SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Robustness of Multimodal Biometric
      Systems under Realistic Spoof Attacks
               against All Traits

     Zahid Akhtar, Battista Biggio, Giorgio Fumera, Gian Luca Marcialis




                     Pattern Recognition and Applications Group
P R A G              Department of Electrical and Electronic Engineering
                     University of Cagliari, Italy
Outline


• Multimodal biometric system

• Evaluation of robustness of multimodal systems under spoof attacks

• Some experimental results
Biometric systems

• Unimodal Biometrics System
                                                                                                  score ≥ Threshold    Genuine
            Sensor         Feature                    Matcher                   Decision
                           Extractor                                                              score < Threshold    Impostor


                                                      Database


• Multimodal Biometrics System
    Sensor and
                                   scorefingerprint
                     Fingerprint
    Feature Ext.       Matcher

                                                                                                         score ≥ Threshold       Genuine
                                                          Score Fusion Rule                Decision
                     Database                          f(scorefingerprint , scoreface)                   score < Threshold       Impostor

    Sensor and                       scoreface
                       Face
    Feature Ext.      Matcher




                                                                                                                             3
Spoof attacks
•  Spoof attack : attacks at the user interface

•  Presentation of a fake biometric trait

•  Solutions:

    •  Liveness Detection Methods
         • Increase of false rejection rate (FRR)

    •  Multimodal biometric Systems  “intrinsically” robust?




                                                                4
Aim of our work
•  State-of-the-art:

    • Fabrication of fake traits is a cumbersome task

    • Robustness evaluation of multimodal systems using simulated attacks1,2

    • Substantial increase of false acceptance rate (FAR) under only one trait spoofing

    • Hypothesis: worst-case scenario1,2
        • the attacker is able to fabricate exact replica of the genuine biometric trait
        • match score distribution of spoofed trait is equal to one of the genuine trait

    • Need of investigation of robustness against realistic (non-worst case) spoof
      attacks


    1 R.   N. Rodrigues, L. L. Ling, V. Govindaraju, “Robustness of multimodal biometric fusion methods against spoof attacks”, JVLC, 2009.
    2   P. A. Johnson, B. Tan and S. Schuckers, “Multimodal Fusion Vulnerability To Non-Zero Effort (Spoof) Imposters”, WIFS, 2010.


                                                                                                                               5
Aim of our work
• Main goal:

    • Robustness evaluation methods under spoof attacks in realistic scenarios
      without fabrication of fake biometric traits


• Aim of this paper:

    • To investigate whether a realistic spoof attacks against all modalities
      can allow the attacker to crack the multimodal system
    • and whether the worst-case assumption is realistic




                                                                                6
Experimental setting
•  Data set:

    • Two separate data sets of faces and fingerprints

    • Chimerical multimodal data set

    • Live:
         •  No. of clients: 40
         •  No. of samples per client: 40

    • Spoofed (Fake):
        •  No. of clients: 40
        •  No. of samples per client: 40
Experimental setting
•  Spoofed (Fake) traits production

    •  Fake fingerprints by “consensual method”
        • mould: plasticine-like material
        • cast: two-compound mixture of liquid silicon
                                                         !!!!!!!!!!!!!!!!




                                                                   Live               Spoofed (Fake)
                                                                            !!!!!!!                 !!
                                                       !
    •  Fake faces by “photo attack”
        • photo displayed on a laptop screen to camera !




                                                                            !!!!!!!                 !!   !!
                                                                   Live               Spoofed (Fake)
                                                         !
                                                                                                8
                                                         !
Experimental setting
•  Score fusion rules:

    •  Sum :                  scorefused = scorefingerprint + scoreface

    •  Product :              scorefused = scorefingerprint × scoreface

    •  Weighted sum :         scorefused = w × scorefingerprint + (1-w) × scoreface

    •  Likelihood ratio (LLR) :

                           p(scorefingerprint |Genuine) × p(scoreface |Genuine)

                          p(scorefingerprint |Impostor) × p(scoreface | Impostor)




                                                                               9
Experimental Results
               •  Detection Error Trade-off (DET) curves:
                    • False Rejection rate (FRR) vs. false acceptance rate (FAR)

                             Sum                                                        LLR
           2                                                               2
          10                                                              10




           1                                                               1
          10                                                              10




                                                                FRR (%)
FRR (%)




                                                   fing.+face                                              fing.+face
                                                   fing.                                                   fing.
                                                   face                                                    face
           0                                                               0
          10                                                              10




           −1                                                              −1
          10 −1                                                           10 −1    0              1    2
                        0              1       2
            10         10             10      10                            10    10             10   10
                            FAR (%)                                                    FAR (%)




               •  Performance of multimodal systems improved under no spoofing attacks with
                  the exception of Sum rule


                                                                                                           10
Experimental Results
                            Sum                                                            LLR
           2                                                                  2
          10                                                                 10




           1                                                                  1
          10                                    fing.+face                   10                               fing.+face
                                                fing.+face spoof                                              fing.+face spoof




                                                                   FRR (%)
FRR (%)




                                                fing.                                                         fing.
                                                fing. spoof                                                   fing. spoof
           0
                                                face                          0
                                                                                                              face
          10                                    face spoof                   10                               face spoof



           −1                                                                 −1
          10 −1                                                              10 −1    0              1    2
                       0              1     2
            10        10             10    10                                  10    10             10   10
                           FAR (%)                                                        FAR (%)




               • spoof attacks worsen considerably the performance of individual systems,
                 allowing an attacker to crack them
               • spoof attacks against both traits also worsen the performance of the multimodal
                  systems
               • however the considered multimodal systems are more robust than unimodal
                 ones, under attack

                                                                                                                 11
Experimental Results
                             Sum                                                            LLR
           2                                                                   2
          10                                                                  10




           1                                                                   1
          10                                                                  10




                                                                    FRR (%)
FRR (%)




                                                 fing.+face                                                    fing.+face
                                                 fing.+face spoof                                              fing.+face spoof
                                                 FAR=FRR                                                       FAR=FRR
           0                                                                   0
          10                                                                  10




           −1                                                                  −1
          10 −1                                                               10 −1    0              1    2
                        0              1     2
            10        10              10    10                                  10    10             10   10
                            FAR (%)                                                        FAR (%)




               • the performance of multimodal systems under attack is worsen considerably,
                 which confirms that they can be cracked by spoofing all traits

               • the worst-case assumption is not a good approximation of realistic attacks


                                                                                                                    12
Conclusions
•  State-of-the-art: “worst-case” scenario

•  Evidence of two common beliefs under spoof attacks:

         • Multimodal systems can be more robust than unimodal systems

         • Multimodal systems can be cracked by spoofing all the fused traits
           even when the attacker does not fabricate worst-case scenario

•  Worst-case scenario is not suitable for evaluating the performance under attack

•  Ongoing works:
    • development of methods for evaluating robustness, without constructing
      data sets of spoof attacks
    • development of robust score fusion rules


                                                                          13
Thank you




            14

Contenu connexe

Similaire à Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits

Mining Software Archives 2010 Presentation
Mining Software Archives 2010 PresentationMining Software Archives 2010 Presentation
Mining Software Archives 2010 PresentationAhmed Lamkanfi
 
Biometrics_ppt.ppt
Biometrics_ppt.pptBiometrics_ppt.ppt
Biometrics_ppt.pptRajeshRavi44
 
Mobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research DirectionsMobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research DirectionsMark Billinghurst
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Pluribus One
 
MAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design ToolMAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design ToolDaniel Ashbrook
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Andrew Ryan
 

Similaire à Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits (8)

BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
Mining Software Archives 2010 Presentation
Mining Software Archives 2010 PresentationMining Software Archives 2010 Presentation
Mining Software Archives 2010 Presentation
 
Biometrics_ppt.ppt
Biometrics_ppt.pptBiometrics_ppt.ppt
Biometrics_ppt.ppt
 
Biometrics_ppt.ppt
Biometrics_ppt.pptBiometrics_ppt.ppt
Biometrics_ppt.ppt
 
Mobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research DirectionsMobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research Directions
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
MAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design ToolMAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design Tool
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 

Plus de Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Pluribus One
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019Pluribus One
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Pluribus One
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsPluribus One
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksPluribus One
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresPluribus One
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Pluribus One
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Pluribus One
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Pluribus One
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Pluribus One
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringPluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Pluribus One
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Pluribus One
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Pluribus One
 

Plus de Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 

Dernier

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Dernier (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits

  • 1. Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits Zahid Akhtar, Battista Biggio, Giorgio Fumera, Gian Luca Marcialis Pattern Recognition and Applications Group P R A G Department of Electrical and Electronic Engineering University of Cagliari, Italy
  • 2. Outline • Multimodal biometric system • Evaluation of robustness of multimodal systems under spoof attacks • Some experimental results
  • 3. Biometric systems • Unimodal Biometrics System score ≥ Threshold Genuine Sensor Feature Matcher Decision Extractor score < Threshold Impostor Database • Multimodal Biometrics System Sensor and scorefingerprint Fingerprint Feature Ext. Matcher score ≥ Threshold Genuine Score Fusion Rule Decision Database f(scorefingerprint , scoreface) score < Threshold Impostor Sensor and scoreface Face Feature Ext. Matcher 3
  • 4. Spoof attacks •  Spoof attack : attacks at the user interface •  Presentation of a fake biometric trait •  Solutions: •  Liveness Detection Methods • Increase of false rejection rate (FRR) •  Multimodal biometric Systems  “intrinsically” robust? 4
  • 5. Aim of our work •  State-of-the-art: • Fabrication of fake traits is a cumbersome task • Robustness evaluation of multimodal systems using simulated attacks1,2 • Substantial increase of false acceptance rate (FAR) under only one trait spoofing • Hypothesis: worst-case scenario1,2 • the attacker is able to fabricate exact replica of the genuine biometric trait • match score distribution of spoofed trait is equal to one of the genuine trait • Need of investigation of robustness against realistic (non-worst case) spoof attacks 1 R. N. Rodrigues, L. L. Ling, V. Govindaraju, “Robustness of multimodal biometric fusion methods against spoof attacks”, JVLC, 2009. 2 P. A. Johnson, B. Tan and S. Schuckers, “Multimodal Fusion Vulnerability To Non-Zero Effort (Spoof) Imposters”, WIFS, 2010. 5
  • 6. Aim of our work • Main goal: • Robustness evaluation methods under spoof attacks in realistic scenarios without fabrication of fake biometric traits • Aim of this paper: • To investigate whether a realistic spoof attacks against all modalities can allow the attacker to crack the multimodal system • and whether the worst-case assumption is realistic 6
  • 7. Experimental setting •  Data set: • Two separate data sets of faces and fingerprints • Chimerical multimodal data set • Live: •  No. of clients: 40 •  No. of samples per client: 40 • Spoofed (Fake): •  No. of clients: 40 •  No. of samples per client: 40
  • 8. Experimental setting •  Spoofed (Fake) traits production •  Fake fingerprints by “consensual method” • mould: plasticine-like material • cast: two-compound mixture of liquid silicon !!!!!!!!!!!!!!!! Live Spoofed (Fake) !!!!!!! !! ! •  Fake faces by “photo attack” • photo displayed on a laptop screen to camera ! !!!!!!! !! !! Live Spoofed (Fake) ! 8 !
  • 9. Experimental setting •  Score fusion rules: •  Sum : scorefused = scorefingerprint + scoreface •  Product : scorefused = scorefingerprint × scoreface •  Weighted sum : scorefused = w × scorefingerprint + (1-w) × scoreface •  Likelihood ratio (LLR) : p(scorefingerprint |Genuine) × p(scoreface |Genuine) p(scorefingerprint |Impostor) × p(scoreface | Impostor) 9
  • 10. Experimental Results •  Detection Error Trade-off (DET) curves: • False Rejection rate (FRR) vs. false acceptance rate (FAR) Sum LLR 2 2 10 10 1 1 10 10 FRR (%) FRR (%) fing.+face fing.+face fing. fing. face face 0 0 10 10 −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) •  Performance of multimodal systems improved under no spoofing attacks with the exception of Sum rule 10
  • 11. Experimental Results Sum LLR 2 2 10 10 1 1 10 fing.+face 10 fing.+face fing.+face spoof fing.+face spoof FRR (%) FRR (%) fing. fing. fing. spoof fing. spoof 0 face 0 face 10 face spoof 10 face spoof −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) • spoof attacks worsen considerably the performance of individual systems, allowing an attacker to crack them • spoof attacks against both traits also worsen the performance of the multimodal systems • however the considered multimodal systems are more robust than unimodal ones, under attack 11
  • 12. Experimental Results Sum LLR 2 2 10 10 1 1 10 10 FRR (%) FRR (%) fing.+face fing.+face fing.+face spoof fing.+face spoof FAR=FRR FAR=FRR 0 0 10 10 −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) • the performance of multimodal systems under attack is worsen considerably, which confirms that they can be cracked by spoofing all traits • the worst-case assumption is not a good approximation of realistic attacks 12
  • 13. Conclusions •  State-of-the-art: “worst-case” scenario •  Evidence of two common beliefs under spoof attacks: • Multimodal systems can be more robust than unimodal systems • Multimodal systems can be cracked by spoofing all the fused traits even when the attacker does not fabricate worst-case scenario •  Worst-case scenario is not suitable for evaluating the performance under attack •  Ongoing works: • development of methods for evaluating robustness, without constructing data sets of spoof attacks • development of robust score fusion rules 13
  • 14. Thank you 14