FEATURES FOR VITALITY DETECTION USING AN OPTICAL CAPTURE DEVICEInternational Journal of Image and Graphics, 2008
- Nonlinear Frequency Scaling Algorithm for High Squint Spotlight SAR Data ProcessingEURASIP Journal on Advances in Signal Processing, 2008
- Biometric Template SecurityEURASIP Journal on Advances in Signal Processing, 2008
- Biometrics: A Tool for Information SecurityIEEE Transactions on Information Forensics and Security, 2006
- Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scannersPattern Recognition, 2003
- A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor ModulesLecture Notes in Computer Science, 2003
- An Analysis of Minutiae Matching StrengthLecture Notes in Computer Science, 2001