Guest Editorial Special Issue on Biometric Spoofing and Countermeasures

نویسندگان

  • Nicholas W. D. Evans
  • Stan Z. Li
  • Sébastien Marcel
  • Arun Ross
چکیده

While biometrics technology has created new solutions to person authentication and has evolved to play a critical role in personal, national and global security, the potential for the technology to be fooled or spoofed is now widely acknowledged. For example, fingerprint verification systems can be spoofed with a synthetic material, such as gelatine, inscribed with the fingerprint ridges of an enrolled individual. Iris and face recognition systems are vulnerable to printed photographs or video sequences of an enrolled user’s eye or face. Speaker recognition systems can be spoofed through the use of replayed, synthesized or converted speech. The interest in spoofing and countermeasures has grown significantly in recent years: several well known cases publicized in the mass media have shown that the biometric authentication modules in some of today’s most popular consumer electronics devices are vulnerable to spoofing; there are now numerous special sessions, tutorials, competitive evaluations and international standards (ISO/IEC JTC SC37) on the topic; commercial biometric authentication solutions are increasingly equipped with liveness detection; Europe funded a largescale collaborative project, known as TABULA RASA1, to investigate the threat of spoofing and to develop dedicated countermeasures. While efforts to develop countermeasures are now well under way and some promising solutions have emerged, there are some common shortcomings in current research methodologies. Existing countermeasures, designed to detect and deflect spoofing attacks, are typically learned using training data produced using exactly the same spoofing method that is to be detected. This practice amounts to the biased use of prior knowledge which is clearly unrepresentative of a practical scenario in which the nature of the attack can never be known. At best, research results generated with such methodologies exaggerate countermeasure performance; at worst, they mask the true scale of the problem. This special issue was conceived to further the state-ofthe-art in biometrics spoofing countermeasures, to stimulate increased cross-fertilisation between the biometrics and information forensic communities and to encourage the development of reliable methodologies in spoofing and countermeasure assessment and solutions. In particular the aim was to foster a shift from current research methodologies and attack-specific countermeasures to novel methodologies and generalised countermeasures having the potential to protect biometric systems against varying or previously unseen attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society

The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive pe...

متن کامل

Guest Editorial – Special Issue on Biometric Security and Privacy

Biometrics is the science of recognising individuals based on their behavioural and biological characteristics such as face, fingerprints, iris, voice, gait and signature. A typical biometric system may be viewed as a pattern classification system which utilises advanced signal processing schemes to compare and match biometric data. The past decade has witnessed a rapid increase in biometrics r...

متن کامل

Spoofing and countermeasures for automatic speaker verification

It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work...

متن کامل

Joint Speaker Verification and Antispoofing in the i-Vector Space

Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks considered as one of the most challenging for modern recognition systems. To detect spoofing, most...

متن کامل

Spoofing and countermeasures for speaker verification: A survey

While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Information Forensics and Security

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2015