Efficient software attack to multimodal biometric systems and its application to face and iris fusion

In certain applications based on multimodal interaction it may be crucial to determine not only what the user is doing (commands), but who is doing it, in order to prevent fraudulent use of the system. The biometric technology, and particularly the multimodal biometric systems, represent a highly efficient automatic recognition solution for this type of applications. Although multimodal biometric systems have been traditionally regarded as more secure than unimodal systems, their vulnerabilities to spoofing attacks have been recently shown. New fusion techniques have been proposed and their performance thoroughly analysed in an attempt to increase the robustness of multimodal systems to these spoofing attacks. However, the vulnerabilities of multimodal approaches to software-based attacks still remain unexplored. In this work we present the first software attack against multimodal biometric systems. Its performance is tested against a multimodal system based on face and iris, showing the vulnerabilities of the system to this new type of threat. Score quantization is afterwards studied as a possible countermeasure, managing to cancel the effects of the proposed attacking methodology under certain scenarios.

[1]  Yu Liang,et al.  A Method for Face and Iris Feature Fusion in Identity Authentication , 2006 .

[2]  Philip R. Cohen,et al.  MULTIMODAL INTERFACES THAT PROCESS WHAT COMES NATURALLY , 2000 .

[3]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[4]  Patrick J. Flynn,et al.  Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[5]  Zahid Akhtar,et al.  Secure Learning Algorithm for Multimodal Biometric Systems against Spoof Attacks , .

[6]  R. Kent Secrets and lies. , 2007, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[7]  V. Kshirsagar,et al.  Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.

[8]  Libor Masek,et al.  MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .

[9]  Anne Brindle,et al.  Genetic algorithms for function optimization , 1980 .

[10]  John Daugman How iris recognition works , 2004 .

[11]  Bernadette Dorizzi,et al.  Guide to Biometric Reference Systems and Performance Evaluation , 2009 .

[12]  Michael Wagner,et al.  Audio-visual multimodal fusion for biometric person authentication and liveness verification , 2006 .

[13]  Stephanie Schuckers,et al.  Multimodal fusion vulnerability to non-zero effort (spoof) imposters , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[14]  Tieniu Tan,et al.  Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.

[15]  Julian Fiérrez,et al.  Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification , 2011, BIOID.

[16]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[17]  Julian Fiérrez,et al.  An evaluation of indirect attacks and countermeasures in fingerprint verification systems , 2011, Pattern Recognit. Lett..

[18]  Julian Fiérrez,et al.  On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm , 2012, CIARP.

[19]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  FierrezJulian,et al.  Efficient software attack to multimodal biometric systems and its application to face and iris fusion , 2014 .

[21]  Jun-Ying Gan,et al.  Fusion and recognition of face and iris feature based on wavelet feature and KFDA , 2009, 2009 International Conference on Wavelet Analysis and Pattern Recognition.

[22]  Sharon L. Oviatt,et al.  Ten myths of multimodal interaction , 1999, Commun. ACM.

[23]  Sébastien Marcel,et al.  On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..

[24]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[25]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[26]  Umut Uludag,et al.  Secure biometric systems , 2006 .

[27]  A. Adler,et al.  Images can be regenerated from quantized biometric match score data , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[28]  Sharon L. Oviatt,et al.  Toward a theory of organized multimodal integration patterns during human-computer interaction , 2003, ICMI '03.

[29]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[30]  Xiaobo Zhang,et al.  Hierarchical Fusion of Face and Iris for Personal Identification , 2010, 2010 20th International Conference on Pattern Recognition.

[31]  Sharon L. Oviatt,et al.  Taming recognition errors with a multimodal interface , 2000, CACM.

[32]  Julian Fiérrez,et al.  Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.

[33]  Zohreh Mousavinasab,et al.  Biometric Systems , 2013 .

[34]  MarcelSebastien,et al.  On the vulnerability of face verification systems to hill-climbing attacks , 2010 .

[35]  Andreas Uhl,et al.  Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems , 2011, BIOID.

[36]  Julian Fiérrez,et al.  Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..

[37]  Bozhao Tan,et al.  Assessing and reducing spoofing vulnerability for multimodal and fingerprint biometrics , 2009 .

[38]  Alejandro F. Frangi,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. , 2022 .

[39]  John A. Nelder,et al.  A Simplex Method for Function Minimization , 1965, Comput. J..

[40]  Venu Govindaraju,et al.  Robustness of multimodal biometric fusion methods against spoof attacks , 2009, J. Vis. Lang. Comput..

[41]  Tom Gaertner,et al.  Biometric Systems Technology Design And Performance Evaluation , 2016 .

[42]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[43]  Sharon L. Oviatt,et al.  Perceptual user interfaces: multimodal interfaces that process what comes naturally , 2000, CACM.

[44]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[45]  Venu Govindaraju,et al.  Evaluation of biometric spoofing in a multimodal system , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[46]  H. Damasio,et al.  IEEE Transactions on Pattern Analysis and Machine Intelligence: Special Issue on Perceptual Organization in Computer Vision , 1998 .

[47]  James E. Baker,et al.  Reducing Bias and Inefficienry in the Selection Algorithm , 1987, ICGA.