Learning from biometric distances: Performance and security related issues in face recognition systems

We present a theory for constructing linear, black box approximations to face recognition algorithms and empirically demonstrate that a surprisingly diverse set of face recognition approaches can be approximated well using a linear model. The construction of the linear model to a face recognition algorithm involves embedding of a training set of face images constrained by the distances between them, as computed by the face recognition algorithm being approximated. We accomplish this embedding by iterative majorization, initialized by classical multi-dimensional scaling (MDS). We empirically demonstrate the adequacy of the linear model using six face recognition algorithms, spanning both template based and feature based approaches on standard face recognition benchmarks such as the Facial Recognition Technology (FERET) and Face Recognition Grand Challenge (FRGC) data sets. The experimental results show that the average Error in Modeling for six algorithms is 6.3% at 0.001 False Acceptance Rate (FAR), for FERET fafb probe set which contains maximum number of subjects among all the probe sets. We demonstrate the usefulness of the linear model for algorithm dependent indexing of face databases and find that it results in more than 20 times reduction in face comparisons for Bayesian Intra/Extra-class person classifier (BAY), Elastic Bunch Graph Matching algorithm (EBGM), and the commercial face recognition algorithms. We also propose a novel paradigm to reconstruct face templates from match scores using the linear model and use the reconstructed templates to explore the security breach in a face recognition system. We evaluate the proposed template reconstruction scheme using three, fundamentally different, face recognition algorithms: Principal Component Analysis (PCA), Bayesian Intra/Extra-class person classifier (BAY), and a feature based commercial algorithm. With an operational point set at 1% False Acceptance Rate (FAR) and 99% True Acceptance Rate (TAR) for 1196 enrollments (FERET gallery), we show that at most 600 attempts (score computations) are required to achieve 73%, 72% and 100% chance of breaking in as a randomly chosen target subject for the commercial, BAY and PCA based face recognition system, respectively. We also show that the proposed reconstruction scheme has 47% more probability of breaking in as a randomly chosen target subject for the commercial system as compared to a hill climbing approach with the same number of attempts.

[1]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[2]  Robert P. W. Duin,et al.  A Generalized Kernel Approach to Dissimilarity-based Classification , 2002, J. Mach. Learn. Res..

[3]  Aaron F. Bobick,et al.  Using similarity scores from a small gallery to estimate recognition performance for larger galleries , 2003, 2003 IEEE International SOI Conference. Proceedings (Cat. No.03CH37443).

[4]  Marian Stewart Bartlett,et al.  Face image analysis by unsupervised learning , 2001 .

[5]  Trevor F. Cox,et al.  Metric multidimensional scaling , 2000 .

[6]  Qiang Ji,et al.  Modeling and Predicting Face Recognition System Performance Based on Analysis of Similarity Scores , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[7]  Daniel P. Lopresti,et al.  The Effectiveness of Generative Attacks on an Online Handwriting Biometric , 2005, AVBPA.

[8]  Robert P. W. Duin,et al.  The Dissimilarity Representation for Pattern Recognition - Foundations and Applications , 2005, Series in Machine Perception and Artificial Intelligence.

[9]  Dario Maio,et al.  Fake Fingerprint Detection by Odor Analysis , 2006, ICB.

[10]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[11]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[12]  Dario Maio,et al.  Synthetic fingerprint-image generation , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[13]  R. Pearl Biometrics , 1914, The American Naturalist.

[14]  Chris J. Hill,et al.  Risk of Masquerade Arising from the Storage of Biometrics , 2001 .

[15]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[16]  Joachim M. Buhmann,et al.  Optimal Cluster Preserving Embedding of Nonmetric Proximity Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  Alice J. O'Toole,et al.  Face Recognition Algorithms Surpass Humans Matching Faces Over Changes in Illumination , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[18]  A. Adler,et al.  Images can be regenerated from quantized biometric match score data , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[19]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[20]  Loris Nanni,et al.  A two-stage fingerprint classification system , 2003, WBMA '03.

[21]  Ivor W. Tsang,et al.  Distance metric learning with kernels , 2003 .

[22]  Pierre Comon,et al.  Independent component analysis, A new concept? , 1994, Signal Process..

[23]  Sudeep Sarkar,et al.  From Scores to Face Templates: A Model-Based Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[24]  Bir Bhanu,et al.  Predicting Performance of Object Recognition , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[25]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[26]  Bruce A. Draper,et al.  The CSU Face Identification Evaluation System , 2005, Machine Vision and Applications.

[27]  Golan Yona,et al.  Distributional Scaling: An Algorithm for Structure-Preserving Embedding of Metric and Nonmetric Spaces , 2004, J. Mach. Learn. Res..

[28]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[29]  Kilian Q. Weinberger,et al.  Unsupervised Learning of Image Manifolds by Semidefinite Programming , 2004, CVPR.

[30]  Raj Nanavati,et al.  Biometrics: Identity Verification in a Networked World , 2002 .

[31]  Marian Stewart Bartlett,et al.  Face recognition by independent component analysis , 2002, IEEE Trans. Neural Networks.

[32]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[33]  Kaizhong Zhang,et al.  MetricMap: an embedding technique for processing distance-based queries in metric spaces , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[34]  Jean-Jacques Quisquater,et al.  Biometrics, Access Control, Smart Cards: A not so Simple Combination , 2000, CARDIS.

[35]  J. Tenenbaum,et al.  A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.

[36]  Vytautas Perlibakas,et al.  Distance measures for PCA-based face recognition , 2004, Pattern Recognit. Lett..

[37]  Yajie Tian,et al.  Handbook of face recognition , 2003 .

[38]  P. Groenen,et al.  Modern multidimensional scaling , 1996 .

[39]  J. Gower,et al.  Metric and Euclidean properties of dissimilarity coefficients , 1986 .

[40]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[41]  Patrick J. Flynn,et al.  Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[42]  Norbert Krüger,et al.  Face Recognition by Elastic Bunch Graph Matching , 1997, CAIP.

[43]  Julia Hirschberg,et al.  Predicting Automatic Speech Recognition Performance Using Prosodic Cues , 2000, ANLP.

[44]  S T Roweis,et al.  Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.

[45]  Zhihua Zhang,et al.  Learning Metrics via Discriminant Kernels and Multidimensional Scaling: Toward Expected Euclidean Representation , 2003, ICML.

[46]  P. Comon Independent Component Analysis , 1992 .

[47]  Colin Soutar Implementation of Biometric Systems - Security and Privacy Considerations , 2002, Inf. Secur. Tech. Rep..

[48]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[49]  Ton Kalker,et al.  Security analysis for biometric data in ID documents , 2005, IS&T/SPIE Electronic Imaging.

[50]  Alex Pentland,et al.  Beyond eigenfaces: probabilistic matching for face recognition , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.

[51]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[52]  Rong Wang,et al.  Learning models for predicting recognition performance , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[53]  Seong G. Kong,et al.  Recent advances in visual and infrared face recognition - a review , 2005, Comput. Vis. Image Underst..

[54]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[55]  Thorsten Joachims,et al.  Learning a Distance Metric from Relative Comparisons , 2003, NIPS.

[56]  Bruce A. Draper,et al.  Analyzing PCA-based Face Recognition Algorithms: Eigenvector Selection and Distance Measures , 2003 .

[57]  Michael I. Jordan,et al.  Distance Metric Learning with Application to Clustering with Side-Information , 2002, NIPS.

[58]  Marios Savvides,et al.  Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[59]  Alice J. O'Toole,et al.  Face Recognition Algorithms surpass humans matching faces across changes in illumination | NIST , 2007 .

[60]  Sudeep Sarkar,et al.  Designing A.ne Transformations based Face Recognition Algorithms , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.

[61]  P. Jonathon Phillips,et al.  Models of large population recognition performance , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..

[62]  Anil K. Jain,et al.  A Real-Time Matching System for Large Fingerprint Databases , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[63]  Venu Govindaraju,et al.  Efficient search and retrieval in biometric databases , 2005, SPIE Defense + Commercial Sensing.

[64]  Harry Wechsler,et al.  The FERET database and evaluation procedure for face-recognition algorithms , 1998, Image Vis. Comput..