Efficient software attack to multimodal biometric systems and its application to face and iris fusion

被引:30
作者
Gomez-Barrero, Marta [1 ]
Galbally, Javier [1 ]
Fierrez, Julian [1 ]
机构
[1] Univ Autonoma Madrid, Biometr Recognit Grp ATVS, EPS, E-28049 Madrid, Spain
关键词
Multimodal system; Security; Vulnerabilities; Hill-climbing; Countermeasures;
D O I
10.1016/j.patrec.2013.04.029
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In certain applications based on multimodal interaction it may be crucial to determine not only what the user is doing (commands), but who is doing it, in order to prevent fraudulent use of the system. The biometric technology, and particularly the multimodal biometric systems, represent a highly efficient automatic recognition solution for this type of applications. Although multimodal biometric systems have been traditionally regarded as more secure than unimodal systems, their vulnerabilities to spoofing attacks have been recently shown. New fusion techniques have been proposed and their performance thoroughly analysed in an attempt to increase the robustness of multimodal systems to these spoofing attacks. However, the vulnerabilities of multimodal approaches to software-based attacks still remain unexplored. In this work we present the first software attack against multimodal biometric systems. Its performance is tested against a multimodal system based on face and iris, showing the vulnerabilities of the system to this new type of threat. Score quantization is afterwards studied as a possible countermeasure, managing to cancel the effects of the proposed attacking methodology under certain scenarios. (C) 2013 Elsevier B.V. All rights reserved,
引用
收藏
页码:243 / 253
页数:11
相关论文
共 44 条
[1]  
2001, 2001, X9842001 ANSI
[2]  
Adler A., 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), P469, DOI 10.1109/CCECE.2004.1345057
[3]  
Akhtar Z, 2011, INT PROC COMPUT SCI, V4, P46
[4]  
Akhtar Z, 2011, INT PROC COMPUT SCI, V4, P52
[5]  
[Anonymous], 1981, Ph.D. Thesis
[6]  
[Anonymous], 2005, Biometric Systems: Technology, Design and Performance Evaluation
[7]  
[Anonymous], 1883, J SCI MILITAIRES
[8]  
Baker J. E., 1987, Genetic Algorithms and their Applications: Proceedings of the Second International Conference on Genetic Algorithms, P14
[9]  
Chetty G, 2005, P NICTA HCSNET MULT
[10]   How iris recognition works [J].
Daugman, J .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) :21-30