Security Analysis of Multimodal Biometric Systems against Spoof Attacks

Biometrics, referred as the science of recognizing a person based on his or her physical or behavioral traits, has been widely accepted and deployed in various applications. However, recent researches show that many biometric traits are susceptible to spoof attacks. Moreover, a recent work showed that, contrary to a common claim, multimodal systems can be broken even if only one trait is spoofed. The result was obtained, using simulated spoofed samples, under the assumption that the spoofed and genuine samples are indistinguishable, which is not true for all biometric traits.We further investigate this security issue, focusing on behavior of fixed and trained score fusion rules, using real spoof attack samples. Preliminary empirical results on real biometric systems made up of face, fingerprint and iris confirm that multimodal biometric systems are not intrinsically robust against spoof attacks as believed so far. In particular, most used fixed rules can be even less robust than trained one. We found that trained rules are not only more flexible and accurate but more robust, also, against spoof attacks as compare to fixed rules.We also empirically observed that multimodal systems are more robust, under spoof attacks, than unimodal biometric systems, robustness increases as the number of matchers being fused increases.

[1]  David G. Stork,et al.  Pattern Classification , 1973 .

[2]  John Daugman How iris recognition works , 2004 .

[3]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[4]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[5]  David Zhang,et al.  Robust palmprint verification using 2D and 3D features , 2010, Pattern Recognit..

[6]  Ching Y. Suen,et al.  Multiple Classifier Combination Methodologies for Different Output Levels , 2000, Multiple Classifier Systems.

[7]  Pengfei Shi,et al.  A Fake Iris Detection Method Based on FFT and Quality Assessment , 2008, 2008 Chinese Conference on Pattern Recognition.

[8]  Anil K. Jain,et al.  Likelihood Ratio-Based Biometric Score Fusion , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Venu Govindaraju,et al.  Robustness of multimodal biometric fusion methods against spoof attacks , 2009, J. Vis. Lang. Comput..

[10]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[11]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[12]  Anil K. Jain,et al.  Combining multiple matchers for a high security fingerprint verification system , 1999, Pattern Recognit. Lett..

[13]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[14]  Christopher M. Bishop,et al.  Neural networks for pattern recognition , 1995 .

[15]  Samy Bengio,et al.  Why do multi-stream, multi-band and multi-modal approaches work on biometric user authentication tasks? , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.