289 research outputs found

    Biometric presentation attack detection: beyond the visible spectrum

    Full text link
    The increased need for unattended authentication in multiple scenarios has motivated a wide deployment of biometric systems in the last few years. This has in turn led to the disclosure of security concerns specifically related to biometric systems. Among them, presentation attacks (PAs, i.e., attempts to log into the system with a fake biometric characteristic or presentation attack instrument) pose a severe threat to the security of the system: any person could eventually fabricate or order a gummy finger or face mask to impersonate someone else. In this context, we present a novel fingerprint presentation attack detection (PAD) scheme based on i) a new capture device able to acquire images within the short wave infrared (SWIR) spectrum, and i i) an in-depth analysis of several state-of-theart techniques based on both handcrafted and deep learning features. The approach is evaluated on a database comprising over 4700 samples, stemming from 562 different subjects and 35 different presentation attack instrument (PAI) species. The results show the soundness of the proposed approach with a detection equal error rate (D-EER) as low as 1.35% even in a realistic scenario where five different PAI species are considered only for testing purposes (i.e., unknown attacks

    Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

    Full text link
    Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application. Ensuring unlinkability across biometric service operators, irreversibility of leaked encrypted templates, and renewability of e.g., voice models following the i-vector paradigm, biometric voice-based systems are prepared for the latest EU data privacy legislation. Employing Paillier cryptosystems, Euclidean and cosine comparators are known to ensure data privacy demands, without loss of discrimination nor calibration performance. Bridging gaps from template protection to speaker recognition, two architectures are proposed for the two-covariance comparator, serving as a generative model in this study. The first architecture preserves privacy of biometric data capture subjects. In the second architecture, model parameters of the comparator are encrypted as well, such that biometric service providers can supply the same comparison modules employing different key pairs to multiple biometric service operators. An experimental proof-of-concept and complexity analysis is carried out on the data from the 2013-2014 NIST i-vector machine learning challenge

    Reversing the Irreversible: A Survey on Inverse Biometrics

    Full text link
    With the widespread use of biometric recognition, several issues related to the privacy and security provided by this technology have been recently raised and analysed. As a result, the early common belief among the biometrics community of templates irreversibility has been proven wrong. It is now an accepted fact that it is possible to reconstruct from an unprotected template a synthetic sample that matches the bona fide one. This reverse engineering process, commonly referred to as \textit{inverse biometrics}, constitutes a severe threat for biometric systems from two different angles: on the one hand, sensitive personal data (i.e., biometric data) can be derived from compromised unprotected templates; on the other hand, other powerful attacks can be launched building upon these reconstructed samples. Given its important implications, biometric stakeholders have produced over the last fifteen years numerous works analysing the different aspects related to inverse biometrics: development of reconstruction algorithms for different characteristics; proposal of methodologies to assess the vulnerabilities of biometric systems to the aforementioned algorithms; development of countermeasures to reduce the possible effects of attacks. The present article is an effort to condense all this information in one comprehensive review of: the problem itself, the evaluation of the problem, and the mitigation of the problem. The present article is an effort to condense all this information in one comprehensive review of: the problem itself, the evaluation of the problem, and the mitigation of the problem.Comment: 18 pages, journal, surve

    On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain

    Full text link
    Nowadays, fingerprint-based biometric recognition systems are becoming increasingly popular. However, in spite of their numerous advantages, biometric capture devices are usually exposed to the public and thus vulnerable to presentation attacks (PAs). Therefore, presentation attack detection (PAD) methods are of utmost importance in order to distinguish between bona fide and attack presentations. Due to the nearly unlimited possibilities to create new presentation attack instruments (PAIs), unknown attacks are a threat to existing PAD algorithms. This fact motivates research on generalisation capabilities in order to find PAD methods that are resilient to new attacks. In this context, we evaluate the generalisability of multiple PAD algorithms on a dataset of 19,711 bona fide and 4,339 PA samples, including 45 different PAI species. The PAD data is captured in the short wave infrared domain and the results discuss the advantages and drawbacks of this PAD technique regarding unknown attacks

    Arabidopsis thaliana DOF6 negatively affects germination in non-after ripened seeds and interacts with TCP14

    Get PDF
    Seed dormancy prevents seeds from germinating under environmental conditions unfavourable for plant growth and development and constitutes an evolutionary advantage. Dry storage, also known as after-ripening, gradually decreases seed dormancy by mechanisms not well understood. An Arabidopsis thaliana DOF transcription factor gene (DOF6) affecting seed germination has been characterized. The transcript levels of this gene accumulate in dry seeds and decay gradually during after-ripening and also upon seed imbibition. While constitutive over-expression of DOF6 produced aberrant growth and sterility in the plant, its over-expression induced upon seed imbibition triggered delayed germination, abscisic acid (ABA)-hypersensitive phenotypes and increased expression of the ABA biosynthetic gene ABA1 and ABA-related stress genes. Wild-type germination and gene expression were gradually restored during seed after-ripening, despite of DOF6-induced over-expression. DOF6 was found to interact in a yeast two-hybrid system andin planta with TCP14, a previously described positive regulator of seed germination. The expression of ABA1 and ABA-related stress genes was also enhanced in tcp14 knock-out mutants. Taken together, these results indicate that DOF6 negatively affects seed germination and opposes TCP14 function in the regulation of a specific set of ABA-related gene

    Evaluating the Sensitivity of Face Presentation Attack Detection Techniques to Images of Varying Resolutions

    Get PDF
    In the last decades, emerging techniques for face Presentation Attack Detection (PAD) have reported a remarkable performance to detect attack presentations whose attack type and capture conditions are known a priori. However, the generalisation capability of PAD approaches shows a considerable deterioration to detect unknown attacks. In order to tackle those generalisation issues, several PAD techniques have focused on the detection of homogeneous features from known attacks to detect unknown Presentation Attack Instruments without taking into account how some intrinsic image properties such as the image resolution or biometric quality could impact their detection performance. In this work, we carry out a thorough analysis of the sensitivity of several texture descriptors which shows how the use of images with varying resolutions for training leads to a high decrease on the attack detection performance

    Privacy-preserving comparison of variable-length data with application to biometric template protection

    Full text link
    The establishment of cloud computing and big data in a wide variety of daily applications has raised some privacy concerns due to the sensitive nature of some of the processed data. This has promoted the need to develop data protection techniques, where the storage and all operations are carried out without disclosing any information. Following this trend, this paper presents a new approach to efficiently compare variable-length data in the encrypted domain using homomorphic encryption where only encrypted data is stored or exchanged. The new variable-length-based algorithm is fused with existing fixed-length techniques in order to obtain increased comparison accuracy. To assess the soundness of the proposed approach, we evaluate its performance on a particular application: a multi-algorithm biometric template protection system based on dynamic signatures that complies with the requirements described in the ISO/IEC 24745 standard on biometric information protection. Experiments have been carried out on a publicly available database and a free implementation of the Paillier cryptosystem to ensure reproducibility and comparability to other schemes.This work was supported in part by the German Federal Ministry of Education and Research (BMBF); in part by the Hessen State Ministry for Higher Education, Research, and the Arts (HMWK) within the Center for Research in Security and Privacy (CRISP); in part by the Spanish Ministerio de Economia y Competitividad / Fondo Europeo de Desarrollo Regional through the CogniMetrics Project under Grant TEC2015-70627-R; and in part by Cecaban

    Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features

    Full text link
    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. M. Gomez-Barrero, J. Galbally, J. Fierrez, and J. Ortega-Garcia, "Enhanced on-line signature verification based on skilled forgery detection using Sigma-LogNormal Features", in International Conference on Biometrics, ICB 2015, 501-506One of the biggest challenges in on-line signature verification is the detection of skilled forgeries. In this paper, we propose a novel scheme, based on the Kinematic Theory of rapid human movements and its associated Sigma LogNormal model, to improve the performance of on-line signature verification systems. The approach combines the high performance of DTW-based systems in verification tasks, with the high potential for skilled forgery detection of the Kinematic Theory of rapid human movements. Experiments were carried out on the publicly available BiosecurID multimodal database, comprising 400 subjects. Results show that the performance of the DTW-based system improves for both skilled and random forgeries.This work has been partially supported by project Bio- Shield (TEC2012-34881) from Spanish MINECO, BEAT (FP7-SEC-284989) from EU, Cátedra UAM-Telefónica, CECABANK, and grant RGPIN-915 from NSERC Canada. M. G.-B. is supported by a FPU Fellowship from Spanish MECD
    corecore