Title :
Do biometric images follow Benford´s law?
Author :
Iorliam, Aamo ; Ho, Anthony T. S. ; Poh, Norman ; Shi, Yun Q.
Author_Institution :
Univ. of Surrey, Guildford, UK
Abstract :
Tampering of biometric samples is becoming an important security concern. Tampering can take place at the sensor level (spoofing), and through the backend, e.g., replacing the template with another sample. One example of backend attack is manipulating the original biometric image, i.e. contaminating the template. We study one particular aspect of tampering: image manipulation. In the forensics literature, Benford´s law has been reported to be very effective in detecting tampering of natural images. In this paper, our motivation is to examine whether biometric images will follow the Benford´s law and whether or not they can be used to detect potential malicious tampering of biometric images. We find that, the biometric samples do indeed follow the Benford´s law; and the method can detect tampering effectively, with Equal Error Rate (EER) of 0.55% for single compressed face images, 2.7% for single compressed fingerprint images, 4.3% for double compressed face images and 3.7% for double compressed fingerprint images.
Keywords :
biometrics (access control); data compression; digital forensics; image coding; Benford law; EER; backend attack; biometric image manipulation; biometric images; biometric sample tampering; double compressed face image; double compressed fingerprint image; equal error rate; forensics; malicious tampering detection; natural image tampering detection; security concern; sensor level tampering; single compressed face image; single compressed fingerprint image; spoofing; template contamination; Biomedical imaging; Discrete cosine transforms; Face; Fingerprint recognition; Image coding; Image matching; Transform coding; Benford´s law; forensic biometrics;
Conference_Titel :
Biometrics and Forensics (IWBF), 2014 International Workshop on
Conference_Location :
Valletta
DOI :
10.1109/IWBF.2014.6914261