289 research outputs found
Biometric presentation attack detection: beyond the visible spectrum
The increased need for unattended authentication in
multiple scenarios has motivated a wide deployment of biometric
systems in the last few years. This has in turn led to the
disclosure of security concerns specifically related to biometric
systems. Among them, presentation attacks (PAs, i.e., attempts
to log into the system with a fake biometric characteristic or
presentation attack instrument) pose a severe threat to the
security of the system: any person could eventually fabricate
or order a gummy finger or face mask to impersonate someone
else. In this context, we present a novel fingerprint presentation
attack detection (PAD) scheme based on i) a new capture device
able to acquire images within the short wave infrared (SWIR)
spectrum, and i i) an in-depth analysis of several state-of-theart
techniques based on both handcrafted and deep learning
features. The approach is evaluated on a database comprising
over 4700 samples, stemming from 562 different subjects and
35 different presentation attack instrument (PAI) species. The
results show the soundness of the proposed approach with a
detection equal error rate (D-EER) as low as 1.35% even in a
realistic scenario where five different PAI species are considered
only for testing purposes (i.e., unknown attacks
Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters
Data privacy is crucial when dealing with biometric data. Accounting for the
latest European data privacy regulation and payment service directive,
biometric template protection is essential for any commercial application.
Ensuring unlinkability across biometric service operators, irreversibility of
leaked encrypted templates, and renewability of e.g., voice models following
the i-vector paradigm, biometric voice-based systems are prepared for the
latest EU data privacy legislation. Employing Paillier cryptosystems, Euclidean
and cosine comparators are known to ensure data privacy demands, without loss
of discrimination nor calibration performance. Bridging gaps from template
protection to speaker recognition, two architectures are proposed for the
two-covariance comparator, serving as a generative model in this study. The
first architecture preserves privacy of biometric data capture subjects. In the
second architecture, model parameters of the comparator are encrypted as well,
such that biometric service providers can supply the same comparison modules
employing different key pairs to multiple biometric service operators. An
experimental proof-of-concept and complexity analysis is carried out on the
data from the 2013-2014 NIST i-vector machine learning challenge
Reversing the Irreversible: A Survey on Inverse Biometrics
With the widespread use of biometric recognition, several issues related to
the privacy and security provided by this technology have been recently raised
and analysed. As a result, the early common belief among the biometrics
community of templates irreversibility has been proven wrong. It is now an
accepted fact that it is possible to reconstruct from an unprotected template a
synthetic sample that matches the bona fide one. This reverse engineering
process, commonly referred to as \textit{inverse biometrics}, constitutes a
severe threat for biometric systems from two different angles: on the one hand,
sensitive personal data (i.e., biometric data) can be derived from compromised
unprotected templates; on the other hand, other powerful attacks can be
launched building upon these reconstructed samples. Given its important
implications, biometric stakeholders have produced over the last fifteen years
numerous works analysing the different aspects related to inverse biometrics:
development of reconstruction algorithms for different characteristics;
proposal of methodologies to assess the vulnerabilities of biometric systems to
the aforementioned algorithms; development of countermeasures to reduce the
possible effects of attacks. The present article is an effort to condense all
this information in one comprehensive review of: the problem itself, the
evaluation of the problem, and the mitigation of the problem. The present
article is an effort to condense all this information in one comprehensive
review of: the problem itself, the evaluation of the problem, and the
mitigation of the problem.Comment: 18 pages, journal, surve
On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Nowadays, fingerprint-based biometric recognition systems are becoming
increasingly popular. However, in spite of their numerous advantages, biometric
capture devices are usually exposed to the public and thus vulnerable to
presentation attacks (PAs). Therefore, presentation attack detection (PAD)
methods are of utmost importance in order to distinguish between bona fide and
attack presentations. Due to the nearly unlimited possibilities to create new
presentation attack instruments (PAIs), unknown attacks are a threat to
existing PAD algorithms. This fact motivates research on generalisation
capabilities in order to find PAD methods that are resilient to new attacks. In
this context, we evaluate the generalisability of multiple PAD algorithms on a
dataset of 19,711 bona fide and 4,339 PA samples, including 45 different PAI
species. The PAD data is captured in the short wave infrared domain and the
results discuss the advantages and drawbacks of this PAD technique regarding
unknown attacks
Arabidopsis thaliana DOF6 negatively affects germination in non-after ripened seeds and interacts with TCP14
Seed dormancy prevents seeds from germinating under environmental conditions unfavourable for plant growth and development and constitutes an evolutionary advantage. Dry storage, also known as after-ripening, gradually decreases seed dormancy by mechanisms not well understood. An Arabidopsis thaliana DOF transcription factor gene (DOF6) affecting seed germination has been characterized. The transcript levels of this gene accumulate in dry seeds and decay gradually during after-ripening and also upon seed imbibition. While constitutive over-expression of DOF6 produced aberrant growth and sterility in the plant, its over-expression induced upon seed imbibition triggered delayed germination, abscisic acid (ABA)-hypersensitive phenotypes and increased expression of the ABA biosynthetic gene ABA1 and ABA-related stress genes. Wild-type germination and gene expression were gradually restored during seed after-ripening, despite of DOF6-induced over-expression. DOF6 was found to interact in a yeast two-hybrid system andin planta with TCP14, a previously described positive regulator of seed germination. The expression of ABA1 and ABA-related stress genes was also enhanced in tcp14 knock-out mutants. Taken together, these results indicate that DOF6 negatively affects seed germination and opposes TCP14 function in the regulation of a specific set of ABA-related gene
Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions
In the last decades, emerging techniques for face Presentation Attack Detection (PAD) have reported a remarkable performance to detect attack presentations whose attack type and capture conditions are known a priori. However, the generalisation capability of PAD approaches shows a considerable deterioration to detect unknown attacks. In order to tackle those generalisation issues, several PAD techniques have focused on the detection of homogeneous features from known attacks to detect unknown Presentation Attack Instruments without taking into account how some intrinsic image properties such as the image resolution or biometric quality could impact their detection performance. In this work, we carry out a thorough analysis of the sensitivity of several texture descriptors which shows how the use of images with varying resolutions for training leads to a high decrease on the attack detection performance
Privacy-preserving comparison of variable-length data with application to biometric template protection
The establishment of cloud computing and big data in a wide variety of daily applications has raised some privacy concerns due to the sensitive nature of some of the processed data. This has promoted the need to develop data protection techniques, where the storage and all operations are carried out without disclosing any information. Following this trend, this paper presents a new approach to efficiently compare variable-length data in the encrypted domain using homomorphic encryption where only encrypted data is stored or exchanged. The new variable-length-based algorithm is fused with existing fixed-length techniques in order to obtain increased comparison accuracy. To assess the soundness of the proposed approach, we evaluate its performance on a particular application: a multi-algorithm biometric template protection system based on dynamic signatures that complies with the requirements described in the ISO/IEC 24745 standard on biometric information protection. Experiments have been carried out on a publicly available database and a free implementation of the Paillier cryptosystem to ensure reproducibility and comparability to other schemes.This work was supported in part by the German Federal Ministry of Education and Research (BMBF); in part by the Hessen State Ministry
for Higher Education, Research, and the Arts (HMWK) within the Center for Research in Security and Privacy (CRISP); in part by the
Spanish Ministerio de Economia y Competitividad / Fondo Europeo de Desarrollo Regional through the CogniMetrics Project under Grant
TEC2015-70627-R; and in part by Cecaban
Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. M. Gomez-Barrero, J. Galbally, J. Fierrez, and J. Ortega-Garcia, "Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features", in International Conference on Biometrics, ICB 2015, 501-506One of the biggest challenges in on-line signature verification is the detection of skilled forgeries. In this paper, we propose a novel scheme, based on the Kinematic Theory of rapid human movements and its associated Sigma LogNormal model, to improve the performance of on-line signature verification systems. The approach combines the high performance of DTW-based systems in verification tasks, with the high potential for skilled forgery detection of the Kinematic Theory of rapid human movements. Experiments were carried out on the publicly available BiosecurID multimodal database, comprising 400 subjects. Results show that the performance of the DTW-based system improves for both skilled and random forgeries.This work has been partially supported by project Bio-
Shield (TEC2012-34881) from Spanish MINECO, BEAT
(FP7-SEC-284989) from EU, Cátedra UAM-Telefónica,
CECABANK, and grant RGPIN-915 from NSERC Canada.
M. G.-B. is supported by a FPU Fellowship from Spanish
MECD
- …