SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Robustness of Multimodal Biometric
      Systems under Realistic Spoof Attacks
               against All Traits

     Zahid Akhtar, Battista Biggio, Giorgio Fumera, Gian Luca Marcialis




                     Pattern Recognition and Applications Group
P R A G              Department of Electrical and Electronic Engineering
                     University of Cagliari, Italy
Outline


• Multimodal biometric system

• Evaluation of robustness of multimodal systems under spoof attacks

• Some experimental results
Biometric systems

• Unimodal Biometrics System
                                                                                                  score ≥ Threshold    Genuine
            Sensor         Feature                    Matcher                   Decision
                           Extractor                                                              score < Threshold    Impostor


                                                      Database


• Multimodal Biometrics System
    Sensor and
                                   scorefingerprint
                     Fingerprint
    Feature Ext.       Matcher

                                                                                                         score ≥ Threshold       Genuine
                                                          Score Fusion Rule                Decision
                     Database                          f(scorefingerprint , scoreface)                   score < Threshold       Impostor

    Sensor and                       scoreface
                       Face
    Feature Ext.      Matcher




                                                                                                                             3
Spoof attacks
•  Spoof attack : attacks at the user interface

•  Presentation of a fake biometric trait

•  Solutions:

    •  Liveness Detection Methods
         • Increase of false rejection rate (FRR)

    •  Multimodal biometric Systems  “intrinsically” robust?




                                                                4
Aim of our work
•  State-of-the-art:

    • Fabrication of fake traits is a cumbersome task

    • Robustness evaluation of multimodal systems using simulated attacks1,2

    • Substantial increase of false acceptance rate (FAR) under only one trait spoofing

    • Hypothesis: worst-case scenario1,2
        • the attacker is able to fabricate exact replica of the genuine biometric trait
        • match score distribution of spoofed trait is equal to one of the genuine trait

    • Need of investigation of robustness against realistic (non-worst case) spoof
      attacks


    1 R.   N. Rodrigues, L. L. Ling, V. Govindaraju, “Robustness of multimodal biometric fusion methods against spoof attacks”, JVLC, 2009.
    2   P. A. Johnson, B. Tan and S. Schuckers, “Multimodal Fusion Vulnerability To Non-Zero Effort (Spoof) Imposters”, WIFS, 2010.


                                                                                                                               5
Aim of our work
• Main goal:

    • Robustness evaluation methods under spoof attacks in realistic scenarios
      without fabrication of fake biometric traits


• Aim of this paper:

    • To investigate whether a realistic spoof attacks against all modalities
      can allow the attacker to crack the multimodal system
    • and whether the worst-case assumption is realistic




                                                                                6
Experimental setting
•  Data set:

    • Two separate data sets of faces and fingerprints

    • Chimerical multimodal data set

    • Live:
         •  No. of clients: 40
         •  No. of samples per client: 40

    • Spoofed (Fake):
        •  No. of clients: 40
        •  No. of samples per client: 40
Experimental setting
•  Spoofed (Fake) traits production

    •  Fake fingerprints by “consensual method”
        • mould: plasticine-like material
        • cast: two-compound mixture of liquid silicon
                                                         !!!!!!!!!!!!!!!!




                                                                   Live               Spoofed (Fake)
                                                                            !!!!!!!                 !!
                                                       !
    •  Fake faces by “photo attack”
        • photo displayed on a laptop screen to camera !




                                                                            !!!!!!!                 !!   !!
                                                                   Live               Spoofed (Fake)
                                                         !
                                                                                                8
                                                         !
Experimental setting
•  Score fusion rules:

    •  Sum :                  scorefused = scorefingerprint + scoreface

    •  Product :              scorefused = scorefingerprint × scoreface

    •  Weighted sum :         scorefused = w × scorefingerprint + (1-w) × scoreface

    •  Likelihood ratio (LLR) :

                           p(scorefingerprint |Genuine) × p(scoreface |Genuine)

                          p(scorefingerprint |Impostor) × p(scoreface | Impostor)




                                                                               9
Experimental Results
               •  Detection Error Trade-off (DET) curves:
                    • False Rejection rate (FRR) vs. false acceptance rate (FAR)

                             Sum                                                        LLR
           2                                                               2
          10                                                              10




           1                                                               1
          10                                                              10




                                                                FRR (%)
FRR (%)




                                                   fing.+face                                              fing.+face
                                                   fing.                                                   fing.
                                                   face                                                    face
           0                                                               0
          10                                                              10




           −1                                                              −1
          10 −1                                                           10 −1    0              1    2
                        0              1       2
            10         10             10      10                            10    10             10   10
                            FAR (%)                                                    FAR (%)




               •  Performance of multimodal systems improved under no spoofing attacks with
                  the exception of Sum rule


                                                                                                           10
Experimental Results
                            Sum                                                            LLR
           2                                                                  2
          10                                                                 10




           1                                                                  1
          10                                    fing.+face                   10                               fing.+face
                                                fing.+face spoof                                              fing.+face spoof




                                                                   FRR (%)
FRR (%)




                                                fing.                                                         fing.
                                                fing. spoof                                                   fing. spoof
           0
                                                face                          0
                                                                                                              face
          10                                    face spoof                   10                               face spoof



           −1                                                                 −1
          10 −1                                                              10 −1    0              1    2
                       0              1     2
            10        10             10    10                                  10    10             10   10
                           FAR (%)                                                        FAR (%)




               • spoof attacks worsen considerably the performance of individual systems,
                 allowing an attacker to crack them
               • spoof attacks against both traits also worsen the performance of the multimodal
                  systems
               • however the considered multimodal systems are more robust than unimodal
                 ones, under attack

                                                                                                                 11
Experimental Results
                             Sum                                                            LLR
           2                                                                   2
          10                                                                  10




           1                                                                   1
          10                                                                  10




                                                                    FRR (%)
FRR (%)




                                                 fing.+face                                                    fing.+face
                                                 fing.+face spoof                                              fing.+face spoof
                                                 FAR=FRR                                                       FAR=FRR
           0                                                                   0
          10                                                                  10




           −1                                                                  −1
          10 −1                                                               10 −1    0              1    2
                        0              1     2
            10        10              10    10                                  10    10             10   10
                            FAR (%)                                                        FAR (%)




               • the performance of multimodal systems under attack is worsen considerably,
                 which confirms that they can be cracked by spoofing all traits

               • the worst-case assumption is not a good approximation of realistic attacks


                                                                                                                    12
Conclusions
•  State-of-the-art: “worst-case” scenario

•  Evidence of two common beliefs under spoof attacks:

         • Multimodal systems can be more robust than unimodal systems

         • Multimodal systems can be cracked by spoofing all the fused traits
           even when the attacker does not fabricate worst-case scenario

•  Worst-case scenario is not suitable for evaluating the performance under attack

•  Ongoing works:
    • development of methods for evaluating robustness, without constructing
      data sets of spoof attacks
    • development of robust score fusion rules


                                                                          13
Thank you




            14

Weitere ähnliche Inhalte

Ähnlich wie Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits

Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
Pluribus One
 
A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Ma...
A Bayesian Approach for Modeling SensorInfluence on Quality, Liveness and Ma...A Bayesian Approach for Modeling SensorInfluence on Quality, Liveness and Ma...
A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Ma...
AjitaRattani
 

Ähnlich wie Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits (9)

BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
Mining Software Archives 2010 Presentation
Mining Software Archives 2010 PresentationMining Software Archives 2010 Presentation
Mining Software Archives 2010 Presentation
 
Biometrics_ppt.ppt
Biometrics_ppt.pptBiometrics_ppt.ppt
Biometrics_ppt.ppt
 
Biometrics_ppt.ppt
Biometrics_ppt.pptBiometrics_ppt.ppt
Biometrics_ppt.ppt
 
Mobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research DirectionsMobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research Directions
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
MAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design ToolMAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design Tool
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Ma...
A Bayesian Approach for Modeling SensorInfluence on Quality, Liveness and Ma...A Bayesian Approach for Modeling SensorInfluence on Quality, Liveness and Ma...
A Bayesian Approach for Modeling Sensor Influence on Quality, Liveness and Ma...
 

Mehr von Pluribus One

Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Pluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Pluribus One
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
Pluribus One
 

Mehr von Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Kürzlich hochgeladen (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits

  • 1. Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits Zahid Akhtar, Battista Biggio, Giorgio Fumera, Gian Luca Marcialis Pattern Recognition and Applications Group P R A G Department of Electrical and Electronic Engineering University of Cagliari, Italy
  • 2. Outline • Multimodal biometric system • Evaluation of robustness of multimodal systems under spoof attacks • Some experimental results
  • 3. Biometric systems • Unimodal Biometrics System score ≥ Threshold Genuine Sensor Feature Matcher Decision Extractor score < Threshold Impostor Database • Multimodal Biometrics System Sensor and scorefingerprint Fingerprint Feature Ext. Matcher score ≥ Threshold Genuine Score Fusion Rule Decision Database f(scorefingerprint , scoreface) score < Threshold Impostor Sensor and scoreface Face Feature Ext. Matcher 3
  • 4. Spoof attacks •  Spoof attack : attacks at the user interface •  Presentation of a fake biometric trait •  Solutions: •  Liveness Detection Methods • Increase of false rejection rate (FRR) •  Multimodal biometric Systems  “intrinsically” robust? 4
  • 5. Aim of our work •  State-of-the-art: • Fabrication of fake traits is a cumbersome task • Robustness evaluation of multimodal systems using simulated attacks1,2 • Substantial increase of false acceptance rate (FAR) under only one trait spoofing • Hypothesis: worst-case scenario1,2 • the attacker is able to fabricate exact replica of the genuine biometric trait • match score distribution of spoofed trait is equal to one of the genuine trait • Need of investigation of robustness against realistic (non-worst case) spoof attacks 1 R. N. Rodrigues, L. L. Ling, V. Govindaraju, “Robustness of multimodal biometric fusion methods against spoof attacks”, JVLC, 2009. 2 P. A. Johnson, B. Tan and S. Schuckers, “Multimodal Fusion Vulnerability To Non-Zero Effort (Spoof) Imposters”, WIFS, 2010. 5
  • 6. Aim of our work • Main goal: • Robustness evaluation methods under spoof attacks in realistic scenarios without fabrication of fake biometric traits • Aim of this paper: • To investigate whether a realistic spoof attacks against all modalities can allow the attacker to crack the multimodal system • and whether the worst-case assumption is realistic 6
  • 7. Experimental setting •  Data set: • Two separate data sets of faces and fingerprints • Chimerical multimodal data set • Live: •  No. of clients: 40 •  No. of samples per client: 40 • Spoofed (Fake): •  No. of clients: 40 •  No. of samples per client: 40
  • 8. Experimental setting •  Spoofed (Fake) traits production •  Fake fingerprints by “consensual method” • mould: plasticine-like material • cast: two-compound mixture of liquid silicon !!!!!!!!!!!!!!!! Live Spoofed (Fake) !!!!!!! !! ! •  Fake faces by “photo attack” • photo displayed on a laptop screen to camera ! !!!!!!! !! !! Live Spoofed (Fake) ! 8 !
  • 9. Experimental setting •  Score fusion rules: •  Sum : scorefused = scorefingerprint + scoreface •  Product : scorefused = scorefingerprint × scoreface •  Weighted sum : scorefused = w × scorefingerprint + (1-w) × scoreface •  Likelihood ratio (LLR) : p(scorefingerprint |Genuine) × p(scoreface |Genuine) p(scorefingerprint |Impostor) × p(scoreface | Impostor) 9
  • 10. Experimental Results •  Detection Error Trade-off (DET) curves: • False Rejection rate (FRR) vs. false acceptance rate (FAR) Sum LLR 2 2 10 10 1 1 10 10 FRR (%) FRR (%) fing.+face fing.+face fing. fing. face face 0 0 10 10 −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) •  Performance of multimodal systems improved under no spoofing attacks with the exception of Sum rule 10
  • 11. Experimental Results Sum LLR 2 2 10 10 1 1 10 fing.+face 10 fing.+face fing.+face spoof fing.+face spoof FRR (%) FRR (%) fing. fing. fing. spoof fing. spoof 0 face 0 face 10 face spoof 10 face spoof −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) • spoof attacks worsen considerably the performance of individual systems, allowing an attacker to crack them • spoof attacks against both traits also worsen the performance of the multimodal systems • however the considered multimodal systems are more robust than unimodal ones, under attack 11
  • 12. Experimental Results Sum LLR 2 2 10 10 1 1 10 10 FRR (%) FRR (%) fing.+face fing.+face fing.+face spoof fing.+face spoof FAR=FRR FAR=FRR 0 0 10 10 −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) • the performance of multimodal systems under attack is worsen considerably, which confirms that they can be cracked by spoofing all traits • the worst-case assumption is not a good approximation of realistic attacks 12
  • 13. Conclusions •  State-of-the-art: “worst-case” scenario •  Evidence of two common beliefs under spoof attacks: • Multimodal systems can be more robust than unimodal systems • Multimodal systems can be cracked by spoofing all the fused traits even when the attacker does not fabricate worst-case scenario •  Worst-case scenario is not suitable for evaluating the performance under attack •  Ongoing works: • development of methods for evaluating robustness, without constructing data sets of spoof attacks • development of robust score fusion rules 13
  • 14. Thank you 14