Impostor detection using facial stereoscopic images

Biometric systems are prone to impostor attacks, which in case of high security applications could be critical. These attacks range from simple attacks consisting of stealing someone's password or complex as cryptographic attacks on the transmission channel. In this study we have focused on combating replay attacks, in which an impostor uses a prerecorded image of the client. The system captures stereoscopic images of the face and then decides if the images belong to a real face or a poster from depth calculated using triangulation.

[1]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[2]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[3]  Driss Matrouf,et al.  Effect of Speech Transformation on Impostor Acceptance , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[4]  Pieter H. Hartel,et al.  The state of the art in abuse of biometrics , 2005 .

[5]  Christopher G. Harris,et al.  A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.

[6]  Takeo Kanade,et al.  An Iterative Image Registration Technique with an Application to Stereo Vision , 1981, IJCAI.

[7]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[8]  J.-Y. Bouguet,et al.  Pyramidal implementation of the lucas kanade feature tracker , 1999 .