SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Robustness of Multimodal Biometric
      Systems under Realistic Spoof Attacks
               against All Traits

     Zahid Akhtar, Battista Biggio, Giorgio Fumera, Gian Luca Marcialis




                     Pattern Recognition and Applications Group
P R A G              Department of Electrical and Electronic Engineering
                     University of Cagliari, Italy
Outline


• Multimodal biometric system

• Evaluation of robustness of multimodal systems under spoof attacks

• Some experimental results
Biometric systems

• Unimodal Biometrics System
                                                                                                  score ≥ Threshold    Genuine
            Sensor         Feature                    Matcher                   Decision
                           Extractor                                                              score < Threshold    Impostor


                                                      Database


• Multimodal Biometrics System
    Sensor and
                                   scorefingerprint
                     Fingerprint
    Feature Ext.       Matcher

                                                                                                         score ≥ Threshold       Genuine
                                                          Score Fusion Rule                Decision
                     Database                          f(scorefingerprint , scoreface)                   score < Threshold       Impostor

    Sensor and                       scoreface
                       Face
    Feature Ext.      Matcher




                                                                                                                             3
Spoof attacks
•  Spoof attack : attacks at the user interface

•  Presentation of a fake biometric trait

•  Solutions:

    •  Liveness Detection Methods
         • Increase of false rejection rate (FRR)

    •  Multimodal biometric Systems  “intrinsically” robust?




                                                                4
Aim of our work
•  State-of-the-art:

    • Fabrication of fake traits is a cumbersome task

    • Robustness evaluation of multimodal systems using simulated attacks1,2

    • Substantial increase of false acceptance rate (FAR) under only one trait spoofing

    • Hypothesis: worst-case scenario1,2
        • the attacker is able to fabricate exact replica of the genuine biometric trait
        • match score distribution of spoofed trait is equal to one of the genuine trait

    • Need of investigation of robustness against realistic (non-worst case) spoof
      attacks


    1 R.   N. Rodrigues, L. L. Ling, V. Govindaraju, “Robustness of multimodal biometric fusion methods against spoof attacks”, JVLC, 2009.
    2   P. A. Johnson, B. Tan and S. Schuckers, “Multimodal Fusion Vulnerability To Non-Zero Effort (Spoof) Imposters”, WIFS, 2010.


                                                                                                                               5
Aim of our work
• Main goal:

    • Robustness evaluation methods under spoof attacks in realistic scenarios
      without fabrication of fake biometric traits


• Aim of this paper:

    • To investigate whether a realistic spoof attacks against all modalities
      can allow the attacker to crack the multimodal system
    • and whether the worst-case assumption is realistic




                                                                                6
Experimental setting
•  Data set:

    • Two separate data sets of faces and fingerprints

    • Chimerical multimodal data set

    • Live:
         •  No. of clients: 40
         •  No. of samples per client: 40

    • Spoofed (Fake):
        •  No. of clients: 40
        •  No. of samples per client: 40
Experimental setting
•  Spoofed (Fake) traits production

    •  Fake fingerprints by “consensual method”
        • mould: plasticine-like material
        • cast: two-compound mixture of liquid silicon
                                                         !!!!!!!!!!!!!!!!




                                                                   Live               Spoofed (Fake)
                                                                            !!!!!!!                 !!
                                                       !
    •  Fake faces by “photo attack”
        • photo displayed on a laptop screen to camera !




                                                                            !!!!!!!                 !!   !!
                                                                   Live               Spoofed (Fake)
                                                         !
                                                                                                8
                                                         !
Experimental setting
•  Score fusion rules:

    •  Sum :                  scorefused = scorefingerprint + scoreface

    •  Product :              scorefused = scorefingerprint × scoreface

    •  Weighted sum :         scorefused = w × scorefingerprint + (1-w) × scoreface

    •  Likelihood ratio (LLR) :

                           p(scorefingerprint |Genuine) × p(scoreface |Genuine)

                          p(scorefingerprint |Impostor) × p(scoreface | Impostor)




                                                                               9
Experimental Results
               •  Detection Error Trade-off (DET) curves:
                    • False Rejection rate (FRR) vs. false acceptance rate (FAR)

                             Sum                                                        LLR
           2                                                               2
          10                                                              10




           1                                                               1
          10                                                              10




                                                                FRR (%)
FRR (%)




                                                   fing.+face                                              fing.+face
                                                   fing.                                                   fing.
                                                   face                                                    face
           0                                                               0
          10                                                              10




           −1                                                              −1
          10 −1                                                           10 −1    0              1    2
                        0              1       2
            10         10             10      10                            10    10             10   10
                            FAR (%)                                                    FAR (%)




               •  Performance of multimodal systems improved under no spoofing attacks with
                  the exception of Sum rule


                                                                                                           10
Experimental Results
                            Sum                                                            LLR
           2                                                                  2
          10                                                                 10




           1                                                                  1
          10                                    fing.+face                   10                               fing.+face
                                                fing.+face spoof                                              fing.+face spoof




                                                                   FRR (%)
FRR (%)




                                                fing.                                                         fing.
                                                fing. spoof                                                   fing. spoof
           0
                                                face                          0
                                                                                                              face
          10                                    face spoof                   10                               face spoof



           −1                                                                 −1
          10 −1                                                              10 −1    0              1    2
                       0              1     2
            10        10             10    10                                  10    10             10   10
                           FAR (%)                                                        FAR (%)




               • spoof attacks worsen considerably the performance of individual systems,
                 allowing an attacker to crack them
               • spoof attacks against both traits also worsen the performance of the multimodal
                  systems
               • however the considered multimodal systems are more robust than unimodal
                 ones, under attack

                                                                                                                 11
Experimental Results
                             Sum                                                            LLR
           2                                                                   2
          10                                                                  10




           1                                                                   1
          10                                                                  10




                                                                    FRR (%)
FRR (%)




                                                 fing.+face                                                    fing.+face
                                                 fing.+face spoof                                              fing.+face spoof
                                                 FAR=FRR                                                       FAR=FRR
           0                                                                   0
          10                                                                  10




           −1                                                                  −1
          10 −1                                                               10 −1    0              1    2
                        0              1     2
            10        10              10    10                                  10    10             10   10
                            FAR (%)                                                        FAR (%)




               • the performance of multimodal systems under attack is worsen considerably,
                 which confirms that they can be cracked by spoofing all traits

               • the worst-case assumption is not a good approximation of realistic attacks


                                                                                                                    12
Conclusions
•  State-of-the-art: “worst-case” scenario

•  Evidence of two common beliefs under spoof attacks:

         • Multimodal systems can be more robust than unimodal systems

         • Multimodal systems can be cracked by spoofing all the fused traits
           even when the attacker does not fabricate worst-case scenario

•  Worst-case scenario is not suitable for evaluating the performance under attack

•  Ongoing works:
    • development of methods for evaluating robustness, without constructing
      data sets of spoof attacks
    • development of robust score fusion rules


                                                                          13
Thank you




            14

Weitere ähnliche Inhalte

Ähnlich wie Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits

Mining Software Archives 2010 Presentation
Mining Software Archives 2010 PresentationMining Software Archives 2010 Presentation
Mining Software Archives 2010 PresentationAhmed Lamkanfi
 
Biometrics_ppt.ppt
Biometrics_ppt.pptBiometrics_ppt.ppt
Biometrics_ppt.pptRajeshRavi44
 
Mobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research DirectionsMobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research DirectionsMark Billinghurst
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Pluribus One
 
MAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design ToolMAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design ToolDaniel Ashbrook
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Andrew Ryan
 

Ähnlich wie Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits (8)

BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
Mining Software Archives 2010 Presentation
Mining Software Archives 2010 PresentationMining Software Archives 2010 Presentation
Mining Software Archives 2010 Presentation
 
Biometrics_ppt.ppt
Biometrics_ppt.pptBiometrics_ppt.ppt
Biometrics_ppt.ppt
 
Biometrics_ppt.ppt
Biometrics_ppt.pptBiometrics_ppt.ppt
Biometrics_ppt.ppt
 
Mobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research DirectionsMobile AR Lecture 10 - Research Directions
Mobile AR Lecture 10 - Research Directions
 
Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...Robustness of multimodal biometric verification systems under realistic spoof...
Robustness of multimodal biometric verification systems under realistic spoof...
 
MAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design ToolMAGIC: A Motion Gesture Design Tool
MAGIC: A Motion Gesture Design Tool
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 

Mehr von Pluribus One

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Pluribus One
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Pluribus One
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Pluribus One
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019Pluribus One
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Pluribus One
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsPluribus One
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksPluribus One
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresPluribus One
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Pluribus One
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Pluribus One
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Pluribus One
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Pluribus One
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringPluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Pluribus One
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Pluribus One
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesPluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Pluribus One
 

Mehr von Pluribus One (20)

Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu Smart Textiles - Prospettive di mercato - Davide Ariu
Smart Textiles - Prospettive di mercato - Davide Ariu
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
 
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
 
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
 
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
 
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 

Kürzlich hochgeladen

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Kürzlich hochgeladen (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits

  • 1. Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks against All Traits Zahid Akhtar, Battista Biggio, Giorgio Fumera, Gian Luca Marcialis Pattern Recognition and Applications Group P R A G Department of Electrical and Electronic Engineering University of Cagliari, Italy
  • 2. Outline • Multimodal biometric system • Evaluation of robustness of multimodal systems under spoof attacks • Some experimental results
  • 3. Biometric systems • Unimodal Biometrics System score ≥ Threshold Genuine Sensor Feature Matcher Decision Extractor score < Threshold Impostor Database • Multimodal Biometrics System Sensor and scorefingerprint Fingerprint Feature Ext. Matcher score ≥ Threshold Genuine Score Fusion Rule Decision Database f(scorefingerprint , scoreface) score < Threshold Impostor Sensor and scoreface Face Feature Ext. Matcher 3
  • 4. Spoof attacks •  Spoof attack : attacks at the user interface •  Presentation of a fake biometric trait •  Solutions: •  Liveness Detection Methods • Increase of false rejection rate (FRR) •  Multimodal biometric Systems  “intrinsically” robust? 4
  • 5. Aim of our work •  State-of-the-art: • Fabrication of fake traits is a cumbersome task • Robustness evaluation of multimodal systems using simulated attacks1,2 • Substantial increase of false acceptance rate (FAR) under only one trait spoofing • Hypothesis: worst-case scenario1,2 • the attacker is able to fabricate exact replica of the genuine biometric trait • match score distribution of spoofed trait is equal to one of the genuine trait • Need of investigation of robustness against realistic (non-worst case) spoof attacks 1 R. N. Rodrigues, L. L. Ling, V. Govindaraju, “Robustness of multimodal biometric fusion methods against spoof attacks”, JVLC, 2009. 2 P. A. Johnson, B. Tan and S. Schuckers, “Multimodal Fusion Vulnerability To Non-Zero Effort (Spoof) Imposters”, WIFS, 2010. 5
  • 6. Aim of our work • Main goal: • Robustness evaluation methods under spoof attacks in realistic scenarios without fabrication of fake biometric traits • Aim of this paper: • To investigate whether a realistic spoof attacks against all modalities can allow the attacker to crack the multimodal system • and whether the worst-case assumption is realistic 6
  • 7. Experimental setting •  Data set: • Two separate data sets of faces and fingerprints • Chimerical multimodal data set • Live: •  No. of clients: 40 •  No. of samples per client: 40 • Spoofed (Fake): •  No. of clients: 40 •  No. of samples per client: 40
  • 8. Experimental setting •  Spoofed (Fake) traits production •  Fake fingerprints by “consensual method” • mould: plasticine-like material • cast: two-compound mixture of liquid silicon !!!!!!!!!!!!!!!! Live Spoofed (Fake) !!!!!!! !! ! •  Fake faces by “photo attack” • photo displayed on a laptop screen to camera ! !!!!!!! !! !! Live Spoofed (Fake) ! 8 !
  • 9. Experimental setting •  Score fusion rules: •  Sum : scorefused = scorefingerprint + scoreface •  Product : scorefused = scorefingerprint × scoreface •  Weighted sum : scorefused = w × scorefingerprint + (1-w) × scoreface •  Likelihood ratio (LLR) : p(scorefingerprint |Genuine) × p(scoreface |Genuine) p(scorefingerprint |Impostor) × p(scoreface | Impostor) 9
  • 10. Experimental Results •  Detection Error Trade-off (DET) curves: • False Rejection rate (FRR) vs. false acceptance rate (FAR) Sum LLR 2 2 10 10 1 1 10 10 FRR (%) FRR (%) fing.+face fing.+face fing. fing. face face 0 0 10 10 −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) •  Performance of multimodal systems improved under no spoofing attacks with the exception of Sum rule 10
  • 11. Experimental Results Sum LLR 2 2 10 10 1 1 10 fing.+face 10 fing.+face fing.+face spoof fing.+face spoof FRR (%) FRR (%) fing. fing. fing. spoof fing. spoof 0 face 0 face 10 face spoof 10 face spoof −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) • spoof attacks worsen considerably the performance of individual systems, allowing an attacker to crack them • spoof attacks against both traits also worsen the performance of the multimodal systems • however the considered multimodal systems are more robust than unimodal ones, under attack 11
  • 12. Experimental Results Sum LLR 2 2 10 10 1 1 10 10 FRR (%) FRR (%) fing.+face fing.+face fing.+face spoof fing.+face spoof FAR=FRR FAR=FRR 0 0 10 10 −1 −1 10 −1 10 −1 0 1 2 0 1 2 10 10 10 10 10 10 10 10 FAR (%) FAR (%) • the performance of multimodal systems under attack is worsen considerably, which confirms that they can be cracked by spoofing all traits • the worst-case assumption is not a good approximation of realistic attacks 12
  • 13. Conclusions •  State-of-the-art: “worst-case” scenario •  Evidence of two common beliefs under spoof attacks: • Multimodal systems can be more robust than unimodal systems • Multimodal systems can be cracked by spoofing all the fused traits even when the attacker does not fabricate worst-case scenario •  Worst-case scenario is not suitable for evaluating the performance under attack •  Ongoing works: • development of methods for evaluating robustness, without constructing data sets of spoof attacks • development of robust score fusion rules 13
  • 14. Thank you 14