A Taxonomy on Biometric Security and Its Applications

In modern times, pioneering works in the field of face recognition have seen the new development in biometric technology. A greater spectrum with modalities such as iris, face, fingerprints, signature, or hand has been largely deployed, and highly accurate systems using these modalities have been designed too. Recently, a critical issue has been addressed that affects the path of technological evolution in biometrics, i.e., spoofing, which is very resistant to biometric technology through external attacks. Spoofing is different from other IT security solutions as it is a purely biometric vulnerability. With the help of a sensor, an illegitimate user fools the biometric system by treating it as a genuine one using a synthetic forged version refers to as spoofing. The researchers and developers of the biometric community have worked a lot in suggesting and emerging different security methods. The main objective of this paper is to deliver an inclusive outline of the emerging field of anti-spoofing that has been carried out over the last decade. The work covers concepts, procedures, or advanced techniques that largely positioned face modality and also explains the future aspect in the field of biometric security.

[1]  Sébastien Marcel,et al.  On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..

[2]  Abu Asaduzzaman,et al.  A time-efficient image processing algorithm for multicore/manycore parallel computing , 2015, SoutheastCon 2015.

[3]  Jyotika Kapur,et al.  Security Using Image Processing , 2013 .

[4]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[5]  Patrick J. Flynn,et al.  A sparse representation approach to face matching across plastic surgery , 2012, 2012 IEEE Workshop on the Applications of Computer Vision (WACV).

[6]  Jöran Beel,et al.  ePassport - The World's New Electronic Passport: A Report about the ePassport's Benefits, Risks and its Security , 2007 .

[7]  Rolf Ingold,et al.  A New Forgery Scenario Based on Regaining Dynamics of Signature , 2007, ICB.

[8]  Amitabh Wahi,et al.  A Study of Liveness Detection in Face Biometric Systems , 2014 .

[9]  Sébastien Marcel,et al.  Can face anti-spoofing countermeasures work in a real world scenario? , 2013, 2013 International Conference on Biometrics (ICB).

[10]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[11]  Robert H. Deng,et al.  Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.

[12]  Richa Singh,et al.  Face recognition CAPTCHA , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[13]  Danilo Gligoroski,et al.  Walk the Walk: Attacking Gait Biometrics by Imitation , 2010, ISC.

[14]  Jukka Komulainen,et al.  On the generalization of color texture-based face anti-spoofing , 2018, Image Vis. Comput..

[15]  Sébastien Marcel,et al.  Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[16]  Julian Fierrez,et al.  Hill-climbing attack to an Eigenface-based face verification system , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).

[17]  Anderson Rocha,et al.  Video-Based Face Spoofing Detection through Visual Rhythm Analysis , 2012, 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images.

[18]  Rama Chellappa,et al.  Facial attributes for active authentication on mobile devices , 2017, Image Vis. Comput..

[19]  Muhammad Khurram Khan,et al.  A software agent enabled biometric security algorithm for secure file access in consumer storage devices , 2017, IEEE Transactions on Consumer Electronics.

[20]  WADOOD ABDUL,et al.  Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.

[21]  Himanshu S. Bhatt,et al.  Plastic Surgery: A New Dimension to Face Recognition , 2010, IEEE Transactions on Information Forensics and Security.

[22]  Sébastien Marcel,et al.  Spoofing Face Recognition With 3D Masks , 2014, IEEE Transactions on Information Forensics and Security.

[23]  Michele Nappi,et al.  Moving face spoofing detection via 3D projective invariants , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[24]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[25]  Sangeet Saha,et al.  A brief experience on journey through hardware developments for image processing and its applications on Cryptography , 2012, ArXiv.

[26]  Raihan Uddin Ahmed,et al.  Image processing based Feature extraction of Bangladeshi banknotes , 2014, The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014).

[27]  Lin Sun,et al.  Monocular camera-based face liveness detection by combining eyeblink and scene context , 2011, Telecommun. Syst..

[28]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[29]  Jang-Hee Yoo,et al.  A motion and similarity-based fake detection method for biometric face recognition systems , 2011, IEEE Transactions on Consumer Electronics.

[30]  Jean-Luc Dugelay,et al.  On the vulnerability of face recognition systems to spoofing mask attacks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[31]  Jukka Komulainen,et al.  The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[32]  Alexei A. Efros,et al.  Image‐based Shaving , 2008, Comput. Graph. Forum.

[33]  Gian Luca Marcialis,et al.  Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[34]  Alessandra Lumini,et al.  An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..

[35]  Rajat Sachdeva,et al.  Feature fusion for fake Indian currency detection , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[36]  Matti Pietikäinen,et al.  Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[37]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[38]  Arun Ross,et al.  Can facial cosmetics affect the matching accuracy of face recognition systems? , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[39]  Massimo Tistarelli,et al.  Structural Similarity based image quality map for face recognition across plastic surgery , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[40]  Sébastien Marcel,et al.  Spoofing 2D face recognition systems with 3D masks , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[41]  Shengcai Liao,et al.  Face liveness detection using 3D structure recovered from a single camera , 2013, 2013 International Conference on Biometrics (ICB).

[42]  Sébastien Marcel,et al.  On the vulnerability of finger vein recognition to spoofing , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[43]  Julian Fiérrez,et al.  Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..

[44]  Yunde Jia,et al.  Anisotropic Diffusion-based Kernel Matrix Model for Face Liveness Detection , 2019, Image Vis. Comput..

[45]  Seongbeak Yoon,et al.  Masked fake face detection using radiance measurements. , 2009, Journal of the Optical Society of America. A, Optics, image science, and vision.

[46]  Nicholas W. D. Evans,et al.  On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[47]  Bin Qin,et al.  The Anti-spoofing Study of Vein Identification System , 2009, 2009 International Conference on Computational Intelligence and Security.

[48]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[49]  Lin Sun,et al.  Eyeblink-based Anti-Spoofing in Face Recognition from a Generic Webcamera , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[50]  K. Davis,et al.  Automatic Recognition of Spoken Digits , 1952 .