Improving Gait Biometrics under Spoofing Attacks
نویسندگان
چکیده
Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analysed for the first time the effects of spoofing attacks on silhouette based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. These findings are exploited in this current work for developing new solutions to cope with such possible spoofing attacks. We describe then in this paper an initial solution coping with gait spoofing attacks using part-based gait analysis. The proposed solution is thoroughly evaluated on the challenging USOUgait spoofing database collectedwithin theEUTabulaRasa project. The database consists of records of 22 subjects (14 male and 8 female), between 20-55 years old, walking through the Southampton tunnel in both their normal clothes and whilst wearing a common uniform. The obtained results are very promising and point out very interesting findings which can be used as a reference for developing more enhanced countermeasures by the research community.
منابع مشابه
LBP - TOP Based Countermeasure against Face Spoofing Attacks
User authentication is an important step to protect information and in this field face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using low-tech cheap equipments. This article presents a countermeasure against such attacks based on the LBP −TOP operato...
متن کاملImproving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks
The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural N...
متن کاملMotion-based counter-measures to photo attacks in face recognition
Identity spoofing is a contender for high-security face recognition applications. With the advent of social media and globalized search, our face images and videos are wide-spread on the internet and can be potentially used to attack biometric systems without previous user consent. Yet, research to counter these threats is just on its infancy we lack public standard databases, protocols to meas...
متن کاملA Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks
The exponential growth of immigration crisis and the recent terrorism cases revealed the increase of fraud occurrences, cloning and identity theft with numerous social, economic and political consequences. The trustworthiness of biometrics during verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. Additionally, the cryptography’s role in the...
متن کاملFusion Levels in Multimodal Biometric Systems – A Review
Biometrics is an application area in which different biological traits of a person is taken as input for person identification or authentication. This is highly needed for security reasons. Unimodal biometrics is easy to implement as it uses only one trait or modality of a person but it has many drawbacks like spoofing, non-universality, etc. Multimodal biometrics uses more than one modality of...
متن کامل