Study of Imposter Attacks on Novel Fingerprint Dynamics Based Verification System

The rapid momentum in the realization of security solutions, availability of affordable hardware components, and computing devices has led to a tremendous rise in biometric research. However, the threat of spoofing has raised palpable security concerns. In this paper, we examined a recently introduced novel behavioral biometrics technique, namely, fingerprint dynamics. The technique exploits individual’s behavioral characteristics observed from multi-instance finger scan events. The objective of this investigation was to study the spoof resistance capabilities of the fingerprint dynamics-based standalone identity verification system. We used a custom-built hardware unit to collect biometric samples from a total of 50 participants, in an environment that closely mimics the operational scenario. Data collection was done in several sessions per user, spread over a period of seven weeks. We performed an exhaustive analysis of several time-derived features, and selected a combination of best-performing features using genetic algorithm. We also conducted a systematic evaluation using support vector machine and $k$ -nearest neighbor classifiers. We performed a series of verification experiments under three different and practically relevant attack scenarios, namely: 1) combined zero-effort and active imposter; 2) only zero-effort imposter; and 3) only active imposter. We find that the proposed technique exhibits promising results under all the three attack scenarios.

[1]  Alain Forget,et al.  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism , 2012, IEEE Transactions on Dependable and Secure Computing.

[2]  Arun Ross,et al.  Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Chenn-Jung Huang,et al.  Application of wrapper approach and composite classifier to the stock trend prediction , 2008, Expert Syst. Appl..

[4]  Kentaro Kotani,et al.  Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics , 2005, Behav. Inf. Technol..

[5]  Arun Ross,et al.  50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..

[6]  Christine L. MacKenzie,et al.  Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.

[7]  Ayça Çakmak Pehlivanlı,et al.  A novel feature selection scheme for high-dimensional data sets: four-Staged Feature Selection , 2015 .

[8]  Ana Carolina Lorena,et al.  A systematic review on keystroke dynamics , 2013, Journal of the Brazilian Computer Society.

[9]  Anil K. Jain,et al.  Biometric Authentication: System Security and User Privacy , 2012, Computer.

[10]  Ioannis A. Kakadiaris,et al.  Mobile User Authentication Using Statistical Touch Dynamics Images , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Ana L. N. Fred,et al.  A behavioral biometric system based on human-computer interaction , 2004, SPIE Defense + Commercial Sensing.

[12]  Krishna K. Venkatasubramanian,et al.  An approach for user identification for head-mounted displays , 2015, SEMWEB.

[13]  Petru Radu,et al.  Robust multimodal face and fingerprint fusion in the presence of spoofing attacks , 2016, Pattern Recognit..

[14]  Vivek Kanhangad,et al.  Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..

[15]  Ishan Bhardwaj,et al.  Fingerprint dynamics: A novel biometrics for personal authentication , 2016, 2016 International Conference on Signal and Information Processing (IConSIP).

[16]  Ingo Deutschmann,et al.  Behavioral biometrics for DARPA's Active Authentication program , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[17]  Gian Luca Foresti,et al.  Biometric Liveness Detection: Challenges and Research Opportunities , 2015, IEEE Security & Privacy.

[18]  Liang Wang,et al.  Behavioral Biometrics For Human Identification: Intelligent Applications , 2009 .

[19]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[20]  Woo Chaw Seng,et al.  A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..

[21]  Ishan Bhardwaj,et al.  A spoof resistant multibiometric system based on the physiological and behavioral characteristics of fingerprint , 2017, Pattern Recognit..

[22]  Ishan Bhardwaj,et al.  Feature selection for novel fingerprint dynamics biometric technique based on PCA , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[23]  Lee Luan Ling,et al.  User authentication through typing biometrics features , 2005, IEEE Transactions on Signal Processing.

[24]  Alex Fridman,et al.  Learning Human Identity from Motion Patterns , 2015, IEEE Access.

[25]  Qijun Zhao,et al.  A DCNN Based Fingerprint Liveness Detection Algorithm with Voting Strategy , 2015, CCBR.

[26]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[27]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[28]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .

[29]  Nasir D. Memon,et al.  PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..

[30]  Julian Fiérrez,et al.  Towards Predicting Good Users for Biometric Recognition Based on Keystroke Dynamics , 2014, ECCV Workshops.

[31]  Brejesh Lall,et al.  Performance issues in biometric authentication based on information theoretic concepts: A review , 2010 .

[32]  Jugurta R. Montalvão Filho,et al.  Contributions to empirical analysis of keystroke dynamics in passwords , 2015, Pattern Recognit. Lett..

[33]  M. Akila,et al.  Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..

[34]  Dongsong Zhang,et al.  Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones , 2016, Decis. Support Syst..

[35]  Sungzoon Cho,et al.  GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[36]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[37]  Anil K. Jain,et al.  Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[38]  Christophe Champod,et al.  Forgeries of Fingerprints in Forensic Science , 2014, Handbook of Biometric Anti-Spoofing.

[39]  Rama Chellappa,et al.  Machine Recognition of Human Activities: A Survey , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[40]  Mahesh Pal,et al.  Hybrid genetic algorithm for feature selection with hyperspectral data , 2013 .

[41]  Xiaoming Liu,et al.  On Continuous User Authentication via Typing Behavior , 2014, IEEE Transactions on Image Processing.

[42]  Anil K. Jain,et al.  Dimensionality reduction using genetic algorithms , 2000, IEEE Trans. Evol. Comput..

[43]  Nasir D. Memon,et al.  Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.

[44]  Ishan Bhardwaj,et al.  A Novel Behavioural Biometric Technique for Robust User Authentication , 2017 .