Biometric Spoofing and Anti-Spoofing Presentation Attack Detection – part 1 S´ ebastien Marcel Head of the Biometrics Security and Privacy group http://www.idiap.ch/ ~ marcel IEEE Workshop on Information Forensics and Security, Rennes, France – December 5, 2017 1/43
44
Embed
Biometric Spoofing and Anti-Spoofing - Research … · Biometric Spoofing and Anti-Spoofing ... MacGyver - The Human Factor ... Handbook of Biometrics,2008 40/43. Definition
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Biometric Spoofing and Anti-SpoofingPresentation Attack Detection – part 1
Sebastien Marcel
Head of the Biometrics Security and Privacy grouphttp://www.idiap.ch/
~
marcel
IEEE Workshop on Information Forensics and Security,Rennes,
IntroductionBiometrics SecurityPresentation Attacks in MoviesPresentation Attacks in realityDefinitionImportance
2/43
Where is Idiap ?
3/43
Where is Idiap ?
4/43
Where is Idiap ?
Altitude to ski ranges from 1400m to 3000m
5/43
What is Idiap ?
• Non-for-profit research institute founded in 1991
• A�liated with Ecole polytechnique federale de Lausanne(EPFL)
• Research, Education and Technology transfer
• 9 research groups in Human & Media Computing (computervision, speech and audio, machine learning, . . . ) and onegroup on Biometrics Security and Privacy
Spoofing AttackOutwitting a biometric sensor by presenting a counterfeit biometricevidence of a valid user2
Anti-SpoofingCountermeasure to spoofing attack
No common terminology so farspoofing, evasion/concealment, anti-spoofing, livenessdetection, presentation attack, presentation attack detection, . . .
2K. A. Nixon et al. Spoof Detection Schemes; Handbook of Biometrics, 2008
40/43
Definition by ISO 3
Presentation Attack – PApresentation to the biometric data capture subsystem with the goalof interfering with the operation of the biometric systemmethods: artefact, mutilations, replay, . . .goals: impersonation or not being recognized (concealment)
Normal (Bona Fide) Presentation
interaction of the biometric capture subject and the biometric datacapture subsystem in the fashion intended by the policy of thebiometric systemin short anything which is not a PA !
Presentation Attack Instrument – PAIbiometric characteristic or object used in a presentation attackeg. artefacts, dead bodies, altered fingerprints, . . .
Presentation Attack Detection – PADautomated determination of a presentation attack
3ISO/IEC 30107-1:2016, Biometric presentation attack detection – part 1, 2016
41/43
Importance
Presentation Attack is a major threat
7
1
2
3
4
5
6
Sensor Feature Extractor Comparator
Database
Decision
8
biometric data biometric feature score
biometric
reference
because it can be created and performed by anyone with nospecific skills in computer science
42/43
Importance
Funding programs/projects
• EU TABULA RASA ”Trusted Biometrics under SpoofingAttacks” (2010-2014)
www.tabularasa-euproject.org
• EU BEAT ”Biometrics Evaluation and Testing” (2012-2016)
www.beat-eu.org
• CH/VS: Swiss Center for Biometrics Research and Testing(2014–)
www.biometrics-center.ch
• NO: SWAN ”Secure Access Control Over Wide AreaNetwork” (2016-2019)
www.ntnu.edu/iik/swan
• US: IARPA Odin Thor/Loki red team approach (2017-2020)