Title :
Introduction to identity usurpation applied to biometric modalities
Author :
Ichahane, My Youssef ; Chiny, Mohamed ; Abou Elkalam, Anas ; Ouahman, Abdellah Ait
Author_Institution :
Nat. Sch. of Appl. Sci., Cadi Ayaad Univ., Morocco
Abstract :
In this paper, we first discussed the rationale behind the attacks on biometric authentication systems. We also discussed the eight conceptual points of vulnerability that an attacker can use to bypass a biometric recognition system. Among all the attacks, the spoofing attacks (providing false biometric features for the sensor) gained much attention and therefore we have defined and discussed them in detail. Indeed, we will present thorough review of the state of the art of usurpation methods of both faces a biometric digital fingerprint. Then, we will give the review of the literature on the evaluation of the robustness of multimodal biometric systems against spoofing attacks. Various existing studies concluded the popular thought that the multimodal biometric systems are vulnerable to spoofing attacks and can be cracked even by usurping a single feature.
Keywords :
cryptography; face recognition; fingerprint identification; biometric authentication systems; biometric digital fingerprint; biometric recognition system; identity usurpation; multimodal biometric systems; spoofing attacks; usurpation methods; Classification algorithms; Robustness; biometric systems; liveliness detection; multibiometric; robustness; spoof attacks;
Conference_Titel :
Multimedia Computing and Systems (ICMCS), 2014 International Conference on
Conference_Location :
Marrakech
Print_ISBN :
978-1-4799-3823-0
DOI :
10.1109/ICMCS.2014.6911332