A Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks

نویسندگان

  • Christina-Angeliki Toli
  • Bart Preneel
چکیده

The exponential growth of immigration crisis and the recent terrorism cases revealed the increase of fraud occurrences, cloning and identity theft with numerous social, economic and political consequences. The trustworthiness of biometrics during verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. Additionally, the cryptography’s role in the area is highly important as it may promote fair assessment procedures and foster public trust by serving the demands for proportionality, reducing the concerns about national surveillance. Literature efforts are devoted to studying model threats and problems raised by targeted malicious actions for biometric techniques. However, attacks against multi-modal crypto-biometric systems have not received much attention. This paper presents cryptosystems, intrusions and countermeasures for single, multiple modalities and complicated schemes. Finally, a novel bimodal privacy friendly cryptosystem is suggested, able to reject such kind of attacks, presenting an anti-spoofing behavior under the cooperation between user and the function. The aim of this multidisciplinary work is to organize the current performances on how to develop security, contribute to research by designs able to address real-world use cases and pinpoint the potentiality for improvements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data

Automatic speaker verification (ASV) systems are vulnerable to spoofing attacks using speech generated by voice conversion and speech synthesis techniques. Commonly, a countermeasure (CM) system is integrated with an ASV system for improved protection against spoofing attacks. But integration of the two systems is challenging and often leads to increased false rejection rates. Furthermore, the ...

متن کامل

Anti-spoofing Methods for Automatic Speaker Verification System

Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...

متن کامل

Trustworthy Biometric Verification under Spoofing Attacks: Application to the Face Mode

The need for automation of the identity recognition process for a vast number of applications resulted in great advancement of biometric systems in the recent years. Yet, many studies indicate that these systems suffer from vulnerabilities to spoofing (presentation) attacks: a weakness that may compromise their usage in many cases. Face verification systems account for one of the most attractiv...

متن کامل

Voice conversion versus speaker verification: an overview

A speaker verification system automatically accepts or rejects a claimed identity of a speaker based on a speech sample. Recently, a major progress was made in speaker verification which leads to mass market adoption, such as in smartphone and in online commerce for user authentication. A major concern when deploying speaker verification technology is whether a system is robust against spoofing...

متن کامل

Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals

The vulnerability of automatic speaker verification systems to imposture or spoofing is widely acknowledged. This paper shows that extremely high false alarm rates can be provoked by simple spoofing attacks with artificial, non-speech-like signals and highlights the need for spoofing countermeasures. We show that two new, but trivial countermeasures based on higher-level, dynamic features and v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015