Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned

Biometrics already form a significant component of current and emerging identification technologies. Biometrics systems aim to determine or verify the identity of an individual from their behavioral and/or biological characteristics. Despite significant progress, some biometric systems fail to meet the multitude of stringent security and robustness requirements to support their deployment in some practical scenarios. Among current concerns are vulnerabilities to spoofing?persons who masquerade as others to gain illegitimate accesses to protected data, services, or facilities. While the study of spoofing, or rather antispoofing, has attracted growing interest in recent years, the problem is far from being solved and will require far greater attention in the coming years. This tutorial article presents an introduction to spoofing and antispoofing research. It describes the vulnerabilities, presents an evaluation methodology for the assessment of spoofing and countermeasures, and outlines research priorities for the future.

[1]  Matti Pietikäinen,et al.  Face spoofing detection from single images using texture and local shape analysis , 2012, IET Biom..

[2]  Nicholas W. D. Evans,et al.  A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[3]  Matti Pietikäinen,et al.  Face liveness detection using dynamic texture , 2014, EURASIP J. Image Video Process..

[4]  RossArun,et al.  A Survey on Antispoofing Schemes for Fingerprint Recognition Systems , 2014 .

[5]  Gian Luca Marcialis,et al.  LivDet 2013 Fingerprint Liveness Detection Competition 2013 , 2013, 2013 International Conference on Biometrics (ICB).

[6]  Sébastien Marcel,et al.  Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition , 2014, IEEE Transactions on Image Processing.

[7]  Aleksandr Sizov,et al.  ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge , 2015, INTERSPEECH.

[8]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[9]  Arun Ross,et al.  A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .

[10]  Julian Fierrez Adapted fusion schemes for multimodal biometric authentication (Esquemas adaptados de fusión para autenticación biométrica multimodal) , 2006 .

[11]  Yajie Tian,et al.  Handbook of face recognition , 2003 .

[12]  Sébastien Marcel,et al.  A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Haizhou Li,et al.  Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..

[14]  Jukka Komulainen,et al.  The 2nd competition on counter measures to 2D face spoofing attacks , 2013, 2013 International Conference on Biometrics (ICB).

[15]  Gian Luca Marcialis,et al.  Anti-spoofing: Multimodal , 2015 .

[16]  Stan Z. Li,et al.  Handbook of Biometric Anti-Spoofing , 2014, Advances in Computer Vision and Pattern Recognition.

[17]  Sébastien Marcel,et al.  Biometrics Evaluation Under Spoofing Attacks , 2014, IEEE Transactions on Information Forensics and Security.

[18]  Sébastien Marcel,et al.  Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.