SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
PhD in Electronic and Computer Engineering

   Security of Multimodal Biometric Systems
             against Spoof Attacks

                         Zahid Akhtar


                      Advisor: Prof. Fabio Roli
                  Co-advisors: Dr. Giorgio Fumera
                               Dr. Gian Luca Marcialis


                     Pattern Recognition and Applications Group
                     Department of Electrical and Electronic Engineering
                     University of Cagliari, Italy
Outline

         •  Background concepts
               biometric systems and their security issues

         •  Contributions of this thesis
               Robustness evaluation of multimodal biometric systems against
                real spoof attacks
               Proposed methods for security evaluation of multimodal
                biometric systems against spoof attacks
               Experiments

         •  Conclusions and future works




06-03-2012         Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   2
Biometrics
 •  Examples of body traits that can be used for biometric recognition




             Face             Fingerprint                         Iris                  Hand geometry




        Palmprint              Signature                        Voice                          Gait




06-03-2012          Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar       3
Biometric authentication systems
 •  Enrollment Phase

                                                      User Identity


                                                                          XTemplate
                                  Biometric                `
                                                           Feature                       System
                                   Sensor                 Extractor                      Database

                      User




•  Verification Phase

                                  Claimed user Identity
                                                                      System                               Genuine
                                                                      Database                 Yes
                                                                           XTemplate
                                                      XQuery                                    Score >
                    Biometric            Feature
                     Sensor             Extractor                     Matcher                  Threshold
                                                                                       Score
             User
                                                                                                No
                                                                                                           Impostor




06-03-2012            Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                   4
Biometric authentication systems
•  Unimodal Biometric System
                                                                                                             Genuine
                                                                                                 Yes


                         Biometric            Feature               Fingerprint                   Score >
                          Sensor             Extractor               Matcher                     Threshold
                                                                                     Score

                                                                     System                      No
                                                                                                             Impostor
                                                                     Database



•  Multimodal Biometric System

             Biometric                                                      s1
                                  Feature                 Face                                                           Genuine
              Sensor             Extractor               Matcher                                             Yes


                                                                                  Score Fusion                Score >
                                                         System
                                                                                      Rule                   Threshold
                                                         Database                                  Score
                                                                                     f(s1,s2)

             Biometric            Feature            Fingerprint                                              No
                                                                            s2                                           Impostor
              Sensor             Extractor            Matcher




06-03-2012      Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                             5
Spoof (Direct) Attacks
•  Spoof attacks
       attacks at the user interface (sensor)
       presentation of a fake biometric trait




•  Countermeasures
       Liveness detection methods
       Multimodal biometric Systems  “intrinsically” robust?



06-03-2012       Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   6
State-of-the-art

•      Vulnerability identification
         contrary to a common belief, a multimodal biometric system can be
          evaded even if only one biometric trait is spoofed
           [Rodrigues et al. JVLC 2009, Rodrigues et al. BTAS 2010, P. A. Jonhson et al. WIFS 2010]


•      Robustness evaluation against spoof attacks
         evaluation under working worst-case hypothesis
              “worst-case” scenario, where it is assumed that the attacker is able to
               fabricate a perfect replica of a biometric trait
              Fake scores are simulated under a worst-case scenario, resampling
               genuine user scores
               p(score|Impostor, spoofing) = p(score|Genuine)
                                                  6



                                                  5



                                                  4
                                                                                                                      p(score|Genuine)
                                                  3                                                                   p(score|Impostor)
                                                                                                                      p(score|Fake)
                                                  2



                                                  1



                                                  0
                                                      0   0.1   0.2   0.3   0.4    0.5    0.6   0.7   0.8   0.9   1
                                                                                  score




     06-03-2012               Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                               7
State-of-the-art

•      Defense strategies against spoof attacks
         two robust fusion rule under a worst-case hypothesis [Rodrigues et al. JVLC 2009]

•      No methodology exist to evaluate the performance of biometric systems
       against real spoof attack




     06-03-2012         Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   8
Open issues

      1.  Vulnerability identification against real spoof attacks
            vulnerability of multimodal biometric systems to real spoof attacks that
             may be exploited by an attacker to mislead the system

      2.  Performance evaluation methods against spoof attacks
            standard performance evaluation does not provide information about the
             security1 of a system against spoof attack

      3.  Robust system design
            current theory and design methods of biometric systems do not take into
            account the vulnerability to such adversary attacks.




1   In this thesis, we will use both “security” and “robustness” terms interchangeably, to indicate performance of biometric systems against spoof attacks.

           06-03-2012                    Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                            9
Main contributions of this thesis

1.  Security of multimodal biometric systems against real spoof attacks
      to provide empirical proof that multimodal systems are not intrinsically
       robust against real spoof attacks

2.  Worst-case hypothesis validation
      to verify that current worst-case scenario is not realistic under “real”
       attacks

3.  Security evaluation method
      to provide an estimate of the performance of multimodal biometric system
       against real spoof attack without fabrication of fake traits
      to select a more robust score fusion rule according to its performance
       under spoof attack




  06-03-2012        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   10
Problems
•      Can multimodal biometric systems be actually cracked by attacking only
       one sensor via real spoof attacks?

             to validate the state-of-the-art results obtained under “worst-case” spoof
              attack scenario




         The scope of state-of-the-art results are very limited since they were
         obtained by simulating the scores of spoofed traits under worst-case
                                        scenario.



     06-03-2012         Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   11
Problems
•      Is the “worst-case” scenario hypothesized in literature for spoofing biometrics
       representative of real spoof attacks?

             whether and to what extend the “worst-case” scenario is realistic




        To what extent the drop in performance under the “worst-case” attack
        scenario is representative of the performance under real spoof attacks.



     06-03-2012         Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   12
Problems
•      How can the security of multimodal systems be evaluated, under realistic
       attacks, without fabricating spoofed traits?

             a current issue is to have a measurements of the performance drop under
              spoofing attacks for uni and multimodal systems

                 collecting “attack” samples is a non-trivial task




            It is of interest to evaluate robustness of biometric systems under
                                different qualities of fake traits.



     06-03-2012             Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   13
Experiments
•  Multimodal system with face and fingerprint matchers

      Fingerprint: Bozorth3 (NIST) and Verifinger (Neurotechnology)

      Face: Elastic Bunch Graph Matching - EBGM




                 Biometric                                                     s1
                                        Feature              Face                                                      Genuine
                  Sensor               Extractor            Matcher                                        Yes


                                                                                    Score Fusion            Score >
                                                            System
                                                                                        Rule               Threshold
                                                            Database                               Score
                                                                                       f(s1,s2)

                 Biometric              Feature            Fingerprint                                     No
                                                                               s2                                      Impostor
                  Sensor               Extractor            Matcher




    06-03-2012               Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                   14
Experiments
                                            Score fusion rules

1.  Sum                                                 s = s1 + s2
2.  Product                                             s = s1 × s2
3.  Bayesian                                            s = ( s1 × s2 ) / [(1- s1)(1- s2) + (s1 × s2)]
4.  Weighted Sum (LDA)                                  s = w0 + w1s1 × w2s2

5.  Weighted Product                                    s = s1w × s1−w
                                                                   2

6.  Perceptron                                          s = 1 / 1 + exp[(w0 + w1s1 × w2s2)]
7.  Likelihood ratio (LLR)                              s = p(s1,s2|G) / p(s1,s2|I)
                                            €
8.  Extended LLR (ExtLLR)                   p(s1,s2|I) =      α
                                                              3   (1− c1 )(1+ c 2 ) p(s1 | G) p(s2 | I)
      explicitly models the distribution
       of spoof attacks (worst-case)                          + α (1+ c1 )(1− c 2 ) p(s1 | I) p(s2 | G)
                                                                3
       [Rodrigues et al. JVLC 2009]
                                                              + α (1− c1 )(1− c 2 ) p(s1 | G) p(s2 | G)
                                                                3

                                             €                [(1− α ) + α (c1 + c 2 + c1c 2 )]p(s1 | I) p(s2 | I)
                                                                         3




   06-03-2012             Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar     15
                                               €
Experiments
                                Fake biometric traits
 •  Fake fingerprints by “consensual method”
       mould: plasticine-like material
       cast: silicon, latex, gelatin and alginate




                                                                                                         ! ! !
                                                                     Live           Fake (latex)    Fake (silicon)
                                                                !   ! !

                                                                !   !   !
 •  Fake faces by “photo-attack”, “personal photo attack” and “print-attack”
        photo displayed on a laptop screen to camera
        Personal photos (like those appearing an social networks)
        video clips of printed-photo attacks




                                                                                                           ! ! !
                                                                     Live           Fake (photo)   Fake (personal )
                                                                !   ! !
06-03-2012       Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar             16
Experiments
                                              Data sets


     Data Set                                 Number                 Number                   Number
                                              of clients             of spoofs                of live
                                                                     per client               per client

     Silicon                                  142                    20                       20
     Latex                                    80                     3                        5
     Gelatin                                  80                     3                        5
     Alginate                                 80                     3                        5
     Photo Attack                             40                     60                       60
     Personal Photo Attack                    25                     3(avg.)                  60
     Print Attack                             50                     12                       16


            12 chimerical multimodal data sets with 8 fusion rules
            12 × 8 = 96 multimodal biometric systems

06-03-2012           Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar         17
Robustness evaluation against real
               spoof attacks




06-03-2012   Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   18
Experiments
                                                          Results

•  can multimodal systems be cracked by attacking only one modality via real
   spoof attacks?

               Fakes: latex (fingerprint) and photo (faces)
                           LDA
              2                                                                                    LLR
             10                                                                       2
                                                                                     10



              1
             10                                                                       1
                                                                                     10
   FRR (%)




                                                                           FRR (%)
                                                       no spoof
                                                       fing.
              0
             10                                        face                           0
                                                                                     10
                                                       both
                                                       w-fing.
                                                       w-face
              −1
             10 −1                                                                    −1
               10    10
                       0
                                 10
                                   1
                                            10
                                              2                                      10 −1    0           1    2
                          FAR (%)                                                      10    10          10   10
                                                                                                  FAR (%)




               @1% FAR operational point (LDA):
                FAR under attacks: 64.91% (fingerprint spoofing) and 2.17% (face spoofing)
06-03-2012                   Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar         19
Experiments
                                                                           Results


                    Fakes: silicon (fingerprint) and photo (faces)

                                    Product                                                                                       LLR
              2                                                                                                2
             10                                                                                               10



              1                                                                                                1
             10                                                                                               10
   FRR (%)




                                                                                                    FRR (%)
                                                                      fing. + face (no spoof)
                                                                      fing.+ face spoof
              0                                                       fing. (no spoof)                         0
             10                                                       fing. spoof                             10
                                                                      face (no spoof)
                                                                      face spoof
              −1                                                                                               −1
             10 −1              0               1             2
                                                                                                              10 −1         0                1                2
               10              10             10            10                                                  10        10               10               10
                                    FAR (%)                                                                                     FAR (%)




                    however the considered multimodal systems are more robust than unimodal
                     ones, even when all biometric traits are spoofed

Zahid Akhtar, Battista Biggio, Giorgio Fumera, Gian Luca Marcialis, “Robustnessof Multi-modal Biometric Systems under Realistic Spoof Attacksagainst All Traits”, In
IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), pp. 5–10, 2011.
                  06-03-2012                  Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                           20
Worst-case hypothesis validation




06-03-2012   Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   21
Experiments
                                                                          Results
      •  Is the “worst-case” scenario for spoofing biometrics representative of real
         spoof attacks?

                       Fakes: latex (fingerprint) and photo (faces)
                                       LLR
                      2                                                                                            Extended LLR
                     10                                                                                   2
                                                                                                         10



                      1
                     10                                                                                   1
                                                                                                         10
           FRR (%)




                                                                                               FRR (%)
                                                                       no spoof
                      0
                                                                       fing.
                     10                                                face                               0
                                                                                                         10
                                                                       both
                                                                       w-fing.
                                                                       w-face
                      −1
                     10 −1                                                                                −1
                       10      10
                                  0
                                             10
                                               1
                                                         10
                                                            2                                            10 −1       0             1            2
                                      FAR (%)                                                              10     10            10           10
                                                                                                                         FAR (%)



                       worst case assumption (dashed lines) holds to some extent for face spoofing
                        but not for fingerprint spoofing
Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, FabioRoli, “Robustness of multi-modal biometric verification systems under realistic spoofing
attacks”, In International Joint Conference on Biometrics (IJCB), 2011.
       06-03-2012                        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                               22
Experiments
                                                                  Results
•  Matching score distributions

       Fake faces
                 photo                                                          personal photo
         !"!%                                                 *        !"!%                                                   *
                                                   +,-./-,                                                         +,-./-,
                                                   /0123425                                                        /0123425
         !"!)                                                          !"!)
                                                   678,                                                            678,

         !"!$                                                          !"!$

         !"!(                                                          !"!(

         !"!#                                                          !"!#

         !"!'                                                          !"!'

           !*                                                            !*
            !   !"#        !"$        !"%       !"&           '           !     !"#        !"$       !"%        !"&           '




       Fake fingerprints
                 silicon
                *+,-./''!01213/4)!0+15./3+67!8+*+91:
                                                                                        alginate
                                                                                *+,-./''!01213/4)!0+15./3+67!7*8+97/
          !"$                                                 ;         !"$                                                   :
                                                   <.:=+:.                                                         8.9;+9.
         !")(                                      +5>18/13            !")(                                        +5<1=/13
                                                   ?76.                                                            >76.
          !")                                                           !")

         !"#(                                                          !"#(

          !"#                                                           !"#

         !"'(                                                          !"'(

          !"'                                                           !"'

         !"!(                                                          !"!(

           !;                                                             !:
            !   !"#        !"$       !"%        !"&           '            !    !"#        !"$       !"%        !"&           '


 06-03-2012                      Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                    23
Experiments
                                                                          Results


        Fakes: silicon (fingerprint) and personal photo (faces)


      Extended LLR can be less robust than LLR to real fingerprint spoof attacks
                                      LLR
                     2                                                                                             Extended LLR
                    10                                                                                    2
                                                                                                         10



                     1
                    10                                                                                    1
                                                                                                         10
          FRR (%)




                                                                                               FRR (%)
                                                                       no spoof
                     0
                                                                       fing.
                    10                                                 face                               0
                                                                                                         10
                                                                       both
                                                                       w-fing.
                                                                       w-face
                     −1
                    10 −1                                                                                 −1
                      10      10
                                 0
                                            10
                                               1
                                                         10
                                                            2                                            10 −1        0            1             2
                                     FAR (%)                                                               10      10            10           10
                                                                                                                          FAR (%)




Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, FabioRoli, “Security evaluation of biometric authentication systems under realistic
spoofing attacks”, In IET Biometrics, In press, 2012.
      06-03-2012                        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                 24
Security evaluation method




06-03-2012     Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   25
Security evaluation

•      Security evaluation is required to have a more complete understanding of
       multimodal biometric systems’ performance

             to assess the robustness of the multimodal systems
             to design novel fusion rules robust to spoof attacks
             to choose the most robust fusion rule

•      Fabricating spoof attacks may be very difficult task

             costly and time consuming

•      We thus propose to simulate the effect of spoof attacks on corresponding
       matching score distribution




     06-03-2012         Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   26
Attack simulation

•  Factors: biometric trait spoofed, matching algorithm, forgery techniques and ability

•  Sets of matching scores from genuine users and impostors distributions are given

•  Baseline assumptions

      worst-case for the system (best-case for the attacker)
          p(score|Fake) = p(score|Genuine)  State-of-the-art

      best-case for the system (worst-case for the attacker)
           p(score|Fake) = p(score|Impostor)

      intermediate cases
            p(score|Fake) lies between p(score|Genuine) and p(score|Impostor)




   06-03-2012        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   27
Attack simulation
•  Models of spoof attacks match score distribution
                                                                                      Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis,
      based on baseline assumption                                                   and Fabio Roli, “Robustness Evaluation of Biometric
                                                                                      Systems under Spoof Attacks”, In 16th International
                                                                                      Conference Image Analysis and Processing (ICIAP),

•  Parametric model                                                                   pp.159–168, 2011.




      Fake: same parametric form as Genuine and Impostor ones

     µFake = α µGenuine + (1- α) µImpostor
                                                                               7
                                                                                                                            p(score|Genuine)

     σFake = α σGenuine + (1- α) σImpostor                                     6
                                                                                                                            p(score|Impostor)

                                                                                                                            p(score|Fake)
                                                                               5                                            α = 0.5
      α ∈ [0,1] : “Attack Strength”
                                                                               4


      state-of-the-art (worst-case)  α = 1                                   3


                                                                               2

•  Non-Parametric model
                                                                               1



     scoreFake = (1 - α) scoreImpostor + α scoreGenuine                        0
                                                                                0   0.1   0.2   0.3   0.4    0.5    0.6   0.7    0.8   0.9      1
                                                                                                            score


    06-03-2012          Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                           28
Security evaluation method
                      Training Phase                                                                                                                                   Testing Phase                              Matchers not attacked
                                                                                                   State-of-the-art                                                                              6

                                                                                          p(score|Fake) = p(score|Genuine)                                                                                                                                 p(score|Genuine)
                                                                                                                                                                                                 5
                                                                                                                                                                                                                                                           p(score|Impostor)
                                                                                                  Matchers under attack                                                                          4
                                                                              6

                                                                                                                                                 p(score|Genuine)                                3
                                                                              5
                                                                                                                                                 p(score|Impostor)
                                                                              4
                                                                                                                                                 p(score|Fake)                                   2



                                                                                                                                                                                                 1
                                                                              3



              Fused score distribution
                                                                                                                                                                                                 0
                                                                                                                                                                                                     0     0.1     0.2     0.3     0.4      0.5      0.6     0.7     0.8     0.9       1
                                                                              2
                                                                                                                                                                                                                                           score

6
                                                                              1
                                                                                                                                                                           Score Fusion
              Threshold                          p(score|Genuine)                                                                                                              Rule
5
                                                 p(score|Impostor)            0
                                                                                  0       0.1     0.2     0.3     0.4      0.5     0.6     0.7     0.8     0.9     1
                                                                                                                          score
                                                                                                                                                                                                                       multimodal biometric




                                                                                                                                                                                          accuracy
4



3                                                                                                     Our method                                                                                                             system
2
                                                                                                      Parametric
                                                                                           µFake = α µGenuine + (1- α) µImpostor
1
                                                                                           σFake = α σGenuine + (1- α) σImpostor
0
    0   0.1     0.2    0.3   0.4    0.5    0.6     0.7   0.8   0.9   1
                                                                                                                                                                                                     0         0.1 0.2 …………..…. 0.8 0.9 1
                                                                                                                                                                                                                       attack strength (α)
                                   score

                                                                                                       Non-parametric
                                                                           scoreFake              = (1 - α) scoreImpostor + α scoreGenuine

                                                                                                  Matchers under attack                                                                                          Matchers not attacked
                                                                                  6                                                                                                          6

                                                                                                                                                   p(score|Genuine)                                                                                      p(score|Genuine)
                                                                                  5
                                                                                                                                                   p(score|Impostor)                         5
                                                                                                                                                                                                                                                         p(score|Impostor)
                                                                                                                                                   p(score|Fake)
Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis                                 4                                                                                                          4


and Fabio Roli, “Robustness analysis of Likelihood                                3                                                                                        Score Fusion      3

Ratio score fusion rule for multi-modal biometric                                                                                                                              Rule
systems under spoof attacks”, In 45th IEEE Intl.                                  2                                                                                                          2



Carnahan Conference on Security Technology                                        1                                                                                                          1

(ICCST), pp. 237–244, 2011.
                                                                                  0                                                                                                          0
                                                                                      0     0.1     0.2     0.3     0.4     0.5      0.6     0.7     0.8     0.9       1                         0       0.1     0.2     0.3     0.4      0.5      0.6     0.7     0.8     0.9     1
                                                                                                                           score                                                                                                         score




                       06-03-2012                                        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                                                                                     29
Experiments
                                                                    Results
•  Matching score distributions

                             Fake faces: Photo                                                     Fake fingerprints: silicon
              0.09                                                                        0.45
                      Genuine                                                                                                       Genuine
              0.08    Impostor                                                                                                      Impostor
                                                                                           0.4
                      Fake                                                                                                          Fake
              0.07
                                                                                          0.35

              0.06                                                                         0.3
  Frequency




                                                                              Frequency
              0.05
                                                                                          0.25

              0.04
                                                                                           0.2

              0.03
                                                                                          0.15

              0.02
                                                                                           0.1

              0.01
                                                                                          0.05

                0
                0.4    0.5       0.6    0.7    0.8     0.9     1                            0
                                       score                                                0.49     0.5   0.51    0.52   0.53   0.54      0.55
                                                                                                                  score




        score distribution of fake trait is lying between Genuine and Impostor
         distributions


 06-03-2012                            Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                           30
Experiments
                                                                                                  Results
•  Can our method reasonably approximate a real fake score distribution?

        Hellinger Distance:
                                                                                                                          ∈ [0 , 2]

        Non-parametric model
                                                   Data set                                   Hellinger Distance                            α

                                                   Face                                            0.0939                             0.9144
                                                   Fingerprint                                     0.4397                             0.0522
                                           Face System                                                                         Fingerprint System
                      $                                                                   !                         )!!                                                       !
                               67839:;0<=,-./0,                                                                                                            4561789.:;*+,-.*
                               1:>0=,-./0,                                                                                                                 /8<.;*+,-.*
                      #                                                                                             %!!



                      +                                                                                             #!!
          1/02304-5




                                                                                                        /-.01.2+3




                      *                                                                                             (!!



                      )                                                                                             '!!



                      (                                                                                             &!!



                      !!                                                                                              !!
                      !"#   !"##   !"$   !"$#     !"%    !"%#   !"&   !"&#   !"'   !"'#   (                          !"#$%   !"%    !"%!%           !"%&    !"%&%         !"%'
                                                        ,-./0                                                                               *+,-.



 06-03-2012                                         Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                                 31
Experiments
                                                                                                                Results
•  Does our method provide a good estimate of the performance under attacks?

                                       Performance measure: False Acceptance Rate (FAR)

                                       Performance estimation of unimodal biometric systems under spoof attack

                                                           Face System                                                                                                          Fingerprint System
                                    100                                                                                                               100
                                                                                                                                                                                            the real Performance
                                                                                                                                                                                            the estimated performance by our model
                                     90                                                                                                                90
                                                                                                                                                                                            the estimated performance by state!of!the!art

                                     80                                                                                                                80
   False Acceptance Rate ! FAR(%)




                                                                                                                     False Acceptance Rate ! FAR(%)
                                     70                                                                                                                70


                                     60                                                                                                                60


                                     50                                                                                                                50


                                     40                                                                                                                40


                                     30                                                                                                                30


                                     20        the real Performance                                                                                    20

                                               the estimated performance by our model
                                     10                                                                                                                10
                                               the estimated performance by state!of!the!art

                                      0                                                                                                                 0
                                                                                                                                                            0.5   0.51   0.52   0.53   0.54    0.55   0.56     0.57    0.58     0.59        0.6
                                      0.5   0.55   0.6   0.65   0.7      0.75   0.8   0.85     0.9   0.95   1
                                                                                                                                                                                          Threshold
                                                                      Threshold




 06-03-2012                                                       Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                                                                                   32
Experiments
                                                Results
  Comparison with the worst-case spoof attacks


              Operational        Real         Approximated                 Approximated
                   Point         FAR          FAR                          FAR
                                              (our model)                  (worst-case assumption)
Face            zeroFAR            4.80               4.20                             11.40
System           1%FAR            23.50              23.30                             24.30
Fingerprint     zeroFAR           50.60              62.50                             94.80
System           1%FAR            60.00              80.80                             95.10




 06-03-2012        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   33
Experiments
                                                                                                                     Results
    Performance estimation of multimodal biometric systems under spoof attack
                                                             Face System                                                                                                       Fingerprint System
                                          !""                                                                !                                                  #!!                                                                       !
                                                                            :0549947?                                                                                                              ;165::58@
                                           *"                               -.415/800@549947?5<@47.>                                                             +!                                ./5260911A65::58@6=AB;C/.9.B;:?
                                                                            /ABC149.25/800@549947?5<@47.>                                                                                          0BDE25:/360911A65::58@6=AB;C/.9.B;:?
                                           #"                                                                                                                    *!
         341/.5677.894:7.5;49.5!536;<=>




                                                                                                                               4520/6788/9:5;8/6<5:/6!647<=>?
                                           )"                                                                                                                    )!

                                           $"                                                                                                                    (!

                                           ("                                                                                                                    '!

                                           %"                                                                                                                    &!

                                           '"                                                                                                                    %!

                                           &"                                                                                                                    $!

                                           !"                                                                                                                    #!

                                            "!
                                                 !#     !$          !%                  !&                       "
                                                                                                                                                                  !!
                                            !"         !"          !"                 !"                    !"                                                     !   !"#   !"$   !"%   !"&      !"'    !"(    !")     !"*    !"+        #
                                                                +,-./,012                                                                                                                      ,-./0-123




    Comparison with the worst-case spoof attacks
                                                      Operational                                Real                   Approximated                                                               Approximated
                                                            Point                                FAR                     FAR                                                                       FAR
                                                                                                                        (our model)                                                                (worst-case assumption)
Face                                                    zeroFAR                                  2.51                   2.70                                                                           5.91
System                                                       1%FAR                               5.13                   8.93                                                                         11.24
Fingerprint                                                 zeroFAR                              5.20                   4.83                                                                         95.05
System                                                       1%FAR                               6.27                   6.35                                                                         98.01
 06-03-2012                                                     Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                                                                                 34
Experiments
                                            Case study
            •  Robustness analysis of likelihood ratio score fusion rule using parametric
               model

                    a bi-modal system using LLR fusion rule with Gaussian distribution

                    p(s1 | G) p(s2 | G)        σ σ  1 (s − µ ) 2 (s − µ ) 2 (s − µ ) 2 (s − µ ) 2 
    z(s1,s2 ) = log                      = log I s 1 I s 2  +  1 2 I s1 + 2 2 I s 2 − 1 2 Gs1 − 2 2 Gs 2 
                                              σ σ  2  σ
                     p(s1 | I) p(s2 | I)       Gs 1 Gs 2         I s1      σ Is2       σ Gs1     σ Gs 2 

                       z(s1,s2 ) − log t = As12 + Bs1s2 + Cs2 + Ds1 + Es2 + F
                                                            2


€                           €
                       z(s1,s2 ) − log t = 0

        €           B2 - 4AC < 0 : an ellipse
                    B2 - 4AC = 0 : a parabola                               FAR(t) =       ∫∫   G
                                                                                                     p(s1 | I) p(s2 | I)ds1ds2
        €           B2 - 4AC > 0 : an hyperbola
                    FAR under spoof attack: when only matcher 1 is spoofed
                                                         €
                                    FAR(t) =       ∫∫G p(s1 | F) p(s2 | I)ds1ds2

          06-03-2012              Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar            35
Experiments
                                            Data sets

•  NIST Biometric score set Release 1(BSSR1)

        two different face matchers (C & G)

        one fingerprint matchers (LI & RI)

        no. of clients: 517
             for each client 1 genuine & 516 impostor samples

•  Four multimodal systems: G-RI, G-LI, C-RI, and C-LI

•  α (attack strength) values: 0 (best-case) to 1 (worst-case) scenario




 06-03-2012        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   36
Experiments
                                                                                                           Results

  Performance measure: False Acceptance Rate (FAR)
  α = 0  absence of attacks
  α = 1  worst-case scenario (state-of-the-art)

                                         At 0.01% FAR operational point                                                                                    At 1% FAR operational point
                                   $                                                                                                                $
                                  #!                                                                   !                                           #!                                                                   !




                                                                                                                 ,-78/09::/;2-4:/0<-2/0!0,9<0=>?
,-78/09::/;2-4:/0<-2/0!0,9<0=>?




                                   #
                                  #!




                                                                                                                                                    #
                                   !                                                                                                               #!
                                  #!




                                   !#
                                  #!


                                                                                                                                                                                            @@<0!0,A45/3;3A4201;BBC/D
                                                                           @@<0!0,A45/3;3A4201;BBC/D
                                                                                                                                                                                            @@<0!0,-:/01;BBC/D
                                                                           @@<0!0,-:/01;BBC/D                                                       !
                                                                                                                                                   #! !
                                   !$
                                  #! !                                                                                                                !   !"#   !"$   !"%   !"&    !"'    !"(   !")    !"*    !"+       #
                                     !   !"#   !"$   !"%   !"&    !"'    !"(   !")    !"*    !"+       #                                                                      ,-./0123/4526
                                                             ,-./0123/4526




  FAR under attacks increases as the fake strength increases


06-03-2012                                                        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                                                         37
Experiments
                                                                                                            Results

                                          At 0.01% FAR operational point                                                                                    At 1% FAR operational point
                                    $                                                                                                                $
                                   #!                                                                   !                                           #!                                                                   !




                                                                                                                  ,-78/09::/;2-4:/0<-2/0!0,9<0=>?
 ,-78/09::/;2-4:/0<-2/0!0,9<0=>?




                                    #
                                   #!




                                                                                                                                                     #
                                    !                                                                                                               #!
                                   #!




                                    !#
                                   #!


                                                                                                                                                                                             @@<0!0,A45/3;3A4201;BBC/D
                                                                            @@<0!0,A45/3;3A4201;BBC/D
                                                                                                                                                                                             @@<0!0,-:/01;BBC/D
                                                                            @@<0!0,-:/01;BBC/D                                                       !
                                                                                                                                                    #! !
                                    !$
                                   #! !                                                                                                                !   !"#   !"$   !"%   !"&    !"'    !"(   !")    !"*    !"+       #
                                      !   !"#   !"$   !"%   !"&    !"'    !"(   !")    !"*    !"+       #                                                                      ,-./0123/4526
                                                              ,-./0123/4526




  fingerprint spoofing: FAR increases very quickly

  face spoofing: relatively a more graceful increase of FAR

  multimodal biometric systems can be vulnerable to spoof attacks against only
   one matcher
 06-03-2012                                                        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                                                         38
Score fusion rules ranking method




06-03-2012   Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   39
Score fusion rule ranking method
                      Training Phase                                                                                                                 Testing Phase
                                                                                                       Our method
                                                                                                                                                                      6
                                                                                                                                                                                         Threshold                                     p(score|Genuine)
                                                                                                Parametric                                                            5
                                                                                                                                                                                                                                       p(score|Impostor)
                                                                                     µFake = α µGenuine + (1- α) µImpostor                                            4
                                                                                                                                                                                                                                       p(score|Fake)
                                                                                     σFake = α σGenuine + (1- α) σImpostor                                            3




                                                                                                Non-parametric                                                        2




                                                                          scoreFake        = (1 - α) scoreImpostor + α scoreGenuine                                   1



                                                                                                                                                                      0
                                                                                                                                                                          0       0.1        0.2       0.3   0.4    0.5    0.6   0.7    0.8   0.9      1
                                                                                                                                                                                                                   score



              Fused score distribution                                                     Matchers under attack
6                                                                            6

              Threshold                         p(score|Genuine)                                                                   p(score|Genuine)
5
                                                p(score|Impostor)            5
                                                                                                                                   p(score|Impostor)
4                                                                            4
                                                                                                                                   p(score|Fake)

3                                                                            3



2                                                                            2



1                                                                            1                                                                                                    1            Rule 1                                          Rule 1

0                                                                            0                                                                                                     2           Rule 2                                          Rule 2




                                                                                                                                                                      ranking
    0   0.1     0.2   0.3   0.4    0.5    0.6     0.7   0.8   0.9   1            0   0.1   0.2   0.3   0.4    0.5    0.6    0.7     0.8    0.9   1
                                                                                                             score
                                  score
                                                                                                                                                       Score Fusion                3               Rule 3          …………..….                     Rule 3
                                                                                           Matchers not attacked                                          Rules




                                                                                                                                                                                ……..….


                                                                                                                                                                                              ……..….




                                                                                                                                                                                                                                              ……..….
                                                                             6

                                                                                                                           p(score|Genuine)
                                                                             5
                                                                                                                           p(score|Impostor)
                                                                             4



                                                                             3                                                                                                           0    0.1 0.2 …………..…. 0.8 0.9 1
Zahid Akhtar, Giorgio Fumera, Gian Luca                                                                                                                                                                      attack strength (α)
                                                                             2
Marcialis and Fabio Roli, “Evaluation of
multimodal biometric score fusion rules                                      1


under spoof attacks”, In 5th IAPR/IEEE                                       0

Intl. Conf. on Biometrics (ICB), 2012.                                           0   0.1   0.2   0.3   0.4    0.5
                                                                                                             score
                                                                                                                     0.6     0.7     0.8   0.9   1




                      06-03-2012                                        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                                                              40
Experiments
                                                    Results
•  Ranking of fusion rules according to their FAR under real spoof attacks

      Fakes: silicon (fingerprint) and photo (faces)

            Face Spoofing                                           Fingerprint Spoofing
    zeroFAR             1% FAR                                zeroFAR               1% FAR
FAR(%) Rules       FAR(%) Rules                           FAR(%) Rules          FAR(%) Rules

  0.04    ExtLLR        2.26       ExtLLR                     0.00      Bayesian              1.05     Bayesian
  0.05    LLR           2.29       LLR                        0.00      Sum                   1.15     Sum
  0.27    W. Product   10.72       W. Product                 0.00      Product               1.33     Product
  0.48    W. Sum       18.37       W. Sum                    24.56      W. Sum               42.59     W. Sum
  1.30    Perceptron   20.95       Perceptron                27.73      Perceptron           44.11     Perceptron
  6.75    Bayesian     23.47       Bayesian                  34.87      W. Product           51.10     W. Product
  6.80    Sum          23.49       Sum                       50.42      ExtLLR               60.31     ExtLLR
  6.82    Product      23.57       Product                   50.43      LLR                  60.32     LLR


      our method always predicted the correct ranking corresponding to the optimal
       α value

    06-03-2012         Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar          41
Experiments
                                                                                        Results

                    Fakes: silicon (fingerprint) and photo (faces)

                    Optimal α values : face  0.9144                                                                fingerprint  0.0522

                                    Face spoofing                                                                          Fingerprint spoofing
                                                                            !                                                                                             !


          #                                                                                            #


          $                                                                                            $


                                                                                :.;4<9.5               %                                                                      :.;4<9.5
          %
                                                                                2=>                                                                                           2=>
                                                                                                                                                                              ?3@A=/-




                                                                                             8.50956
                                                                                ?3@A=/-                &
8.50956




          &
                                                                                B"12=>                                                                                        B"12=>
                                                                                                                                                                              ?43/4C-3@5
                                                                                ?43/4C-3@5             '
          '                                                                                                                                                                   B"1?3@A=/-
                                                                                B"1?3@A=/-
                                                                                                                                                                              DE-FF8
                                                                                DE-FF8                 (
          (                                                                                                                                                                   FF8
                                                                                FF8
                                                                                                       )
          )

                                                                                                       *
          *

                                                                                                           !
              !                                                                                            !   !"#   !"$    !"%   !"&   !"'    !"(  !")   !"*   !"+   #
              !   !"#   !"$   !"%   !"&   !"'    !"(  !")   !"*   !"+   #                                                           ,--./012-3456-7
                                      ,--./012-3456-7




                      fingerprint spoofing
                            predicted ranking of each rule remains constant
                            bayesian rule always exhibits the best ranking

                  06-03-2012                           Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                          42
Experiments
                                                                                        Results

                    Fakes: silicon (fingerprint) and photo (faces)

                    Optimal α values : face  0.9144                                                                fingerprint  0.0522

                                    Face spoofing                                                                          Fingerprint spoofing
                                                                            !                                                                                             !


          #                                                                                            #


          $                                                                                            $


                                                                                :.;4<9.5               %                                                                      :.;4<9.5
          %
                                                                                2=>                                                                                           2=>
                                                                                                                                                                              ?3@A=/-




                                                                                             8.50956
                                                                                ?3@A=/-                &
8.50956




          &
                                                                                B"12=>                                                                                        B"12=>
                                                                                                                                                                              ?43/4C-3@5
                                                                                ?43/4C-3@5             '
          '                                                                                                                                                                   B"1?3@A=/-
                                                                                B"1?3@A=/-
                                                                                                                                                                              DE-FF8
                                                                                DE-FF8                 (
          (                                                                                                                                                                   FF8
                                                                                FF8
                                                                                                       )
          )

                                                                                                       *
          *

                                                                                                           !
              !                                                                                            !   !"#   !"$    !"%   !"&   !"'    !"(  !")   !"*   !"+   #
              !   !"#   !"$   !"%   !"&   !"'    !"(  !")   !"*   !"+   #                                                           ,--./012-3456-7
                                      ,--./012-3456-7




                      face spoofing
                           two different rankings are predicted: one for α < 0.5, and the other α ≥ 0.5
                           weighted sum or weighted product rule can be reasonable choice

                  06-03-2012                           Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar                                          43
Conclusions and future works

•  Multimodal biometric systems are not intrinsically robust

•  Multimodal systems can be more robust than unimodal systems

•  Worst-case hypothesis does not hold in real scenarios

•  Methodology for security evaluation without fabrication of spoof attacks

        two models for fake score distribution based on the concept of “Attack
         strength”

        developed models are a good alternative to the worst-case assumption

•  Methodology for Ranking the score fusion rule under spoof attacks




06-03-2012        Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   44
Conclusions and future works
•  Experimental results provide useful insights for the design of robust multimodal
   biometric systems

•  Future works

        more accurate modelling and simulation of fake score distributions

        extensive validation of our models on data sets with significant spoof
         attacks of different biometric traits

        development of robust score fusion rules




06-03-2012         Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   45
Thank you




06-03-2012   Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar   46

Contenu connexe

Tendances

Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Onlines-mueller
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 

Tendances (20)

Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
biometrics
biometricsbiometrics
biometrics
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 

Similaire à Zahid Akhtar - Ph.D. Defense Slides

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET Journal
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsAnivar Aravind
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkMahesh Shitole
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Ramesh Nagappan
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometricssuniljoshi151
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
Vincent Lee Experience
Vincent Lee ExperienceVincent Lee Experience
Vincent Lee ExperienceVincent Lee
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET Journal
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...ZTech Proje
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographykanchannawkar
 

Similaire à Zahid Akhtar - Ph.D. Defense Slides (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
(2007) BioKey - Privacy Preserving Biometric Authentication
(2007) BioKey - Privacy Preserving Biometric Authentication(2007) BioKey - Privacy Preserving Biometric Authentication
(2007) BioKey - Privacy Preserving Biometric Authentication
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
IRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication SystemsIRJET- A Review on Security Attacks in Biometric Authentication Systems
IRJET- A Review on Security Attacks in Biometric Authentication Systems
 
BIOMATRICS
BIOMATRICSBIOMATRICS
BIOMATRICS
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Vincent Lee Experience
Vincent Lee ExperienceVincent Lee Experience
Vincent Lee Experience
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
 

Plus de Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Pluribus One
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019Pluribus One
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Pluribus One
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsPluribus One
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksPluribus One
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresPluribus One
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Pluribus One
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Pluribus One
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Pluribus One
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Pluribus One
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringPluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Pluribus One
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Pluribus One
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Pluribus One
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Pluribus One
 

Plus de Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 

Dernier

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Zahid Akhtar - Ph.D. Defense Slides

  • 1. PhD in Electronic and Computer Engineering Security of Multimodal Biometric Systems against Spoof Attacks Zahid Akhtar Advisor: Prof. Fabio Roli Co-advisors: Dr. Giorgio Fumera Dr. Gian Luca Marcialis Pattern Recognition and Applications Group Department of Electrical and Electronic Engineering University of Cagliari, Italy
  • 2. Outline •  Background concepts   biometric systems and their security issues •  Contributions of this thesis   Robustness evaluation of multimodal biometric systems against real spoof attacks   Proposed methods for security evaluation of multimodal biometric systems against spoof attacks   Experiments •  Conclusions and future works 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 2
  • 3. Biometrics •  Examples of body traits that can be used for biometric recognition Face Fingerprint Iris Hand geometry Palmprint Signature Voice Gait 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 3
  • 4. Biometric authentication systems •  Enrollment Phase User Identity XTemplate Biometric ` Feature System Sensor Extractor Database User •  Verification Phase Claimed user Identity System Genuine Database Yes XTemplate XQuery Score > Biometric Feature Sensor Extractor Matcher Threshold Score User No Impostor 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 4
  • 5. Biometric authentication systems •  Unimodal Biometric System Genuine Yes Biometric Feature Fingerprint Score > Sensor Extractor Matcher Threshold Score System No Impostor Database •  Multimodal Biometric System Biometric s1 Feature Face Genuine Sensor Extractor Matcher Yes Score Fusion Score > System Rule Threshold Database Score f(s1,s2) Biometric Feature Fingerprint No s2 Impostor Sensor Extractor Matcher 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 5
  • 6. Spoof (Direct) Attacks •  Spoof attacks   attacks at the user interface (sensor)   presentation of a fake biometric trait •  Countermeasures   Liveness detection methods   Multimodal biometric Systems  “intrinsically” robust? 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 6
  • 7. State-of-the-art •  Vulnerability identification   contrary to a common belief, a multimodal biometric system can be evaded even if only one biometric trait is spoofed [Rodrigues et al. JVLC 2009, Rodrigues et al. BTAS 2010, P. A. Jonhson et al. WIFS 2010] •  Robustness evaluation against spoof attacks   evaluation under working worst-case hypothesis   “worst-case” scenario, where it is assumed that the attacker is able to fabricate a perfect replica of a biometric trait   Fake scores are simulated under a worst-case scenario, resampling genuine user scores p(score|Impostor, spoofing) = p(score|Genuine) 6 5 4 p(score|Genuine) 3 p(score|Impostor) p(score|Fake) 2 1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 score 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 7
  • 8. State-of-the-art •  Defense strategies against spoof attacks   two robust fusion rule under a worst-case hypothesis [Rodrigues et al. JVLC 2009] •  No methodology exist to evaluate the performance of biometric systems against real spoof attack 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 8
  • 9. Open issues 1.  Vulnerability identification against real spoof attacks   vulnerability of multimodal biometric systems to real spoof attacks that may be exploited by an attacker to mislead the system 2.  Performance evaluation methods against spoof attacks   standard performance evaluation does not provide information about the security1 of a system against spoof attack 3.  Robust system design   current theory and design methods of biometric systems do not take into account the vulnerability to such adversary attacks. 1 In this thesis, we will use both “security” and “robustness” terms interchangeably, to indicate performance of biometric systems against spoof attacks. 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 9
  • 10. Main contributions of this thesis 1.  Security of multimodal biometric systems against real spoof attacks   to provide empirical proof that multimodal systems are not intrinsically robust against real spoof attacks 2.  Worst-case hypothesis validation   to verify that current worst-case scenario is not realistic under “real” attacks 3.  Security evaluation method   to provide an estimate of the performance of multimodal biometric system against real spoof attack without fabrication of fake traits   to select a more robust score fusion rule according to its performance under spoof attack 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 10
  • 11. Problems •  Can multimodal biometric systems be actually cracked by attacking only one sensor via real spoof attacks?   to validate the state-of-the-art results obtained under “worst-case” spoof attack scenario The scope of state-of-the-art results are very limited since they were obtained by simulating the scores of spoofed traits under worst-case scenario. 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 11
  • 12. Problems •  Is the “worst-case” scenario hypothesized in literature for spoofing biometrics representative of real spoof attacks?   whether and to what extend the “worst-case” scenario is realistic To what extent the drop in performance under the “worst-case” attack scenario is representative of the performance under real spoof attacks. 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 12
  • 13. Problems •  How can the security of multimodal systems be evaluated, under realistic attacks, without fabricating spoofed traits?   a current issue is to have a measurements of the performance drop under spoofing attacks for uni and multimodal systems   collecting “attack” samples is a non-trivial task It is of interest to evaluate robustness of biometric systems under different qualities of fake traits. 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 13
  • 14. Experiments •  Multimodal system with face and fingerprint matchers   Fingerprint: Bozorth3 (NIST) and Verifinger (Neurotechnology)   Face: Elastic Bunch Graph Matching - EBGM Biometric s1 Feature Face Genuine Sensor Extractor Matcher Yes Score Fusion Score > System Rule Threshold Database Score f(s1,s2) Biometric Feature Fingerprint No s2 Impostor Sensor Extractor Matcher 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 14
  • 15. Experiments Score fusion rules 1.  Sum s = s1 + s2 2.  Product s = s1 × s2 3.  Bayesian s = ( s1 × s2 ) / [(1- s1)(1- s2) + (s1 × s2)] 4.  Weighted Sum (LDA) s = w0 + w1s1 × w2s2 5.  Weighted Product s = s1w × s1−w 2 6.  Perceptron s = 1 / 1 + exp[(w0 + w1s1 × w2s2)] 7.  Likelihood ratio (LLR) s = p(s1,s2|G) / p(s1,s2|I) € 8.  Extended LLR (ExtLLR) p(s1,s2|I) = α 3 (1− c1 )(1+ c 2 ) p(s1 | G) p(s2 | I)   explicitly models the distribution of spoof attacks (worst-case) + α (1+ c1 )(1− c 2 ) p(s1 | I) p(s2 | G) 3 [Rodrigues et al. JVLC 2009] + α (1− c1 )(1− c 2 ) p(s1 | G) p(s2 | G) 3 € [(1− α ) + α (c1 + c 2 + c1c 2 )]p(s1 | I) p(s2 | I) 3 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 15 €
  • 16. Experiments Fake biometric traits •  Fake fingerprints by “consensual method”   mould: plasticine-like material   cast: silicon, latex, gelatin and alginate ! ! ! Live Fake (latex) Fake (silicon) ! ! ! ! ! ! •  Fake faces by “photo-attack”, “personal photo attack” and “print-attack”   photo displayed on a laptop screen to camera   Personal photos (like those appearing an social networks)   video clips of printed-photo attacks ! ! ! Live Fake (photo) Fake (personal ) ! ! ! 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 16
  • 17. Experiments Data sets Data Set Number Number Number of clients of spoofs of live per client per client Silicon 142 20 20 Latex 80 3 5 Gelatin 80 3 5 Alginate 80 3 5 Photo Attack 40 60 60 Personal Photo Attack 25 3(avg.) 60 Print Attack 50 12 16   12 chimerical multimodal data sets with 8 fusion rules   12 × 8 = 96 multimodal biometric systems 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 17
  • 18. Robustness evaluation against real spoof attacks 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 18
  • 19. Experiments Results •  can multimodal systems be cracked by attacking only one modality via real spoof attacks?   Fakes: latex (fingerprint) and photo (faces) LDA 2 LLR 10 2 10 1 10 1 10 FRR (%) FRR (%) no spoof fing. 0 10 face 0 10 both w-fing. w-face −1 10 −1 −1 10 10 0 10 1 10 2 10 −1 0 1 2 FAR (%) 10 10 10 10 FAR (%)   @1% FAR operational point (LDA): FAR under attacks: 64.91% (fingerprint spoofing) and 2.17% (face spoofing) 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 19
  • 20. Experiments Results   Fakes: silicon (fingerprint) and photo (faces) Product LLR 2 2 10 10 1 1 10 10 FRR (%) FRR (%) fing. + face (no spoof) fing.+ face spoof 0 fing. (no spoof) 0 10 fing. spoof 10 face (no spoof) face spoof −1 −1 10 −1 0 1 2 10 −1 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%)   however the considered multimodal systems are more robust than unimodal ones, even when all biometric traits are spoofed Zahid Akhtar, Battista Biggio, Giorgio Fumera, Gian Luca Marcialis, “Robustnessof Multi-modal Biometric Systems under Realistic Spoof Attacksagainst All Traits”, In IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS), pp. 5–10, 2011. 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 20
  • 21. Worst-case hypothesis validation 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 21
  • 22. Experiments Results •  Is the “worst-case” scenario for spoofing biometrics representative of real spoof attacks?   Fakes: latex (fingerprint) and photo (faces) LLR 2 Extended LLR 10 2 10 1 10 1 10 FRR (%) FRR (%) no spoof 0 fing. 10 face 0 10 both w-fing. w-face −1 10 −1 −1 10 10 0 10 1 10 2 10 −1 0 1 2 FAR (%) 10 10 10 10 FAR (%)   worst case assumption (dashed lines) holds to some extent for face spoofing but not for fingerprint spoofing Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, FabioRoli, “Robustness of multi-modal biometric verification systems under realistic spoofing attacks”, In International Joint Conference on Biometrics (IJCB), 2011. 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 22
  • 23. Experiments Results •  Matching score distributions   Fake faces photo personal photo !"!% * !"!% * +,-./-, +,-./-, /0123425 /0123425 !"!) !"!) 678, 678, !"!$ !"!$ !"!( !"!( !"!# !"!# !"!' !"!' !* !* ! !"# !"$ !"% !"& ' ! !"# !"$ !"% !"& '   Fake fingerprints silicon *+,-./''!01213/4)!0+15./3+67!8+*+91: alginate *+,-./''!01213/4)!0+15./3+67!7*8+97/ !"$ ; !"$ : <.:=+:. 8.9;+9. !")( +5>18/13 !")( +5<1=/13 ?76. >76. !") !") !"#( !"#( !"# !"# !"'( !"'( !"' !"' !"!( !"!( !; !: ! !"# !"$ !"% !"& ' ! !"# !"$ !"% !"& ' 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 23
  • 24. Experiments Results   Fakes: silicon (fingerprint) and personal photo (faces) Extended LLR can be less robust than LLR to real fingerprint spoof attacks LLR 2 Extended LLR 10 2 10 1 10 1 10 FRR (%) FRR (%) no spoof 0 fing. 10 face 0 10 both w-fing. w-face −1 10 −1 −1 10 10 0 10 1 10 2 10 −1 0 1 2 FAR (%) 10 10 10 10 FAR (%) Battista Biggio, Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, FabioRoli, “Security evaluation of biometric authentication systems under realistic spoofing attacks”, In IET Biometrics, In press, 2012. 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 24
  • 25. Security evaluation method 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 25
  • 26. Security evaluation •  Security evaluation is required to have a more complete understanding of multimodal biometric systems’ performance   to assess the robustness of the multimodal systems   to design novel fusion rules robust to spoof attacks   to choose the most robust fusion rule •  Fabricating spoof attacks may be very difficult task   costly and time consuming •  We thus propose to simulate the effect of spoof attacks on corresponding matching score distribution 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 26
  • 27. Attack simulation •  Factors: biometric trait spoofed, matching algorithm, forgery techniques and ability •  Sets of matching scores from genuine users and impostors distributions are given •  Baseline assumptions   worst-case for the system (best-case for the attacker)   p(score|Fake) = p(score|Genuine)  State-of-the-art   best-case for the system (worst-case for the attacker)   p(score|Fake) = p(score|Impostor)   intermediate cases   p(score|Fake) lies between p(score|Genuine) and p(score|Impostor) 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 27
  • 28. Attack simulation •  Models of spoof attacks match score distribution Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis,   based on baseline assumption and Fabio Roli, “Robustness Evaluation of Biometric Systems under Spoof Attacks”, In 16th International Conference Image Analysis and Processing (ICIAP), •  Parametric model pp.159–168, 2011.   Fake: same parametric form as Genuine and Impostor ones µFake = α µGenuine + (1- α) µImpostor 7 p(score|Genuine) σFake = α σGenuine + (1- α) σImpostor 6 p(score|Impostor) p(score|Fake) 5 α = 0.5   α ∈ [0,1] : “Attack Strength” 4   state-of-the-art (worst-case)  α = 1 3 2 •  Non-Parametric model 1 scoreFake = (1 - α) scoreImpostor + α scoreGenuine 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 score 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 28
  • 29. Security evaluation method Training Phase Testing Phase Matchers not attacked State-of-the-art 6 p(score|Fake) = p(score|Genuine) p(score|Genuine) 5 p(score|Impostor) Matchers under attack 4 6 p(score|Genuine) 3 5 p(score|Impostor) 4 p(score|Fake) 2 1 3 Fused score distribution 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 2 score 6 1 Score Fusion Threshold p(score|Genuine) Rule 5 p(score|Impostor) 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 score multimodal biometric accuracy 4 3 Our method system 2 Parametric µFake = α µGenuine + (1- α) µImpostor 1 σFake = α σGenuine + (1- α) σImpostor 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 …………..…. 0.8 0.9 1 attack strength (α) score Non-parametric scoreFake = (1 - α) scoreImpostor + α scoreGenuine Matchers under attack Matchers not attacked 6 6 p(score|Genuine) p(score|Genuine) 5 p(score|Impostor) 5 p(score|Impostor) p(score|Fake) Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis 4 4 and Fabio Roli, “Robustness analysis of Likelihood 3 Score Fusion 3 Ratio score fusion rule for multi-modal biometric Rule systems under spoof attacks”, In 45th IEEE Intl. 2 2 Carnahan Conference on Security Technology 1 1 (ICCST), pp. 237–244, 2011. 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 score score 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 29
  • 30. Experiments Results •  Matching score distributions Fake faces: Photo Fake fingerprints: silicon 0.09 0.45 Genuine Genuine 0.08 Impostor Impostor 0.4 Fake Fake 0.07 0.35 0.06 0.3 Frequency Frequency 0.05 0.25 0.04 0.2 0.03 0.15 0.02 0.1 0.01 0.05 0 0.4 0.5 0.6 0.7 0.8 0.9 1 0 score 0.49 0.5 0.51 0.52 0.53 0.54 0.55 score   score distribution of fake trait is lying between Genuine and Impostor distributions 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 30
  • 31. Experiments Results •  Can our method reasonably approximate a real fake score distribution?   Hellinger Distance: ∈ [0 , 2]   Non-parametric model Data set Hellinger Distance α Face 0.0939 0.9144 Fingerprint 0.4397 0.0522 Face System Fingerprint System $ ! )!! ! 67839:;0<=,-./0, 4561789.:;*+,-.* 1:>0=,-./0, /8<.;*+,-.* # %!! + #!! 1/02304-5 /-.01.2+3 * (!! ) '!! ( &!! !! !! !"# !"## !"$ !"$# !"% !"%# !"& !"&# !"' !"'# ( !"#$% !"% !"%!% !"%& !"%&% !"%' ,-./0 *+,-. 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 31
  • 32. Experiments Results •  Does our method provide a good estimate of the performance under attacks?   Performance measure: False Acceptance Rate (FAR)   Performance estimation of unimodal biometric systems under spoof attack Face System Fingerprint System 100 100 the real Performance the estimated performance by our model 90 90 the estimated performance by state!of!the!art 80 80 False Acceptance Rate ! FAR(%) False Acceptance Rate ! FAR(%) 70 70 60 60 50 50 40 40 30 30 20 the real Performance 20 the estimated performance by our model 10 10 the estimated performance by state!of!the!art 0 0 0.5 0.51 0.52 0.53 0.54 0.55 0.56 0.57 0.58 0.59 0.6 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 Threshold Threshold 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 32
  • 33. Experiments Results   Comparison with the worst-case spoof attacks Operational Real Approximated Approximated Point FAR FAR FAR (our model) (worst-case assumption) Face zeroFAR 4.80 4.20 11.40 System 1%FAR 23.50 23.30 24.30 Fingerprint zeroFAR 50.60 62.50 94.80 System 1%FAR 60.00 80.80 95.10 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 33
  • 34. Experiments Results   Performance estimation of multimodal biometric systems under spoof attack Face System Fingerprint System !"" ! #!! ! :0549947? ;165::58@ *" -.415/800@549947?5<@47.> +! ./5260911A65::58@6=AB;C/.9.B;:? /ABC149.25/800@549947?5<@47.> 0BDE25:/360911A65::58@6=AB;C/.9.B;:? #" *! 341/.5677.894:7.5;49.5!536;<=> 4520/6788/9:5;8/6<5:/6!647<=>? )" )! $" (! (" '! %" &! '" %! &" $! !" #! "! !# !$ !% !& " !! !" !" !" !" !" ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # +,-./,012 ,-./0-123   Comparison with the worst-case spoof attacks Operational Real Approximated Approximated Point FAR FAR FAR (our model) (worst-case assumption) Face zeroFAR 2.51 2.70 5.91 System 1%FAR 5.13 8.93 11.24 Fingerprint zeroFAR 5.20 4.83 95.05 System 1%FAR 6.27 6.35 98.01 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 34
  • 35. Experiments Case study •  Robustness analysis of likelihood ratio score fusion rule using parametric model   a bi-modal system using LLR fusion rule with Gaussian distribution p(s1 | G) p(s2 | G)  σ σ  1 (s − µ ) 2 (s − µ ) 2 (s − µ ) 2 (s − µ ) 2  z(s1,s2 ) = log = log I s 1 I s 2  +  1 2 I s1 + 2 2 I s 2 − 1 2 Gs1 − 2 2 Gs 2  σ σ  2  σ p(s1 | I) p(s2 | I)  Gs 1 Gs 2   I s1 σ Is2 σ Gs1 σ Gs 2  z(s1,s2 ) − log t = As12 + Bs1s2 + Cs2 + Ds1 + Es2 + F 2 € € z(s1,s2 ) − log t = 0 €   B2 - 4AC < 0 : an ellipse   B2 - 4AC = 0 : a parabola FAR(t) = ∫∫ G p(s1 | I) p(s2 | I)ds1ds2 €   B2 - 4AC > 0 : an hyperbola   FAR under spoof attack: when only matcher 1 is spoofed € FAR(t) = ∫∫G p(s1 | F) p(s2 | I)ds1ds2 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 35
  • 36. Experiments Data sets •  NIST Biometric score set Release 1(BSSR1)   two different face matchers (C & G)   one fingerprint matchers (LI & RI)   no. of clients: 517   for each client 1 genuine & 516 impostor samples •  Four multimodal systems: G-RI, G-LI, C-RI, and C-LI •  α (attack strength) values: 0 (best-case) to 1 (worst-case) scenario 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 36
  • 37. Experiments Results   Performance measure: False Acceptance Rate (FAR)   α = 0  absence of attacks   α = 1  worst-case scenario (state-of-the-art) At 0.01% FAR operational point At 1% FAR operational point $ $ #! ! #! ! ,-78/09::/;2-4:/0<-2/0!0,9<0=>? ,-78/09::/;2-4:/0<-2/0!0,9<0=>? # #! # ! #! #! !# #! @@<0!0,A45/3;3A4201;BBC/D @@<0!0,A45/3;3A4201;BBC/D @@<0!0,-:/01;BBC/D @@<0!0,-:/01;BBC/D ! #! ! !$ #! ! ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # ,-./0123/4526 ,-./0123/4526   FAR under attacks increases as the fake strength increases 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 37
  • 38. Experiments Results At 0.01% FAR operational point At 1% FAR operational point $ $ #! ! #! ! ,-78/09::/;2-4:/0<-2/0!0,9<0=>? ,-78/09::/;2-4:/0<-2/0!0,9<0=>? # #! # ! #! #! !# #! @@<0!0,A45/3;3A4201;BBC/D @@<0!0,A45/3;3A4201;BBC/D @@<0!0,-:/01;BBC/D @@<0!0,-:/01;BBC/D ! #! ! !$ #! ! ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # ,-./0123/4526 ,-./0123/4526   fingerprint spoofing: FAR increases very quickly   face spoofing: relatively a more graceful increase of FAR   multimodal biometric systems can be vulnerable to spoof attacks against only one matcher 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 38
  • 39. Score fusion rules ranking method 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 39
  • 40. Score fusion rule ranking method Training Phase Testing Phase Our method 6 Threshold p(score|Genuine) Parametric 5 p(score|Impostor) µFake = α µGenuine + (1- α) µImpostor 4 p(score|Fake) σFake = α σGenuine + (1- α) σImpostor 3 Non-parametric 2 scoreFake = (1 - α) scoreImpostor + α scoreGenuine 1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 score Fused score distribution Matchers under attack 6 6 Threshold p(score|Genuine) p(score|Genuine) 5 p(score|Impostor) 5 p(score|Impostor) 4 4 p(score|Fake) 3 3 2 2 1 1 1 Rule 1 Rule 1 0 0 2 Rule 2 Rule 2 ranking 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 score score Score Fusion 3 Rule 3 …………..…. Rule 3 Matchers not attacked Rules ……..…. ……..…. ……..…. 6 p(score|Genuine) 5 p(score|Impostor) 4 3 0 0.1 0.2 …………..…. 0.8 0.9 1 Zahid Akhtar, Giorgio Fumera, Gian Luca attack strength (α) 2 Marcialis and Fabio Roli, “Evaluation of multimodal biometric score fusion rules 1 under spoof attacks”, In 5th IAPR/IEEE 0 Intl. Conf. on Biometrics (ICB), 2012. 0 0.1 0.2 0.3 0.4 0.5 score 0.6 0.7 0.8 0.9 1 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 40
  • 41. Experiments Results •  Ranking of fusion rules according to their FAR under real spoof attacks   Fakes: silicon (fingerprint) and photo (faces) Face Spoofing Fingerprint Spoofing zeroFAR 1% FAR zeroFAR 1% FAR FAR(%) Rules FAR(%) Rules FAR(%) Rules FAR(%) Rules 0.04 ExtLLR 2.26 ExtLLR 0.00 Bayesian 1.05 Bayesian 0.05 LLR 2.29 LLR 0.00 Sum 1.15 Sum 0.27 W. Product 10.72 W. Product 0.00 Product 1.33 Product 0.48 W. Sum 18.37 W. Sum 24.56 W. Sum 42.59 W. Sum 1.30 Perceptron 20.95 Perceptron 27.73 Perceptron 44.11 Perceptron 6.75 Bayesian 23.47 Bayesian 34.87 W. Product 51.10 W. Product 6.80 Sum 23.49 Sum 50.42 ExtLLR 60.31 ExtLLR 6.82 Product 23.57 Product 50.43 LLR 60.32 LLR   our method always predicted the correct ranking corresponding to the optimal α value 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 41
  • 42. Experiments Results   Fakes: silicon (fingerprint) and photo (faces)   Optimal α values : face  0.9144 fingerprint  0.0522 Face spoofing Fingerprint spoofing ! ! # # $ $ :.;4<9.5 % :.;4<9.5 % 2=> 2=> ?3@A=/- 8.50956 ?3@A=/- & 8.50956 & B"12=> B"12=> ?43/4C-3@5 ?43/4C-3@5 ' ' B"1?3@A=/- B"1?3@A=/- DE-FF8 DE-FF8 ( ( FF8 FF8 ) ) * * ! ! ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # ,--./012-3456-7 ,--./012-3456-7   fingerprint spoofing   predicted ranking of each rule remains constant   bayesian rule always exhibits the best ranking 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 42
  • 43. Experiments Results   Fakes: silicon (fingerprint) and photo (faces)   Optimal α values : face  0.9144 fingerprint  0.0522 Face spoofing Fingerprint spoofing ! ! # # $ $ :.;4<9.5 % :.;4<9.5 % 2=> 2=> ?3@A=/- 8.50956 ?3@A=/- & 8.50956 & B"12=> B"12=> ?43/4C-3@5 ?43/4C-3@5 ' ' B"1?3@A=/- B"1?3@A=/- DE-FF8 DE-FF8 ( ( FF8 FF8 ) ) * * ! ! ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # ! !"# !"$ !"% !"& !"' !"( !") !"* !"+ # ,--./012-3456-7 ,--./012-3456-7   face spoofing   two different rankings are predicted: one for α < 0.5, and the other α ≥ 0.5   weighted sum or weighted product rule can be reasonable choice 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 43
  • 44. Conclusions and future works •  Multimodal biometric systems are not intrinsically robust •  Multimodal systems can be more robust than unimodal systems •  Worst-case hypothesis does not hold in real scenarios •  Methodology for security evaluation without fabrication of spoof attacks   two models for fake score distribution based on the concept of “Attack strength”   developed models are a good alternative to the worst-case assumption •  Methodology for Ranking the score fusion rule under spoof attacks 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 44
  • 45. Conclusions and future works •  Experimental results provide useful insights for the design of robust multimodal biometric systems •  Future works   more accurate modelling and simulation of fake score distributions   extensive validation of our models on data sets with significant spoof attacks of different biometric traits   development of robust score fusion rules 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 45
  • 46. Thank you 06-03-2012 Security of Multimodal Biometric Systems against Spoof Attacks - Zahid Akhtar 46