Identities, forgeries and disguises

The preservation of your identity could become a major concern. In many situations, you need to claim an identity and this claim needs to be verified somehow. The technology called biometrics may help. But, what if a deliberate impostor claims your identity? Will this forgery be always detected? Biometric identity verification is imperfect. This paper reviews some of the techniques that a deliberate impostor could use to defeat a biometric verification system. It focuses on audio-visual forgeries using voice conversion and face animation. It also describes identity disguise as a means of falsifying and concealing one|s identity. The recovery of an identity and cancellable biometrics are also useful techniques to protect from identity theft. Such techniques could also find useful applications in multimedia.

[1]  Gérard Chollet,et al.  Detection and Recognition of voice disguise , 2007 .

[2]  Ian H. Witten,et al.  Detecting Replay Attacks in Audiovisual Identity Verification , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[3]  Ricardo Molina de Figueiredo,et al.  A report on the acoustic effects of one type of disguise , 2013 .

[4]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[5]  Gérard Chollet,et al.  Making talking-face authentication robust to deliberate imposture , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[6]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[7]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[8]  G. Chollet,et al.  The BioSecure Talking-Face Reference System , 2006 .

[9]  Hui Zhang,et al.  Image-Based 3D Face Modeling System , 2005, EURASIP J. Adv. Signal Process..

[10]  Walid Karam,et al.  Audio-Visual Identity Verification and Robustness to Imposture , 2009, ICB.

[11]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  S. Kanade,et al.  Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.

[13]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[14]  Gérard Chollet,et al.  The question of disguised voice , 2008 .

[15]  Bernadette Dorizzi,et al.  Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.

[16]  Shang-Hong Lai,et al.  Efficient 3D Face Reconstruction from a Single 2D Image by Combining Statistical and Geometrical Information , 2006, ACCV.

[17]  Hassan Ugail,et al.  Reconstruction of 3D Human Facial Images Using Partial Differential Equations , 2007, J. Comput..

[18]  G. Chollet,et al.  The 1st BioSecure Residential Workshop , 2005, ISPA 2005. Proceedings of the 4th International Symposium on Image and Signal Processing and Analysis, 2005..

[19]  Gérard Chollet,et al.  Audiovisual Speech Synchrony Measure: Application to Biometrics , 2007, EURASIP J. Adv. Signal Process..

[20]  Walid Karam,et al.  Some results from the biosecure talking face evaluation campaign , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[21]  Alexander G. Hauptmann,et al.  Towards robust face recognition from multiple views , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[22]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[23]  Bernadette Dorizzi,et al.  Guide to Biometric Reference Systems and Performance Evaluation , 2009 .

[24]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[25]  Gérard Chollet,et al.  Audio-visual Identity Verification: An Introductory Overview , 2005, WNSP.

[26]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[27]  Gérard Chollet,et al.  MEASURING AUDIO AND VISUAL SPEECH SYNCHRONY: METHODS AND APPLICATIONS , 2006 .

[28]  S. Kanade,et al.  Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[29]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[30]  B. Abboud,et al.  Appearance based lip tracking and cloning on speaking faces , 2005, ISPA 2005. Proceedings of the 4th International Symposium on Image and Signal Processing and Analysis, 2005..

[31]  Gérard Chollet,et al.  Vocal Forgery in Forensic Sciences , 2009, e-Forensics.

[32]  S. H. Amin,et al.  Analysis of 3D Face Reconstruction , 2007, 14th International Conference on Image Analysis and Processing (ICIAP 2007).

[33]  Matthew Sorell,et al.  Forensics in Telecommunications, Information and Multimedia , 2009, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

[34]  Walid Karam,et al.  Talking-Face Identity Verification, Audiovisual Forgery, and Robustness Issues , 2009, EURASIP J. Adv. Signal Process..

[35]  Gérard Chollet,et al.  Voice forgery using ALISP: indexation in a client memory , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[36]  Bernadette Dorizzi,et al.  Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.

[37]  Yepeng Guan,et al.  Automatic 3D Face Reconstruction based on Single 2D Image , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[38]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[39]  H. Masthoff A report on a voice disguise experiment , 2013 .