Biometric Anti-spoofing Technique Using Randomized 3D Multi-Modal Traits

Despite their advantages over password-based and token-based authentication, Biometric Authentication Systems (BAS) are not perfect. They are particularly vulnerable to spoofing, also called Suspicious Presentation (SP) attacks whereby an impostor presents a fake trait to the biometric scanner during verification. Spoofing has a critical impact on system security leading to a trust deficit on biometric systems with weak anti-spoofing mechanisms. Mitigating biometric spoofing is a possibility, hence several techniques have evolved in recent times including multi-biometrics, biometric cryptography and Liveness Detection (LD) also called Suspicious Presentation Detection (SPD). Unfortunately, nearly all known LD techniques exhibit a fundamental set of flaws – they are mostly uni-modal, easily predictable by a well-equipped impostor, and can be circumvented by well-crafted SP attacks. This paper presents the Multi-Modal Random Trait Biometric Liveness Detection System (MMRTBLDS) framework, as an alternative approach that implements LD using multiple traits each acquired from separate modalities of the same subject combined in a randomized manner. The strength of the framework lays in the impostor’s inability to accurately predict the exact set of randomized trait parameter combinations in advance of LD. The framework employs a 3D simulation of fifteen liveness parameters, composed of three each from finger, face and iris traits, based on random number generation. Simulation results obtained using 125 distinct randomized combinations show significant improvements in biometric authentication security with a system efficiency of 99.2%.

[1]  Manish Thakker,et al.  Biometric Recognition Techniques: A Review , 2012 .

[2]  Shashank Pujari,et al.  Fingerprint Based Attendance System Using Microcontroller and LabView , 2015 .

[3]  Sumit Chabbra,et al.  Applications of Swarm Intelligence inBiometrics systems , 2014 .

[4]  G. Hemantha Kumar,et al.  A New Hybrid Approach for Information Fusion in Multibiometric Systems , 2011, 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics.

[5]  Clement Onime,et al.  Multi-biometric liveness detection – A new perspective , 2016 .

[6]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[7]  N. Singla,et al.  Biometric Fingerprint Indentification Using Artificial Neural Network , 2014 .

[8]  Abdenour Hadid,et al.  Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned , 2015, IEEE Signal Processing Magazine.

[9]  Pierre Margot,et al.  A CHRONOLOGICAL REVIEW OF FINGERPRINT FORGERY , 1999 .

[10]  Sébastien Marcel,et al.  On the vulnerability of palm vein recognition to spoofing attacks , 2015, 2015 International Conference on Biometrics (ICB).

[11]  Borhanuddin Mohd Ali,et al.  TECHNICAL ISSUES AND CHALLENGES OF BIOMETRIC APPLICATIONS AS ACCESS CONTROL TOOLS OF INFORMATION SECURITY , 2012 .

[12]  Sanjeevakumar M. Hatture,et al.  Liveness Detection Technique for Prevention of Spoof Attack in Face Recognition System , 2013 .

[13]  Robert H. Deng,et al.  Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.

[14]  Jia-Hong Dai,et al.  An embedded fingerprint authentication system with reduced hardware resources requirement , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..

[15]  Jameson Mbale,et al.  Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System , 2011, Int. J. Comput. Intell. Syst..

[16]  Clement Onime,et al.  Enhancing Biometric Liveness Detection Using Trait Randomization Technique , 2017, 2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim).

[17]  Selina Sharmin,et al.  A Survey of Biometrics Security System , 2011 .

[18]  Valsamma Km Dr Valsamma Km Aadhaar, Function Creep and The Emerging Symbiotic Relationship between Society and Technology , 2012 .

[19]  Mohmad Kashif Qureshi LIVENESS DETECTION OF BIOMETRIC TRAITS , 2010 .

[20]  F. Roli,et al.  Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..

[21]  Luisa Verdoliva,et al.  An Investigation of Local Descriptors for Biometric Spoofing Detection , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Shilpa Shrivastava Biometric: Types and its Applications , 2015 .

[23]  A. Lakshmi,et al.  DEEP REPRESENTATIONS FOR IRIS , FACE , AND FINGERPRINT SPOOFING DETECTION , 2017 .

[24]  Philippe C. Cattin,et al.  Biometric authentication system using human gait , 2002 .

[25]  Dhiraj Sunehra Fingerprint Based Biometric ATM Authentication System , 2014 .

[26]  Jiang-Wei Li,et al.  Eye blink detection based on multiple Gabor response waves , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[27]  C. Chellappan,et al.  Biometrics: An Overview of the Technology, Issues and Applications , 2012 .

[28]  Sébastien Marcel,et al.  Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.

[29]  A. D. Fitt,et al.  Fluid Mechanics of the Human Eye: Aqueous Humour Flow in The Anterior Chamber , 2006, Bulletin of mathematical biology.

[30]  Deepak Rasaily,et al.  Biometric Attendance System using Microcontroller , 2016 .

[31]  Gian Luca Marcialis,et al.  LivDet 2011 — Fingerprint liveness detection competition 2011 , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[32]  Milind V. Sarode,et al.  BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION , 2012 .