Robustness of Multi Biometric Authentication Systems against Spoofing

نویسندگان

  • Mahdi Hariri
  • Shahriar B. Shokouhi
چکیده

Nowadays biometric authentication systems have been more developed, especially in secure and financial systems; so cracking a biometric authentication system is now a growing concern. But their security has not received enough attention. Imitating a biometric trait of a genuine user to deceive a system, spoofing, is the most important attacking method. Multi biometric systems have been developed to overcome some weaknesses of single biometric systems because the forger needs to imitate more than one trait. No research has further investigated the vulnerability of multimodal systems against spoof attack. We empirically examine the robustness of five fixed rules combining similarity scores of face and fingerprint traits in a bimodal system. By producing different spoof scores, the robustness of fixed combination rules is examined against various possibilities of spoofing. Robustness of a multi biometric system depends on the combination rule, the spoof trait and the intensity of spoofing. Min rule shows the most robustness when face is spoofed especially in very secure systems but when the fingerprint is faked the max rule shows the least vulnerability against possibilities of spoofing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Face recognition for authentication on mobile devices

Accessing information from mobile devices has become mainstream nowadays; besides the clear benefits that mobility provides as a mean to improve efficiency, productivity and user convenience, it in turn does require proper methods for secure access control. In this paper, we discuss the use of face biometric technology and share our thoughts on key related issues and concerns: usability, securi...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing ...

متن کامل

Protecting Against Fingerprint Spoofing in Mobile Devices | Synaptics

Biometric forms of authentication are becoming increasingly popular in mobile devices. Passwords and PINs are being replaced by this convenient and more secure form of identification. Although biometric forms of identification provide a higher level of security, hacking and spoofing techniques are also becoming more sophisticated. There are anti-spoofing technologies that can help defend agains...

متن کامل

A Survey on Newer Prospective Biometric Authentication Modalities

Biometric authentication technologies, such as fingerprint, face, iris, and vein, have been widespread in many applications from individual portable devices to national ID management systems. Furthermore, relatively newer biometric authentication modalities including eye movement, lip-motion, etc., have been also researched and developed in order to improve an authentication accuracy and an usa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer and Information Science

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2012