SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Pattern Recognition and Applications group
             Department of Electrical and Electronic Engineering (DIEE)
             University of Cagliari, Italy




Robustness of multi-modal biometric
 verification systems under realistic
           spoofing attacks

    Battista Biggio, Zahid Akthar, Giorgio Fumera,
          Gian Luca Marcialis, and Fabio Roli




                                          Int’l Joint Conf. On Biometrics, IJCB 2011
Biometrics
 • Examples of body traits that can be used for biometric recognition



                            Face        Fingerprint      Iris      Hand geometry




                          Palmprint      Signature       Voice          Gait




• Enrollment and verification phases in biometric system
                   User                               User Identity

                                                                 Feature       XTemplate
 Enrollment                           Sensor
                                                                Extractor
                                                                                           Database



                   User                                    Claimed Identity
                                                                     XQuery         XTemplate
                                      Sensor                Feature         Matcher          Database
 Verification                                              Extractor
                                                                                 score

                                                                                   Decision           Genuine/Impostor

12-11-2011                                       G.L. Marcialis, IJCB 2011                                               2
Biometric systems
• Multi-modal biometric verification systems


                              DB
                                                                                true
                                                                                        genuine
                                             s1
             Sensor      Face matcher
                                                                        s
                                                    Score fusion rule       s ≥ s∗
                                             s2         f (s1 , s2 )
             Sensor    Fingerprint matcher
                                                                                false
                                                                                        impostor

                              DB




     – more accurate than unimodal
     – more robust to spoof attacks?




12-11-2011                                        G.L. Marcialis, IJCB 2011                        3
Direct (spoofing) attacks
• Spoofing attacks
     – attacks at the user interface (sensor)
     – fake biometric traits




• Countermeasures
     – liveness detection
     – multi-modal biometric systems


12-11-2011                       G.L. Marcialis, IJCB 2011   4
Motivation and goal of this work
• Open problems
     – Estimation of the FAR under spoof attacks for multi-modal
       systems
     – Construction of fake biometric traits (cumbersome task)

• State-of-the-art
     – Fake scores are simulated under a worst-case scenario, re-
       sampling genuine user scores


             sifake : p(si | G)   (when the i-th matcher is spoofed)


• Our goal
     – To experimentally verify if this worst-case assumption holds
       under realistic spoofing attacks


12-11-2011                          G.L. Marcialis, IJCB 2011          5
Experiments
• Multi-modal system with face and fingerprint matchers
     – Bozorth3 (fingerprint)
     – Elastic Bunch Graph Matching, EBGM (face)

                                                                               true
                                                                                       genuine
                                            s1
             Sensor     Face matcher
                                                                       s
                                                   Score fusion rule       s ≥ s∗
                                            s2         f (s1 , s2 )
             Sensor   Fingerprint matcher
                                                                               false
                                                                                       impostor




12-11-2011                                       G.L. Marcialis, IJCB 2011                        6
Experiments
                                 score fusion rules


      1. product                             s = s1 ⋅ s2

      2. weighted sum (LDA)                  s = w0 + w1s1 + w2 s2

      3. likelihood ratio (LLR)              s = p(s1 , s2 | G) / p(s1 , s2 | I )

      4. extended LLR*                       explicitly models the distribution of
             [Rodrigues et al., JVLC 2009]   spoof attacks (worst-case)




12-11-2011                                   G.L. Marcialis, IJCB 2011               7
Experiments
                        Fake biometric traits

• Fake fingerprints by “consensual method”
     – mould: plasticine-like materials
     – cast: latex, silicon, and two-compound mixture of liquid silicon




                                                       live      fake (latex) fake (silicon)
•   Fake faces by “photo attack” and “personal photo attack”
     – Photo displayed on a laptop screen to camera
     – Personal photos (like those appearing on social networks)




                                  live      fake (photo) fake (personal)
12-11-2011                           G.L. Marcialis, IJCB 2011                          8
Experiments
               Data sets




12-11-2011       G.L. Marcialis, IJCB 2011   9
Experiments
                         Results
• Fakes: latex (fingerprints) and photo (faces)
• Worst case assumption (dashed lines) holds to some extent




12-11-2011                 G.L. Marcialis, IJCB 2011     10
Experiments
                         Results
• Fakes: latex (fingerprints) and photo (faces)
• Worst case assumption (dashed lines) does not hold




12-11-2011                 G.L. Marcialis, IJCB 2011   11
Experiments
Extended LLR can be less robust than LLR
                        Results
  to realistic fingerprint spoof attacks!
• Fakes: latex (fingerprints) and photo (faces)
• Worst case assumption (dashed lines) does not hold




12-11-2011                 G.L. Marcialis, IJCB 2011   12
Experiments
                           Results

• Fakes: silicone (fingerprint) and personal photos (face)




12-11-2011                   G.L. Marcialis, IJCB 2011       13
Conclusions and future work
•   Crucial issue
     – performance evaluation of multimodal biometric systems under
       spoofing attacks


•   State-of-the-art: “worst-case” scenario

•   Our results
     – it may not provide an accurate model for fake score simulation
     – Score fusion rules designed under this assumption may worsen the
       system’s robustness!


•   Future work
     – experimental analysis involving other spoofing attacks
     – more accurate modelling and simulation of fake score distributions




12-11-2011                         G.L. Marcialis, IJCB 2011                14

Weitere ähnliche Inhalte

Mehr von Pluribus One

Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Pluribus One
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Pluribus One
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Pluribus One
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Pluribus One
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
Pluribus One
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Pluribus One
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
Pluribus One
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
Pluribus One
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
Pluribus One
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Pluribus One
 

Mehr von Pluribus One (20)

Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
 
On Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial SettingsOn Security and Sparsity of Linear Classifiers for Adversarial Settings
On Security and Sparsity of Linear Classifiers for Adversarial Settings
 
Secure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion AttacksSecure Kernel Machines against Evasion Attacks
Secure Kernel Machines against Evasion Attacks
 
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security MeasuresMachine Learning under Attack: Vulnerability Exploitation and Security Measures
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
 
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
 
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
 
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware ClusteringBattista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
 
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
 
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
 
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
 
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
 
Amilab IJCB 2011 Poster
Amilab IJCB 2011 PosterAmilab IJCB 2011 Poster
Amilab IJCB 2011 Poster
 
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Artificial Intelligence and Security - 2011
 
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - PosterAriu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Robustness of multimodal biometric verification systems under realistic spoofing attacks - G.L. Marcialis @ IJCB2011

  • 1. Pattern Recognition and Applications group Department of Electrical and Electronic Engineering (DIEE) University of Cagliari, Italy Robustness of multi-modal biometric verification systems under realistic spoofing attacks Battista Biggio, Zahid Akthar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli Int’l Joint Conf. On Biometrics, IJCB 2011
  • 2. Biometrics • Examples of body traits that can be used for biometric recognition Face Fingerprint Iris Hand geometry Palmprint Signature Voice Gait • Enrollment and verification phases in biometric system User User Identity Feature XTemplate Enrollment Sensor Extractor Database User Claimed Identity XQuery XTemplate Sensor Feature Matcher Database Verification Extractor score Decision Genuine/Impostor 12-11-2011 G.L. Marcialis, IJCB 2011 2
  • 3. Biometric systems • Multi-modal biometric verification systems DB true genuine s1 Sensor Face matcher s Score fusion rule s ≥ s∗ s2 f (s1 , s2 ) Sensor Fingerprint matcher false impostor DB – more accurate than unimodal – more robust to spoof attacks? 12-11-2011 G.L. Marcialis, IJCB 2011 3
  • 4. Direct (spoofing) attacks • Spoofing attacks – attacks at the user interface (sensor) – fake biometric traits • Countermeasures – liveness detection – multi-modal biometric systems 12-11-2011 G.L. Marcialis, IJCB 2011 4
  • 5. Motivation and goal of this work • Open problems – Estimation of the FAR under spoof attacks for multi-modal systems – Construction of fake biometric traits (cumbersome task) • State-of-the-art – Fake scores are simulated under a worst-case scenario, re- sampling genuine user scores sifake : p(si | G) (when the i-th matcher is spoofed) • Our goal – To experimentally verify if this worst-case assumption holds under realistic spoofing attacks 12-11-2011 G.L. Marcialis, IJCB 2011 5
  • 6. Experiments • Multi-modal system with face and fingerprint matchers – Bozorth3 (fingerprint) – Elastic Bunch Graph Matching, EBGM (face) true genuine s1 Sensor Face matcher s Score fusion rule s ≥ s∗ s2 f (s1 , s2 ) Sensor Fingerprint matcher false impostor 12-11-2011 G.L. Marcialis, IJCB 2011 6
  • 7. Experiments score fusion rules 1. product s = s1 ⋅ s2 2. weighted sum (LDA) s = w0 + w1s1 + w2 s2 3. likelihood ratio (LLR) s = p(s1 , s2 | G) / p(s1 , s2 | I ) 4. extended LLR* explicitly models the distribution of [Rodrigues et al., JVLC 2009] spoof attacks (worst-case) 12-11-2011 G.L. Marcialis, IJCB 2011 7
  • 8. Experiments Fake biometric traits • Fake fingerprints by “consensual method” – mould: plasticine-like materials – cast: latex, silicon, and two-compound mixture of liquid silicon live fake (latex) fake (silicon) • Fake faces by “photo attack” and “personal photo attack” – Photo displayed on a laptop screen to camera – Personal photos (like those appearing on social networks) live fake (photo) fake (personal) 12-11-2011 G.L. Marcialis, IJCB 2011 8
  • 9. Experiments Data sets 12-11-2011 G.L. Marcialis, IJCB 2011 9
  • 10. Experiments Results • Fakes: latex (fingerprints) and photo (faces) • Worst case assumption (dashed lines) holds to some extent 12-11-2011 G.L. Marcialis, IJCB 2011 10
  • 11. Experiments Results • Fakes: latex (fingerprints) and photo (faces) • Worst case assumption (dashed lines) does not hold 12-11-2011 G.L. Marcialis, IJCB 2011 11
  • 12. Experiments Extended LLR can be less robust than LLR Results to realistic fingerprint spoof attacks! • Fakes: latex (fingerprints) and photo (faces) • Worst case assumption (dashed lines) does not hold 12-11-2011 G.L. Marcialis, IJCB 2011 12
  • 13. Experiments Results • Fakes: silicone (fingerprint) and personal photos (face) 12-11-2011 G.L. Marcialis, IJCB 2011 13
  • 14. Conclusions and future work • Crucial issue – performance evaluation of multimodal biometric systems under spoofing attacks • State-of-the-art: “worst-case” scenario • Our results – it may not provide an accurate model for fake score simulation – Score fusion rules designed under this assumption may worsen the system’s robustness! • Future work – experimental analysis involving other spoofing attacks – more accurate modelling and simulation of fake score distributions 12-11-2011 G.L. Marcialis, IJCB 2011 14