Skip to main content

Security Analysis of Multimodal Biometric Systems against Spoof Attacks

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 191))

Included in the following conference series:

Abstract

Biometrics, referred as the science of recognizing a person based on his or her physical or behavioral traits, has been widely accepted and deployed in various applications. However, recent researches show that many biometric traits are susceptible to spoof attacks. Moreover, a recent work showed that, contrary to a common claim, multimodal systems can be broken even if only one trait is spoofed. The result was obtained, using simulated spoofed samples, under the assumption that the spoofed and genuine samples are indistinguishable, which is not true for all biometric traits.We further investigate this security issue, focusing on behavior of fixed and trained score fusion rules, using real spoof attack samples. Preliminary empirical results on real biometric systems made up of face, fingerprint and iris confirm that multimodal biometric systems are not intrinsically robust against spoof attacks as believed so far. In particular, most used fixed rules can be even less robust than trained one. We found that trained rules are not only more flexible and accurate but more robust, also, against spoof attacks as compare to fixed rules.We also empirically observed that multimodal systems are more robust, under spoof attacks, than unimodal biometric systems, robustness increases as the number of matchers being fused increases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial ”gummy” fingers on fingerprint systems. In: Proc. of SPIE Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275–289 (2002)

    Google Scholar 

  2. He, X., Lu, Y., Shi, P.: A Fake Iris Detection Method Based on FFT and Quality Assessment. In: Proc. Chinese Conf. on Pattern Recognition, pp. 316–319 (2008)

    Google Scholar 

  3. Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, Heidelberg (2006)

    Google Scholar 

  4. Rodrigues, R.N., Ling, L.L., Govindaraju, V.: Robustness of multimodal biometric methods against spoof attacks. J. of Visual Languages and Computing 20, 169–179 (2009)

    Article  Google Scholar 

  5. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. on Adv. in Sig. Proc., 1–17 (2008)

    Google Scholar 

  6. Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Proceedings of third AVBPA, pp. 223–228 (2001)

    Google Scholar 

  7. Libor Spacek: University of Essex Face Database, http://dces.essex.ac.uk/mv/allfaces/index.html

  8. PolyU HRF Database, http://www.comp.polyu.edu.hk/~biometrics/HRF/HRF.htm

  9. IIT Delhi Iris Database version 1.0, http://web.iitd.ac.in/~biometrics/Database_Iris.htm

  10. Zhang, D., Kanhangad, V., Luo, N., Kumar, A.: Robust Palmprint Verification Using 2D and 3D Features. Pattern Recognition 43(1), 358–368 (2010)

    Article  MATH  Google Scholar 

  11. Kim, K.: Face Recognition using Principal Component Analysis. Department of Computer Science. University of Maryland, College Park (2000)

    Google Scholar 

  12. Daugman, J.G.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)

    Article  Google Scholar 

  13. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  14. Suen, C.Y., Lam, L.: Multiple Classifier Combination Methodologies for Different Output Levels. In: Proc. Int. Workshop on Multiple Classifier Systems, pp. 52–66 (2000)

    Google Scholar 

  15. Duda, R., Hart, P., Stork, D.: Pattern Classification. John Wiley Inc., Chichester (2001)

    MATH  Google Scholar 

  16. Jain, A.K., Prabhakar, S., Chen, S.: Combining Multiple Matchers for a High Security Fingerprint Verification System. Pattern Recognition Letters 20(11-13), 1371–1379 (1999)

    Article  Google Scholar 

  17. Nandakumar, K., Chen, Y., Dass, S.C., Jain, A.K.: Likelihood Ratio Based Biometric Score Fusion. IEEE Trans. on PAMI 30(2), 342–347 (2008)

    Article  Google Scholar 

  18. Bishop, C.: Neural Networks for Pattern Recognition. Oxford University Press, Oxford (1999)

    MATH  Google Scholar 

  19. Poh, N., Bengio, S.: Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks? In: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 893–896 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Akhtar, Z., Kale, S. (2011). Security Analysis of Multimodal Biometric Systems against Spoof Attacks. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22714-1_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22713-4

  • Online ISBN: 978-3-642-22714-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics