Spoof Attacks on Multimodal Biometric Systems

被引:0
|
作者
Akhtar, Zahid [1 ]
Kale, Sandeep [2 ]
Alfarid, Nasir [3 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, Cagliari, Italy
[2] Univ Pune, Dept Elect Sci, Pune, Maharashtra, India
[3] Cognizant Technol Solut, Bangalore, Karnataka, India
来源
INFORMATION AND NETWORK TECHNOLOGY | 2011年 / 4卷
关键词
Biometrics; Multimodal biometric system; Score fusion rules; Spoof attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometrics, referred as the science of recognizing an individual based on his or her physical or behavioral traits, has been widely employed as a security system in the awake of latest security issues. However, recent researches have shown that many biometric traits are vulnerable to spoof attacks. In addition, a latest results have questioned that, contrary to a common claim, multimodal systems can be cracked by spoofing only one trait. Those results were obtained using simulated spoof attacks, under the unrealistic assumption that the spoofed and genuine samples are identical, turned out to be the same outputs. We further investigate this significant security issue, focusing on behavior of fixed and trained score fusion rules, using real spoof attack samples under different spoof attack scenarios. Preliminary empirical results on real biometric systems made up of face, fingerprint and iris with twelve score fusion rules confirm that multimodal biometric systems are not intrinsically robust against spoof attacks as believed so far. In particular, most widely used fixed rules can be less robust, even if the quality of fake biometric trait is low. The false acceptance rate increases substantially under spoof attacks which means that an attacker might wrongly get authenticated by spoofing a subset of traits. In all considered spoofing scenarios, we also found that trained rules are more accurate, flexible and robust against spoof attacks as compare to fixed one.
引用
收藏
页码:46 / 51
页数:6
相关论文
共 50 条
  • [41] Multimodal Biometric Recognition using Iris & Fingerprint
    Bharadi, Vinayak Ashok
    Pandya, Bhavesh
    Nemade, Bhushan
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 697 - 702
  • [42] Reliability and Error Probability for Multimodal Biometric System
    Szczepanik, Michal
    Jozwiak, Ireneusz
    INTELLIGENT SYSTEMS IN TECHNICAL AND MEDICAL DIAGNOSTICS, 2014, 230 : 325 - 332
  • [43] SDUMLA-HMT: A Multimodal Biometric Database
    Yin, Yilong
    Liu, Lili
    Sun, Xiwei
    BIOMETRIC RECOGNITION: CCBR 2011, 2011, 7098 : 260 - 268
  • [44] MULTIMODAL ACCESS CONTROL SYSTEMS WHICH COMBINES CLASSICAL ACCESS CONTROL METHODS WITH BIOMETRIC METHODS
    Daniel, David Marius
    Monica, Borda
    2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 261 - 264
  • [45] Face and palmprint multimodal biometric systems using Gabor-Wigner transform as feature extraction
    Saini, Nirmala
    Sinha, Aloka
    PATTERN ANALYSIS AND APPLICATIONS, 2015, 18 (04) : 921 - 932
  • [46] Multimodal face and finger veins biometric authentication
    Razzak, Muhammad Imran
    Yusof, Rubiyah
    Khalid, Marzuki
    SCIENTIFIC RESEARCH AND ESSAYS, 2010, 5 (17): : 2529 - 2534
  • [47] Securing Palmprint Authentication Systems using Spoof Detection Approach
    Kanhangad, Vivek
    Kumar, Abhishek
    SIXTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2013), 2013, 9067
  • [48] Fingerprint Biometric Template Security Schemes: Attacks and Countermeasures
    Mehmood, Reza
    Selwal, Arvind
    PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 455 - 467
  • [49] Multimodal Biometric systems by Fusion of Palmprint and Finger-Knuckle-Print Using Hidden Markov Model
    Meraoumia, Abdallah
    Chitroub, Salim
    Bouridane, Ahmed
    2013 IEEE 20TH INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (ICECS), 2013, : 421 - 424
  • [50] Robust biometric scheme against replay attacks using one-time biometric templates
    Gernot, Tanguy
    Rosenberger, Christophe
    COMPUTERS & SECURITY, 2024, 137