DocumentCode :
232352
Title :
Toward an attack-sensitive tamper-resistant biometric recognition with a symmetric matcher: A fingerprint case study
Author :
Poh, Norman ; Wong, Rita ; Marcialis, Gian-Luca
Author_Institution :
Dept. of Comput., Univ. of Surrey, Guildford, UK
fYear :
2014
fDate :
9-12 Dec. 2014
Firstpage :
175
Lastpage :
180
Abstract :
In order to render a biometric system robust against malicious tampering, it is important to understand the different types of attack and their impact as observed by the liveness and matching scores. In this study, we consider zero-effort impostor attack (referred to as the Z-attack), nonzero-effort impostor attack such as presentation attack or spoofing (S-attack), and other categories of attack involving tampering at the template level (U- and T-attacks). In order to elucidate the impact of all possible attacks, we (1) introduce the concepts of source of origin and symmetric biometric matchers, and (2) subsequently group the attacks into four categories. These views not only improve the understanding of the nature of different attacks but also turn out to ease the design of the classification problem. Following this analysis, we design a novel classification scheme that can take full advantage of the attack-specific data characteristics. Two realisations of the scheme, namely, a mixture of linear classifiers, and a Gaussian Copula-based Bayesian classifier, turn out to outperform a strong baseline classifier based on SVM, as supported by fingerprint spoofing experiments.
Keywords :
Bayes methods; Gaussian processes; fingerprint identification; image classification; image matching; security of data; Gaussian Copula-based Bayesian classifier; S-attack; T-attack; U-attacks; Z-attack; attack grouping; attack-sensitive tamper-resistant biometric recognition; attack-specific data characteristics; biometric system; classification problem; fingerprint spoofing; linear classifiers; liveness score; malicious tampering; matching score; nonzero-effort impostor attack; presentation attack; symmetric biometric matchers; symmetric matcher; template level; zero-effort impostor attack; Bayes methods; Biometrics (access control); Databases; Logistics; Materials; Support vector machines; Training;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence in Biometrics and Identity Management (CIBIM), 2014 IEEE Symposium on
Conference_Location :
Orlando, FL
Type :
conf
DOI :
10.1109/CIBIM.2014.7015460
Filename :
7015460
Link To Document :
بازگشت