Transcript

IQA(Image Quality Assessment)for

Fake Biometric Detection

Vulnerability of Biometric Systems Security

face recognition fingerprint iris

introduction hypothesis method results conclusion more

hypothesis method results conclusion more

classification of attack & detection methods

introduction

requirement

non-invasive

user friendly

fast

low cost

performance

introduction hypothesis method results conclusion more

introduction

hypothesis

It is expected that a fake image captured in an attack attempt will havedifferent quality than a real sample acquired in the normal operation scenario for which the sensor was designed.

degree of sharpness color and luminance levelentropy( 信息熵 )structural distortion

hypothesis method results conclusion more

introduction

current problems

objection

none of current detection methods is generalexample:ridge and valley frequencyamount of occlusion of eyegummy fingers made out of silicone & gelatin

providing the method with multi-attack protection capability

hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

Main Page

Topic 1 Topic 2 Topic 3 Topic 4 Topic 5introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

Edge_Based:Sobel operator

introduction hypothesis method results conclusion more

SSIM(Structural Similarity Index Measure)

contrast or brghtness changes (nonstructural disortions)

introduction hypothesis method results conclusion more

VIF:Visual Information Fidelity

distortion change

HVS:human visual system

introduction hypothesis method results conclusion more

JPEG Quality Index

introduction hypothesis method results conclusion more

Experiments and Results

FGR:False Genuine RateFFR:False Fake RateHTER:HTER=(FGR+FFR)/2AV TIME

1.iris2.fingerprint3.2-D face

i.spoofing attackii.synthetic sample attackiii.other methods

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

1.validate the "quality difference" hypothesis2.show high potential of IQA for secruing biometric systems3.proposal and validation of a new biometric protectiong method

conclusion

introduction hypothesis method results conclusion more

introduction hypothesis method results conclusion more

top related