Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study

In order to render a biometric system robust against malicious tampering, it is important to understand the different types of attack and their impact as observed by the liveness and matching scores. In this study, we consider zero-effort impostor attack (referred to as the Z-attack), nonzero-effort impostor attack such as presentation attack or spoofing (S-attack), and other categories of attack involving tampering at the template level (U- and T-attacks). In order to elucidate the impact of all possible attacks, we (1) introduce the concepts of source of origin and symmetric biometric matchers, and (2) subsequently group the attacks into four categories. These views not only improve the understanding of the nature of different attacks but also turn out to ease the design of the classification problem. Following this analysis, we design a novel classification scheme that can take full advantage of the attack-specific data characteristics. Two realisations of the scheme, namely, a mixture of linear classifiers, and a Gaussian Copula-based Bayesian classifier, turn out to outperform a strong baseline classifier based on SVM, as supported by fingerprint spoofing experiments.

[1]  Shaogang Gong,et al.  Audio- and Video-based Biometric Person Authentication , 1997, Lecture Notes in Computer Science.

[2]  Samy Bengio,et al.  Performance Generalization in Biometric Authentication Using Joint User-Specific and Sample Bootstraps , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Gian Luca Marcialis,et al.  LivDet 2011 — Fingerprint liveness detection competition 2011 , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[4]  Albert Ali Salah,et al.  Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion Algorithms , 2009, IEEE Transactions on Information Forensics and Security.

[5]  Arun Ross,et al.  A Bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Sébastien Marcel,et al.  Anti-spoofing in Action: Joint Operation with a Verification System , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[7]  Abdenour Hadid,et al.  Fingerprint Liveness Detection using Binarized Statistical Image Features , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[8]  Fabio Roli,et al.  Poisoning attacks to compromise face templates , 2013, 2013 International Conference on Biometrics (ICB).

[9]  Josef Kittler,et al.  A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[11]  Arun Ross,et al.  Detecting Altered Fingerprints , 2010, 2010 20th International Conference on Pattern Recognition.

[12]  Gian Luca Marcialis,et al.  Fingerprint liveness detection by local phase quantization , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).

[13]  Norman Poh,et al.  Biometric system design under zero and non-zero effort attacks , 2013, 2013 International Conference on Biometrics (ICB).

[14]  Gian Luca Marcialis,et al.  First International Fingerprint Liveness Detection Competition - LivDet 2009 , 2009, ICIAP.

[15]  Arun Ross,et al.  Analysis of user-specific score characteristics for spoof biometric attacks , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[16]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[17]  Arun Ross,et al.  Combining match scores with liveness values in a fingerprint verification system , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).