SlideShare a Scribd company logo
Pattern Recognition and Applications group
             Department of Electrical and Electronic Engineering (DIEE)
             University of Cagliari, Italy




Robustness of multi-modal biometric
 verification systems under realistic
           spoofing attacks

    Battista Biggio, Zahid Akthar, Giorgio Fumera,
          Gian Luca Marcialis, and Fabio Roli




                                          Int’l Joint Conf. On Biometrics, IJCB 2011
Biometrics
 • Examples of body traits that can be used for biometric recognition



                            Face        Fingerprint      Iris      Hand geometry




                          Palmprint      Signature       Voice          Gait




• Enrollment and verification phases in biometric system
                   User                               User Identity

                                                                 Feature       XTemplate
 Enrollment                           Sensor
                                                                Extractor
                                                                                           Database



                   User                                    Claimed Identity
                                                                     XQuery         XTemplate
                                      Sensor                Feature         Matcher          Database
 Verification                                              Extractor
                                                                                 score

                                                                                   Decision           Genuine/Impostor

12-11-2011                                       G.L. Marcialis, IJCB 2011                                               2
Biometric systems
• Multi-modal biometric verification systems


                              DB
                                                                                true
                                                                                        genuine
                                             s1
             Sensor      Face matcher
                                                                        s
                                                    Score fusion rule       s ≥ s∗
                                             s2         f (s1 , s2 )
             Sensor    Fingerprint matcher
                                                                                false
                                                                                        impostor

                              DB




     – more accurate than unimodal
     – more robust to spoof attacks?




12-11-2011                                        G.L. Marcialis, IJCB 2011                        3
Direct (spoofing) attacks
• Spoofing attacks
     – attacks at the user interface (sensor)
     – fake biometric traits




• Countermeasures
     – liveness detection
     – multi-modal biometric systems


12-11-2011                       G.L. Marcialis, IJCB 2011   4
Motivation and goal of this work
• Open problems
     – Estimation of the FAR under spoof attacks for multi-modal
       systems
     – Construction of fake biometric traits (cumbersome task)

• State-of-the-art
     – Fake scores are simulated under a worst-case scenario, re-
       sampling genuine user scores


             sifake : p(si | G)   (when the i-th matcher is spoofed)


• Our goal
     – To experimentally verify if this worst-case assumption holds
       under realistic spoofing attacks


12-11-2011                          G.L. Marcialis, IJCB 2011          5
Experiments
• Multi-modal system with face and fingerprint matchers
     – Bozorth3 (fingerprint)
     – Elastic Bunch Graph Matching, EBGM (face)

                                                                               true
                                                                                       genuine
                                            s1
             Sensor     Face matcher
                                                                       s
                                                   Score fusion rule       s ≥ s∗
                                            s2         f (s1 , s2 )
             Sensor   Fingerprint matcher
                                                                               false
                                                                                       impostor




12-11-2011                                       G.L. Marcialis, IJCB 2011                        6
Experiments
                                 score fusion rules


      1. product                             s = s1 ⋅ s2

      2. weighted sum (LDA)                  s = w0 + w1s1 + w2 s2

      3. likelihood ratio (LLR)              s = p(s1 , s2 | G) / p(s1 , s2 | I )

      4. extended LLR*                       explicitly models the distribution of
             [Rodrigues et al., JVLC 2009]   spoof attacks (worst-case)




12-11-2011                                   G.L. Marcialis, IJCB 2011               7
Experiments
                        Fake biometric traits

• Fake fingerprints by “consensual method”
     – mould: plasticine-like materials
     – cast: latex, silicon, and two-compound mixture of liquid silicon




                                                       live      fake (latex) fake (silicon)
•   Fake faces by “photo attack” and “personal photo attack”
     – Photo displayed on a laptop screen to camera
     – Personal photos (like those appearing on social networks)




                                  live      fake (photo) fake (personal)
12-11-2011                           G.L. Marcialis, IJCB 2011                          8
Experiments
               Data sets




12-11-2011       G.L. Marcialis, IJCB 2011   9
Experiments
                         Results
• Fakes: latex (fingerprints) and photo (faces)
• Worst case assumption (dashed lines) holds to some extent




12-11-2011                 G.L. Marcialis, IJCB 2011     10
Experiments
                         Results
• Fakes: latex (fingerprints) and photo (faces)
• Worst case assumption (dashed lines) does not hold




12-11-2011                 G.L. Marcialis, IJCB 2011   11
Experiments
Extended LLR can be less robust than LLR
                        Results
  to realistic fingerprint spoof attacks!
• Fakes: latex (fingerprints) and photo (faces)
• Worst case assumption (dashed lines) does not hold




12-11-2011                 G.L. Marcialis, IJCB 2011   12
Experiments
                           Results

• Fakes: silicone (fingerprint) and personal photos (face)




12-11-2011                   G.L. Marcialis, IJCB 2011       13
Conclusions and future work
•   Crucial issue
     – performance evaluation of multimodal biometric systems under
       spoofing attacks


•   State-of-the-art: “worst-case” scenario

•   Our results
     – it may not provide an accurate model for fake score simulation
     – Score fusion rules designed under this assumption may worsen the
       system’s robustness!


•   Future work
     – experimental analysis involving other spoofing attacks
     – more accurate modelling and simulation of fake score distributions




12-11-2011                         G.L. Marcialis, IJCB 2011                14

More Related Content

PDF
Identity as a Services in a Mobile World - David Harding CTO IWSinc
PDF
Making the space between people and devices disappear
PDF
FinTech Industry Report 2016
PDF
Smart Textiles - Prospettive di mercato - Davide Ariu
PDF
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
PDF
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
PDF
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
PDF
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019
Identity as a Services in a Mobile World - David Harding CTO IWSinc
Making the space between people and devices disappear
FinTech Industry Report 2016
Smart Textiles - Prospettive di mercato - Davide Ariu
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning - 2019 Int...
Wild Patterns: A Half-day Tutorial on Adversarial Machine Learning. ICMLC 201...
Wild patterns - Ten years after the rise of Adversarial Machine Learning - Ne...
WILD PATTERNS - Introduction to Adversarial Machine Learning - ITASEC 2019

More from Pluribus One (20)

PDF
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
PDF
On Security and Sparsity of Linear Classifiers for Adversarial Settings
PDF
Secure Kernel Machines against Evasion Attacks
PDF
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
PDF
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
PDF
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
PDF
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
PDF
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
PDF
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
PDF
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
PDF
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
PDF
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
PDF
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
PDF
Zahid Akhtar - Ph.D. Defense Slides
PDF
Design of robust classifiers for adversarial environments - Systems, Man, and...
PDF
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
PDF
Understanding the risk factors of learning in adversarial environments
PDF
Amilab IJCB 2011 Poster
PDF
Ariu - Workshop on Artificial Intelligence and Security - 2011
PDF
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Is Deep Learning Safe for Robot Vision? Adversarial Examples against the iCub...
On Security and Sparsity of Linear Classifiers for Adversarial Settings
Secure Kernel Machines against Evasion Attacks
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Battista Biggio @ MCS 2015, June 29 - July 1, Guenzburg, Germany: "1.5-class ...
Sparse Support Faces - Battista Biggio - Int'l Conf. Biometrics, ICB 2015, Ph...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio @ AISec 2014 - Poisoning Behavioral Malware Clustering
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage ...
Battista Biggio @ AISec 2013 - Is Data Clustering in Adversarial Settings Sec...
Battista Biggio @ ECML PKDD 2013 - Evasion attacks against machine learning a...
Battista Biggio @ ICML2012: "Poisoning attacks against support vector machines"
Zahid Akhtar - Ph.D. Defense Slides
Design of robust classifiers for adversarial environments - Systems, Man, and...
Support Vector Machines Under Adversarial Label Noise (ACML 2011) - Battista ...
Understanding the risk factors of learning in adversarial environments
Amilab IJCB 2011 Poster
Ariu - Workshop on Artificial Intelligence and Security - 2011
Ariu - Workshop on Applications of Pattern Analysis 2010 - Poster
Ad

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
master seminar digital applications in india
PDF
Basic Mud Logging Guide for educational purpose
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
PPH.pptx obstetrics and gynecology in nursing
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Computing-Curriculum for Schools in Ghana
Renaissance Architecture: A Journey from Faith to Humanism
master seminar digital applications in india
Basic Mud Logging Guide for educational purpose
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
GDM (1) (1).pptx small presentation for students
O7-L3 Supply Chain Operations - ICLT Program
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Sports Quiz easy sports quiz sports quiz
Abdominal Access Techniques with Prof. Dr. R K Mishra
TR - Agricultural Crops Production NC III.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Complications of Minimal Access Surgery at WLH
Ad

Robustness of multimodal biometric verification systems under realistic spoofing attacks - G.L. Marcialis @ IJCB2011

  • 1. Pattern Recognition and Applications group Department of Electrical and Electronic Engineering (DIEE) University of Cagliari, Italy Robustness of multi-modal biometric verification systems under realistic spoofing attacks Battista Biggio, Zahid Akthar, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli Int’l Joint Conf. On Biometrics, IJCB 2011
  • 2. Biometrics • Examples of body traits that can be used for biometric recognition Face Fingerprint Iris Hand geometry Palmprint Signature Voice Gait • Enrollment and verification phases in biometric system User User Identity Feature XTemplate Enrollment Sensor Extractor Database User Claimed Identity XQuery XTemplate Sensor Feature Matcher Database Verification Extractor score Decision Genuine/Impostor 12-11-2011 G.L. Marcialis, IJCB 2011 2
  • 3. Biometric systems • Multi-modal biometric verification systems DB true genuine s1 Sensor Face matcher s Score fusion rule s ≥ s∗ s2 f (s1 , s2 ) Sensor Fingerprint matcher false impostor DB – more accurate than unimodal – more robust to spoof attacks? 12-11-2011 G.L. Marcialis, IJCB 2011 3
  • 4. Direct (spoofing) attacks • Spoofing attacks – attacks at the user interface (sensor) – fake biometric traits • Countermeasures – liveness detection – multi-modal biometric systems 12-11-2011 G.L. Marcialis, IJCB 2011 4
  • 5. Motivation and goal of this work • Open problems – Estimation of the FAR under spoof attacks for multi-modal systems – Construction of fake biometric traits (cumbersome task) • State-of-the-art – Fake scores are simulated under a worst-case scenario, re- sampling genuine user scores sifake : p(si | G) (when the i-th matcher is spoofed) • Our goal – To experimentally verify if this worst-case assumption holds under realistic spoofing attacks 12-11-2011 G.L. Marcialis, IJCB 2011 5
  • 6. Experiments • Multi-modal system with face and fingerprint matchers – Bozorth3 (fingerprint) – Elastic Bunch Graph Matching, EBGM (face) true genuine s1 Sensor Face matcher s Score fusion rule s ≥ s∗ s2 f (s1 , s2 ) Sensor Fingerprint matcher false impostor 12-11-2011 G.L. Marcialis, IJCB 2011 6
  • 7. Experiments score fusion rules 1. product s = s1 ⋅ s2 2. weighted sum (LDA) s = w0 + w1s1 + w2 s2 3. likelihood ratio (LLR) s = p(s1 , s2 | G) / p(s1 , s2 | I ) 4. extended LLR* explicitly models the distribution of [Rodrigues et al., JVLC 2009] spoof attacks (worst-case) 12-11-2011 G.L. Marcialis, IJCB 2011 7
  • 8. Experiments Fake biometric traits • Fake fingerprints by “consensual method” – mould: plasticine-like materials – cast: latex, silicon, and two-compound mixture of liquid silicon live fake (latex) fake (silicon) • Fake faces by “photo attack” and “personal photo attack” – Photo displayed on a laptop screen to camera – Personal photos (like those appearing on social networks) live fake (photo) fake (personal) 12-11-2011 G.L. Marcialis, IJCB 2011 8
  • 9. Experiments Data sets 12-11-2011 G.L. Marcialis, IJCB 2011 9
  • 10. Experiments Results • Fakes: latex (fingerprints) and photo (faces) • Worst case assumption (dashed lines) holds to some extent 12-11-2011 G.L. Marcialis, IJCB 2011 10
  • 11. Experiments Results • Fakes: latex (fingerprints) and photo (faces) • Worst case assumption (dashed lines) does not hold 12-11-2011 G.L. Marcialis, IJCB 2011 11
  • 12. Experiments Extended LLR can be less robust than LLR Results to realistic fingerprint spoof attacks! • Fakes: latex (fingerprints) and photo (faces) • Worst case assumption (dashed lines) does not hold 12-11-2011 G.L. Marcialis, IJCB 2011 12
  • 13. Experiments Results • Fakes: silicone (fingerprint) and personal photos (face) 12-11-2011 G.L. Marcialis, IJCB 2011 13
  • 14. Conclusions and future work • Crucial issue – performance evaluation of multimodal biometric systems under spoofing attacks • State-of-the-art: “worst-case” scenario • Our results – it may not provide an accurate model for fake score simulation – Score fusion rules designed under this assumption may worsen the system’s robustness! • Future work – experimental analysis involving other spoofing attacks – more accurate modelling and simulation of fake score distributions 12-11-2011 G.L. Marcialis, IJCB 2011 14