Skip to main content

Multimodal Anti-spoofing in Biometric Recognition Systems

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Abstract

While multimodal biometric systems were commonly believed to be intrinsically more robust to spoof attacks than unimodal systems, recent results provided clear evidence that they can be evaded by spoofing a single biometric trait. This pointed out that also multimodal systems require specific anti-spoofing measures. In this chapter, we introduce the issue of multimodal anti-spoofing, and give an overview of state-of-the-art anti-spoofing measures. Such measures mainly consist of developing ad hoc score fusion rules that are based on assumptions about the match score distribution produced by fake biometric traits. We discuss the pros and cons of existing measures, and point out the current challenges in multimodal anti-spoofing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Also the LR rule and similar ones can be referred to as trained rules, as they require the estimation of likelihoods.

  2. 2.

    In [9] quality measures of the biometric samples in each modality were also considered. For the sake of simplicity we do not include them in our description.

  3. 3.

    The clients of a chimerical dataset are usually referred to as “virtual” clients, since they do not correspond to a real person or identity. They are indeed created by randomly associating the biometric traits of different “real” clients.

  4. 4.

    http://www.nist.gov/itl/iad/ig/nbis.cfm

  5. 5.

    http://www.neurotechnology.com/verifinger.html

  6. 6.

    http://www.cs.colostate.edu/evalfacerec/algorithms5.php

  7. 7.

    http://www.tabularasa-euproject.org/

References

  1. Marcialis GL, Coli P, Roli F (2012) Fingerprint liveness detection based on fake finger characteristics. Int J Digital Crime Forensics (IJDCF) 4(3):1–19

    Article  Google Scholar 

  2. Ghiani L, Marcialis GL, Roli F (2012) Fingerprint liveness detection by local phase quantization. In: International conference pattern record (ICPR), IEEE pp 537–540.

    Google Scholar 

  3. Ghiani L, Marcialis GL, Roli F (2012) Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms. Proceedings of 14th ACM workshop on multimedia and security (MMSec). ACM, Coventry, UK, pp 157–164

    Google Scholar 

  4. Marasco E, Sansone C (2012) Combining perspiration- and morphology-based static features for fingerprint liveness detection. Pattern Recogn Lett 33(9):1148–1156

    Article  Google Scholar 

  5. Abhyankar A, Schuckers SAC (2009) Integrating a wavelet based perspiration liveness check with fingerprint recognition. Pattern Recogn 42(3):452–464

    Article  MATH  Google Scholar 

  6. Marasco E, Ding Y, Ross A (2012) Combining match scores with liveness values in a fingerprint verification system. In: Proceedings of IEEE 5th International conference biometrics: theory, applications and systems (BTAS), Washington DC (USA).

    Google Scholar 

  7. Marasco E, Johnson PA, Sansone C, Schuckers SAC (2011) Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism. In: Sansone C, Kittler J, Roli F (eds) Proceedings of the 10th International workshop multiple classifier systems (MCS), LNCS, vol 6713, pp 309–318. Springer, Naples, Italy

    Google Scholar 

  8. Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics. Springer Publishers, New York

    Google Scholar 

  9. Rodrigues RN, Ling LL, Govindaraju V (2009) Robustness of multimodal biometric fusion methods against spoof attacks. J Vis Lang Comput 20(3):169–179

    Article  Google Scholar 

  10. Rodrigues RN, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system. In: International conference biometrics: theory applications and systems (BTAS), pp 1–5.

    Google Scholar 

  11. Biggio B, Akhtar Z, Fumera G, Marcialis G, Roli F (2012) Security evaluation of biometric authentication systems under real spoofing attacks. IET Biometrics 1:11–24

    Article  Google Scholar 

  12. Johnson P, Tan B, Schuckers S (2010) Multimodal fusion vulnerability to non-zero effort (spoof) imposters. In: IEEE International workshop on information forensics and security (WIFS), pp 1–5.

    Google Scholar 

  13. Jain AK, Ross A (2004) Multibiometric systems. Commun ACM 47(1):34–40

    Article  Google Scholar 

  14. Jain AK, Ross A, Pankanti S, Member S (2006) Biometrics: A tool for information security. IEEE Trans Inf Forensics Secur 1:125–143

    Article  Google Scholar 

  15. Ross A (2007) An introduction to multibiometrics. Proceedings of 15th european signal processing conference (EUSIPCO 2007). Poznan, Poland, pp 20–24

    Google Scholar 

  16. Marcialis GL, Lewicke A, Tan B, Coli P, Grimberg D, Congiu A, Tidu A, Roli F, Schuckers SAC (2009) 1st International fingerprint liveness detection competition—LivDet (2009) In: Foggia P, Sansone C, Vento M (eds) Proceedings of 15th International conference image analysis and processing (ICIAP), LNCS, vol 5716, pp 12–23 . Springer, Vietri sul Mare, Italy

    Google Scholar 

  17. Adler A, Schuckers SAC (2009) Security and liveness, overview. In: Li SZ, Jain AK (eds) Encycl Biometrics. Springer, US, pp 1146–1152

    Google Scholar 

  18. Biggio B, Akhtar Z, Fumera G, Marcialis GL, Roli F (2011) Robustness of multi-modal biometric verification systems under realistic spoofing attacks. In: Ross A, Prabhakar S, Kim J (eds) Jain AK. International joint conference on biometrics (IJCB), IEEE, pp 1–6

    Google Scholar 

  19. Akhtar Z, Biggio B, Fumera G, Marcialis G (2011) Robustness of multi-modal biometric systems under realistic spoof attacks against all traits. Proceedings of IEEE workshop on biometric measurements and systems for security and medical applications (BioMS 2011). Milan, Italy, pp 5–10

    Google Scholar 

  20. Akhtar Z, Fumera G, Marcialis G, Roli F (2012) Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: Proceedings of IEEE 5th International conference biometrics: theory, applications and systems (BTAS), Washington DC, USA, pp 283–288.

    Google Scholar 

  21. Akhtar Z, Fumera G, Marcialis G, Roli F (2011) Evaluation of multimodal biometric score fusion rules under spoof attacks. Proceedings of 5th IEEE/IAPR International conference biometrics (ICB). New Delhi, India, pp 402–407

    Google Scholar 

  22. Biggio B, Fumera G, Roli F (2011) Design of robust classifiers for adversarial environments. In: IEEE International conference on systems, Man, and Cybernetics (SMC), pp 977–982.

    Google Scholar 

  23. Yambay D, Ghiani L, Denti P, Marcialis GL, Roli F, Schuckers S (2012) LivDet2011 - Fingerprint liveness detection competition 2011. In: 5th International conference biometrics (ICB).

    Google Scholar 

  24. Coli P, Marcialis GL, Roli F (2007) Vitality detection from fingerprint images: a critical survey. In: Lee SW, Li SZ (eds) Proceedings of international conference biometrics (ICB), LNCS, vol 4642., SpringerSeoul, Korea, pp 722–731

    Google Scholar 

  25. Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: International joint conference on biometrics (IJCB).

    Google Scholar 

  26. Chakka MM, Anjos A, Marcel S, Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F, Yan J, Yi D, Lei Z, Zhang Z, Li ZS, Schwartz WR, Rocha A, Pedrini H, Lorenzo-Navarro J, Castrillón-Santana M, Maatta J, Hadid A, Pietikainen M (2011) Competition on counter measures to 2-D facial spoofing attacks. In: Proceedings of IAPR IEEE International joint conference on biometrics (IJCB). Washington DC, USA.

    Google Scholar 

  27. Zhang Z, Yi D, Lei Z, Li SZ (2011) Face liveness detection by learning multispectral reflectance distributions. In: International conference automatic face and gesture recognition, pp 436–441.

    Google Scholar 

  28. Akhtar Z, Fumera G, Marcialis G, Roli F (2011) Robustness evaluation of biometric systems under spoof attacks. In: Maino G, Foresti G (eds) International Conference on Image Analysis and Processing (ICIAP), LNCS, vol 6978, pp 159–168. Springer, Berlin

    Google Scholar 

  29. Biggio, B., Fumera, G., Roli, F.: Security evaluation of pattern classifiers under attack. IEEE Transactions on Knowledge and Data Engineering 99(PrePrints), 1 (2013).

    Google Scholar 

Download references

Acknowledgments

This work has been partly supported by the TABULA RASA project, 7th Framework Research Programme of the European Union (EU), grant agreement number: 257289; by the project CRP-18293 funded by Regione Autonoma della Sardegna (RAS), L.R. 7/2007, Bando 2009; and by a grant awarded to B. Biggio by RAS, PO Sardegna FSE 2007-2013, L.R. 7/2007 “Promotion of the scientific research and technological innovation in Sardinia.”

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giorgio Fumera .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Fumera, G., Marcialis, G.L., Biggio, B., Roli, F., Schuckers, S.C. (2014). Multimodal Anti-spoofing in Biometric Recognition Systems. In: Marcel, S., Nixon, M., Li, S. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, London. https://doi.org/10.1007/978-1-4471-6524-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6524-8_9

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6523-1

  • Online ISBN: 978-1-4471-6524-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics