Abstract
Biometrics, referred as the science of recognizing a person based on his or her physical or behavioral traits, has been widely accepted and deployed in various applications. However, recent researches show that many biometric traits are susceptible to spoof attacks. Moreover, a recent work showed that, contrary to a common claim, multimodal systems can be broken even if only one trait is spoofed. The result was obtained, using simulated spoofed samples, under the assumption that the spoofed and genuine samples are indistinguishable, which is not true for all biometric traits.We further investigate this security issue, focusing on behavior of fixed and trained score fusion rules, using real spoof attack samples. Preliminary empirical results on real biometric systems made up of face, fingerprint and iris confirm that multimodal biometric systems are not intrinsically robust against spoof attacks as believed so far. In particular, most used fixed rules can be even less robust than trained one. We found that trained rules are not only more flexible and accurate but more robust, also, against spoof attacks as compare to fixed rules.We also empirically observed that multimodal systems are more robust, under spoof attacks, than unimodal biometric systems, robustness increases as the number of matchers being fused increases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial ”gummy” fingers on fingerprint systems. In: Proc. of SPIE Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275–289 (2002)
He, X., Lu, Y., Shi, P.: A Fake Iris Detection Method Based on FFT and Quality Assessment. In: Proc. Chinese Conf. on Pattern Recognition, pp. 316–319 (2008)
Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, Heidelberg (2006)
Rodrigues, R.N., Ling, L.L., Govindaraju, V.: Robustness of multimodal biometric methods against spoof attacks. J. of Visual Languages and Computing 20, 169–179 (2009)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. on Adv. in Sig. Proc., 1–17 (2008)
Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Proceedings of third AVBPA, pp. 223–228 (2001)
Libor Spacek: University of Essex Face Database, http://dces.essex.ac.uk/mv/allfaces/index.html
PolyU HRF Database, http://www.comp.polyu.edu.hk/~biometrics/HRF/HRF.htm
IIT Delhi Iris Database version 1.0, http://web.iitd.ac.in/~biometrics/Database_Iris.htm
Zhang, D., Kanhangad, V., Luo, N., Kumar, A.: Robust Palmprint Verification Using 2D and 3D Features. Pattern Recognition 43(1), 358–368 (2010)
Kim, K.: Face Recognition using Principal Component Analysis. Department of Computer Science. University of Maryland, College Park (2000)
Daugman, J.G.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Suen, C.Y., Lam, L.: Multiple Classifier Combination Methodologies for Different Output Levels. In: Proc. Int. Workshop on Multiple Classifier Systems, pp. 52–66 (2000)
Duda, R., Hart, P., Stork, D.: Pattern Classification. John Wiley Inc., Chichester (2001)
Jain, A.K., Prabhakar, S., Chen, S.: Combining Multiple Matchers for a High Security Fingerprint Verification System. Pattern Recognition Letters 20(11-13), 1371–1379 (1999)
Nandakumar, K., Chen, Y., Dass, S.C., Jain, A.K.: Likelihood Ratio Based Biometric Score Fusion. IEEE Trans. on PAMI 30(2), 342–347 (2008)
Bishop, C.: Neural Networks for Pattern Recognition. Oxford University Press, Oxford (1999)
Poh, N., Bengio, S.: Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks? In: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 893–896 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Akhtar, Z., Kale, S. (2011). Security Analysis of Multimodal Biometric Systems against Spoof Attacks. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_62
Download citation
DOI: https://doi.org/10.1007/978-3-642-22714-1_62
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22713-4
Online ISBN: 978-3-642-22714-1
eBook Packages: Computer ScienceComputer Science (R0)