Auditory Perception Based Anti-Spoofing System for Human Age Verification

Biometric systems are considered an efficient component for identification in the developing modern technologies. The aim of biometric systems is to verify or determine the identity of a user through his/her biological and behavioral characteristics. The threat of spoof attacks is always an important issue in biometric verification and authentication, which requires an updated and stronger protection system. In this article, we propose an anti-spoofing system based on auditory perception responses. To the best of our knowledge, this is the first time that an auditory perception based anti-spoofing system has been presented for age verification. The proposed auditory perception based anti-spoofing system was evaluated with 770 trials conducted by many subjects of each gender and age range (12–65 years of age). The results achieved are encouraging, as the auditory perception based system showed the lowest Equal Error Rate (EER) value of 5.5%.

[1]  Andreas Uhl,et al.  Attacking Iris Recognition: An Efficient Hill-Climbing Technique , 2010, 2010 20th International Conference on Pattern Recognition.

[2]  Sanjay N. Talbar,et al.  Adaptive GLOH with PSO-trained NN for the recognition of plastic surgery faces and their types , 2019, Bio Algorithms Med Syst..

[3]  Petru Radu,et al.  Robust multimodal face and fingerprint fusion in the presence of spoofing attacks , 2016, Pattern Recognit..

[4]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[5]  Lai-Man Po,et al.  Integration of image quality and motion cues for face anti-spoofing: A neural network approach , 2016, J. Vis. Commun. Image Represent..

[6]  Sébastien Marcel,et al.  Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[7]  Patrick J. Flynn,et al.  A sparse representation approach to face matching across plastic surgery , 2012, 2012 IEEE Workshop on the Applications of Computer Vision (WACV).

[8]  John H. Mills,et al.  Age-Related Hearing Loss: A Loss of Voltage, Not Hair Cells , 2006 .

[9]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  B. Sabarigiri,et al.  Countermeasures against IRIS spoofing and liveness detection using Electroencephalogram (EEG) , 2012, 2012 International Conference on Computing, Communication and Applications.

[11]  Julian Fiérrez,et al.  Iris liveness detection based on quality related features , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[12]  Patrick J. Flynn,et al.  Variation in accuracy of textured contact lens detection based on sensor and lens pattern , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[13]  Josef Kittler,et al.  Floating search methods in feature selection , 1994, Pattern Recognit. Lett..

[14]  Gian Luca Marcialis,et al.  Multimodal Anti-spoofing in Biometric Recognition Systems , 2014, Handbook of Biometric Anti-Spoofing.

[15]  Vrizlynn L. L. Thing,et al.  Fingerprint Liveness Detection From Single Image Using Low-Level Features and Shape Analysis , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Hong Wei,et al.  Face anti-spoofing countermeasure: Efficient 2D materials classification using polarization imaging , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[17]  Tom Fladsrud Face recognition in a border control environment: non-zero effort attacks' effect on false acceptance rate , 2005 .

[18]  Luisa Verdoliva,et al.  LivDet iris 2017 — Iris liveness detection competition 2017 , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[19]  Julian Fierrez,et al.  Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection , 2007 .

[20]  Arun Ross,et al.  Automatic adaptation of fingerprint liveness detector to new spoof materials , 2014, IEEE International Joint Conference on Biometrics.

[21]  Andrea Salgian,et al.  Face recognition with visible and thermal infrared imagery , 2003, Comput. Vis. Image Underst..

[22]  J. Daugman 5 RECOGNIZING PERSONS BY THEIR IRIS PATTERNS , 2005 .

[23]  Sung Wook Baik,et al.  CNN-based anti-spoofing two-tier multi-factor authentication system , 2019, Pattern Recognit. Lett..

[24]  Andreas Uhl,et al.  Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.

[25]  Kevin W. Bowyer,et al.  Cosmetic Contact Lenses and Iris Recognition Spoofing , 2014, Computer.

[26]  Himanshu S. Bhatt,et al.  Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm , 2013, IEEE Transactions on Information Forensics and Security.

[27]  Arun Ross,et al.  Soft biometrics for surveillance: an overview , 2013 .

[28]  Amine Nait-Ali,et al.  Human age estimation using auditory system through dynamic frequency sound , 2017, 2017 2nd International Conference on Bio-engineering for Smart Technologies (BioSMART).

[29]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[30]  Massimo Tistarelli,et al.  Structural Similarity based image quality map for face recognition across plastic surgery , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[31]  H. Takano,et al.  Highly reliable liveness detection method for iris recognition , 2007, SICE Annual Conference 2007.

[32]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[33]  Josef Bigün,et al.  Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..

[34]  Joon-Sang Park,et al.  Efficient Eye-Blinking Detection on Smartphones: A Hybrid Approach Based on Deep Learning , 2018, Mob. Inf. Syst..

[35]  Gian Luca Marcialis,et al.  LivDet 2013 Fingerprint Liveness Detection Competition 2013 , 2013, 2013 International Conference on Biometrics (ICB).

[36]  A. Pacut,et al.  Aliveness Detection for IRIS Biometrics , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[37]  Richa Singh,et al.  Revisiting iris recognition with color cosmetic contact lenses , 2013, 2013 International Conference on Biometrics (ICB).

[38]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .

[39]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[40]  Yung-Hui Li,et al.  A Novel Anti-Spoofing Solution for Iris Recognition Toward Cosmetic Contact Lens Attack Using Spectral ICA Analysis , 2018, Sensors.

[41]  Cardona Alzate,et al.  Predicción y selección de variables con bosques aleatorios en presencia de variables correlacionadas , 2020 .

[42]  A. Lakshmi,et al.  DEEP REPRESENTATIONS FOR IRIS , FACE , AND FINGERPRINT SPOOFING DETECTION , 2017 .

[43]  Venu Govindaraju,et al.  Robustness of multimodal biometric fusion methods against spoof attacks , 2009, J. Vis. Lang. Comput..

[44]  Kang Ryoung Park,et al.  Fake Iris Detection by Using Purkinje Image , 2006, ICB.

[45]  Ruigang Yang,et al.  An experimental study of pupil constriction for liveness detection , 2013, 2013 IEEE Workshop on Applications of Computer Vision (WACV).

[46]  P. Devakumar,et al.  An Intelligent Approach for Anti-Spoofing in a Multimodal Biometric System , 2017 .

[47]  Richa Singh,et al.  Unraveling the Effect of Textured Contact Lenses on Iris Recognition , 2014, IEEE Transactions on Information Forensics and Security.

[48]  Tieniu Tan,et al.  Counterfeit iris detection based on texture analysis , 2008, 2008 19th International Conference on Pattern Recognition.

[49]  Anderson Rocha,et al.  Face spoofing detection through partial least squares and low-level descriptors , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[50]  Himanshu S. Bhatt,et al.  Plastic Surgery: A New Dimension to Face Recognition , 2010, IEEE Transactions on Information Forensics and Security.