Robust multimodal face and fingerprint fusion in the presence of spoofing attacks

Anti-spoofing is attracting growing interest in biometrics, considering the variety of fake materials and new means to attack biometric recognition systems. New unseen materials continuously challenge state-of-the-art spoofing detectors, suggesting for additional systematic approaches to target anti-spoofing. By incorporating liveness scores into the biometric fusion process, recognition accuracy can be enhanced, but traditional sum-rule based fusion algorithms are known to be highly sensitive to single spoofed instances. This paper investigates 1-median filtering as a spoofing-resistant generalised alternative to the sum-rule targeting the problem of partial multibiometric spoofing where m out of n biometric sources to be combined are attacked. Augmenting previous work, this paper investigates the dynamic detection and rejection of liveness-recognition pair outliers for spoofed samples in true multi-modal configuration with its inherent challenge of normalisation. As a further contribution, bootstrap aggregating (bagging) classifiers for fingerprint spoof-detection algorithm is presented. Experiments on the latest face video databases (Idiap Replay-Attack Database and CASIA Face Anti-Spoofing Database) and fingerprint spoofing database (Fingerprint Liveness Detection Competition 2013) illustrate the efficiency of proposed techniques. HighlightsWe examine spoofing robustness in multibiometrics attacking m out of n instances.1-Median filtering detecting score anomalies is proposed for spoof-resistant fusion.In contrast to sum-rule, operation with stable m-spoof performance can be achieved.Best performance (84%) for bagging of classifiers approach on LivDet2013 CrossMatch.

[1]  Arun Ross,et al.  Automatic adaptation of fingerprint liveness detector to new spoof materials , 2014, IEEE International Joint Conference on Biometrics.

[2]  Gian Luca Marcialis,et al.  Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study , 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[3]  Arun Ross,et al.  Combining match scores with liveness values in a fingerprint verification system , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[4]  Gian Luca Marcialis,et al.  Fingerprint liveness detection by local phase quantization , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).

[5]  S. T. Buckland,et al.  An Introduction to the Bootstrap. , 1994 .

[6]  Leo Breiman,et al.  Bagging Predictors , 1996, Machine Learning.

[7]  Gian Luca Marcialis,et al.  Power spectrum-based fingerprint vitality detection , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[8]  Gian Luca Marcialis,et al.  Evaluation of serial and parallel multibiometric systems under spoofing attacks , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[9]  Matti Pietikäinen,et al.  Dynamic Texture Recognition Using Local Binary Patterns with an Application to Facial Expressions , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Stephanie Schuckers,et al.  Multimodal fusion vulnerability to non-zero effort (spoof) imposters , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[11]  John G. Daugman,et al.  Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression , 1988, IEEE Trans. Acoust. Speech Signal Process..

[12]  Gian Luca Marcialis,et al.  LivDet 2013 Fingerprint Liveness Detection Competition 2013 , 2013, 2013 International Conference on Biometrics (ICB).

[13]  Yi Li,et al.  Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative Model , 2010, ECCV.

[14]  Robert Tibshirani,et al.  An Introduction to the Bootstrap , 1994 .

[15]  Matti Pietikäinen,et al.  Competition on counter measures to 2-D facial spoofing attacks , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[16]  Jaihie Kim,et al.  Fake-fingerprint detection using multiple static features , 2009 .

[17]  Suneeta Agarwal,et al.  Gabor Filter-Based Fingerprint Anti-spoofing , 2008, ACIVS.

[18]  Sébastien Marcel,et al.  Biometrics Evaluation Under Spoofing Attacks , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Gian Luca Marcialis,et al.  Evaluation of multimodal biometric score fusion rules under spoof attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[20]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .

[21]  Sébastien Marcel,et al.  Anti-spoofing in Action: Joint Operation with a Verification System , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[22]  Paul T. von Hippel,et al.  Mean, Median, and Skew: Correcting a Textbook Rule , 2005 .

[23]  Arun Ross,et al.  A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[24]  Matti Pietikäinen,et al.  Face Anti-spoofing: Visual Approach , 2014, Handbook of Biometric Anti-Spoofing.

[25]  Gian Luca Marcialis,et al.  Multimodal Anti-spoofing in Biometric Recognition Systems , 2014, Handbook of Biometric Anti-Spoofing.

[26]  Venu Govindaraju,et al.  Robustness of multimodal biometric fusion methods against spoof attacks , 2009, J. Vis. Lang. Comput..

[27]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[28]  Jiri Matas,et al.  On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[29]  Stephanie Schuckers,et al.  Fingerprint Liveness Detection Using Local Ridge Frequencies and Multiresolution Texture Analysis Techniques , 2006, 2006 International Conference on Image Processing.

[30]  Sébastien Marcel,et al.  LBP - TOP Based Countermeasure against Face Spoofing Attacks , 2012, ACCV Workshops.

[31]  Sébastien Marcel,et al.  On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[32]  Stephanie Schuckers,et al.  Increase the Security of Multibiometric Systems by Incorporating a Spoofing Detection Algorithm in the Fusion Mechanism , 2011, MCS.

[33]  H. J. Arnold Introduction to the Practice of Statistics , 1990 .

[34]  Venu Govindaraju,et al.  Evaluation of biometric spoofing in a multimodal system , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[35]  Josef Kittler,et al.  Heterogeneous information fusion: A novel fusion paradigm for biometric systems , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[36]  Junjie Yan,et al.  A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[37]  Suneeta Agarwal,et al.  Fingerprint Liveness Detection Using Curvelet Energy and Co-Occurrence Signatures , 2008, 2008 Fifth International Conference on Computer Graphics, Imaging and Visualisation.

[38]  Michael Evans,et al.  Introduction to the Practice of Statistics Minitab Manual and Minitab Version 14 , 2005 .

[39]  Petru Radu,et al.  Towards anomaly detection for increased security in multibiometric systems: Spoofing-resistant 1-median fusion eliminating outliers , 2014, IEEE International Joint Conference on Biometrics.

[40]  Sébastien Marcel,et al.  Motion-based counter-measures to photo attacks in face recognition , 2014, IET Biom..