[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3600160.3604992acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Mitigating undesired interactions between liveness detection components in biometric authentication

Published: 29 August 2023 Publication History

Abstract

Biometric authentication has made great strides throughout the years thanks to better hardware and software support. However, attackers are unrelenting in finding new ways to spoof a subject, hereby breaking existing presentation attack detection schemes. Similar to combining multiple authentication factors, a combination of liveness detection defenses is expected to strengthen security against spoofing attacks. The problem that we address is that many defenses have only been evaluated in isolation or in ideal circumstances. In this work, we demonstrate how different liveness components for face authentication can interfere with one another, thereby jeopardizing security. Furthermore, contextual and environmental influences can endanger their robustness. In this work, we propose a security framework for biometric authentication that supports adaptive liveness detection by reasoning upon undesired interactions between defenses, the impact of new attacks, and the context in which they emerge. We validate the flexibility of our framework to account for both historic and novel interplays between attacks and defenses. Our experiments show that our framework effectively accounts for undesired interactions while only incurring a limited and acceptable performance overhead.

References

[1]
Zahid Akhtar, Christian Michelon, and Gian Luca Foresti. 2014. Liveness detection for biometric authentication in mobile applications. In 2014 International Carnahan Conference on Security Technology (ICCST). IEEE, 1–6.
[2]
Takuma Amada, Seng Pei Liew, Kazuya Kakizaki, and Toshinori Araki. 2021. Universal Adversarial Spoofing Attacks against Face Recognition. In 2021 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1–7.
[3]
Patricia Arias-Cabarcos, Christian Krupitzer, and Christian Becker. 2019. A survey on adaptive authentication. ACM Computing Surveys (CSUR) 52, 4 (2019), 1–30.
[4]
Jiamin Bai, Tian-Tsong Ng, Xinting Gao, and Yun-Qing Shi. 2010. Is physics-based liveness detection truly possible with a single image?. In Proceedings of 2010 IEEE International Symposium on Circuits and Systems. IEEE, 3425–3428.
[5]
Battista Biggio, Paolo Russu, Luca Didaci, Fabio Roli, 2015. Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Processing Magazine 32, 5 (2015), 31–41.
[6]
Dipankar Dasgupta, Arunava Roy, and Abhijit Nag. 2016. Toward the design of adaptive selection strategies for multi-factor authentication. computers & security 63 (2016), 85–116.
[7]
Maria De Marsico, Michele Nappi, Daniel Riccio, and Jean-Luc Dugelay. 2012. Moving face spoofing detection via 3D projective invariants. In 2012 5th IAPR International Conference on Biometrics (ICB). IEEE, 73–78.
[8]
Nesli Erdogmus and Sebastien Marcel. 2013. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect. In 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 1–6.
[9]
Litong Feng, Lai-Man Po, Yuming Li, Xuyuan Xu, Fang Yuan, Terence Chun-Ho Cheung, and Kwok-Wai Cheung. 2016. Integration of image quality and motion cues for face anti-spoofing: A neural network approach. Journal of Visual Communication and Image Representation 38 (2016), 451–460.
[10]
Anjith George and Sébastien Marcel. 2021. On the effectiveness of vision transformers for zero-shot face anti-spoofing. In 2021 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1–8.
[11]
Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. 2015. An investigation of local descriptors for biometric spoofing detection. IEEE transactions on information forensics and security 10, 4 (2015), 849–863.
[12]
Paul Grassi, Ray Perlner, Elaine Newton, Andrew Regenscheid, William Burr, Justin Richer, Naomi Lefkovitz, Jamie Danker, and Mary Theofanos. 2017. Digital Identity Guidelines: Authentication and Lifecycle Management [including updates as of 03-02-2020]. https://doi.org/10.6028/NIST.SP.800-63b
[13]
Javier Hernandez-Ortega, Julian Fierrez, Aythami Morales, and Pedro Tome. 2018. Time Analysis of Pulse-Based Face Anti-Spoofing in Visible and NIR. In 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 657–6578. https://doi.org/10.1109/CVPRW.2018.00096
[14]
Javier Hernandez-Ortega, Ruben Tolosana, Julian Fierrez, and Aythami Morales. 2020. Deepfakeson-phys: Deepfakes detection based on heart rate estimation. arXiv preprint arXiv:2010.00400 (2020).
[15]
Javier Hernandez-Ortega, Ruben Tolosana, Julian Fierrez, and Aythami Morales. 2022. DeepFakes detection based on heart rate estimation: single-and multi-frame. In Handbook of Digital Face Manipulation and Detection. Springer, Cham, 255–273.
[16]
Wonjun Kim, Sungjoo Suh, and Jae-Joon Han. 2015. Face liveness detection from a single image via diffusion speed model. IEEE transactions on Image processing 24, 8 (2015), 2456–2465.
[17]
Klaus Kollreider, Hartwig Fronthaler, and Josef Bigun. 2005. Evaluating liveness by face images and the structure tensor. In Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID’05). IEEE, 75–80.
[18]
Neslihan Kose and Jean-Luc Dugelay. 2013. Countermeasure for the protection of face recognition systems against mask attacks. In 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG). IEEE, 1–6.
[19]
Lei Li, Paulo Lobato Correia, and Abdenour Hadid. 2018. Face recognition under spoofing attacks: countermeasures and research directions. Iet Biometrics 7, 1 (2018), 3–14.
[20]
Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, and Robert H Deng. 2015. Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1558–1569.
[21]
Jukka Määttä, Abdenour Hadid, and Matti Pietikäinen. 2011. Face spoofing detection from single images using micro-texture analysis. In 2011 international joint conference on Biometrics (IJCB). IEEE, 1–7.
[22]
Mark A Musen. 2015. The protégé project: a look back and a look forward. AI matters 1, 4 (2015), 4–12.
[23]
Gang Pan, Lin Sun, Zhaohui Wu, and Shihong Lao. 2007. Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In 2007 IEEE 11th international conference on computer vision. IEEE, 1–8.
[24]
Davy Preuveneers, Sander Joos, and Wouter Joosen. 2021. AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication. In Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, Virtual Event, September 27-30, 2021, Proceedings(Lecture Notes in Computer Science, Vol. 12927), Simone Fischer-Hübner, Costas Lambrinoudakis, Gabriele Kotsis, A Min Tjoa, and Ismail Khalil (Eds.). Springer, 155–170. https://doi.org/10.1007/978-3-030-86586-3_11
[25]
Davy Preuveneers, Sander Joos, and Wouter Joosen. 2021. AuthGuide: Analyzing Security, Privacy and Usability Trade-Offs in Multi-factor Authentication. In International Conference on Trust and Privacy in Digital Business. Springer, 155–170.
[26]
Luiz Souza, Luciano Oliveira, Mauricio Pamplona, and Joao Papa. 2018. How far did we get in face spoofing detection?Engineering Applications of Artificial Intelligence 72 (2018), 368–381.
[27]
Jan Spooren, Davy Preuveneers, and Wouter Joosen. 2019. Ppg 2 live: Using dual ppg for active authentication and liveness detection. In 2019 International Conference on Biometrics (ICB). IEEE, 1–6.
[28]
Lin Sun, WaiBin Huang, and MingHui Wu. 2011. TIR/VIS correlation for liveness detection in face recognition. In International Conference on Computer Analysis of Images and Patterns. Springer, 114–121.
[29]
Xudong Sun, Lei Huang, and Changping Liu. 2018. Multimodal face spoofing detection via RGB-D images. In 2018 24th International Conference on Pattern Recognition (ICPR). IEEE, 2221–2226.
[30]
Di Tang, Zhe Zhou, Yinqian Zhang, and Kehuan Zhang. 2018. Face flashing: a secure liveness detection protocol based on light reflections. arXiv preprint arXiv:1801.01949 (2018).
[31]
Yan Wang, Fudong Nian, Teng Li, Zhijun Meng, and Kongqiao Wang. 2017. Robust face anti-spoofing with depth information. Journal of Visual Communication and Image Representation 49 (2017), 332–337.
[32]
Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, and Luigi Lo Iacono. 2022. Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. ACM Transactions on Privacy and Security (2022).
[33]
Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, and Wenyuan Xu. 2022. DepthFake: Spoofing 3D Face Authentication with a 2D Photo. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1710–1726.
[34]
Yaowen Xu, Zhuming Wang, Hu Han, Lifang Wu, and Yongluo Liu. 2021. Exploiting non-uniform inherent cues to improve presentation attack detection. In 2021 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 1–8.
[35]
Wenze Yin, Yue Ming, and Lei Tian. 2016. A face anti-spoofing method based on optical flow field. In 2016 IEEE 13th International Conference on Signal Processing (ICSP). IEEE, 1333–1337.
[36]
Zitong Yu, Yunxiao Qin, Xiaobai Li, Chenxu Zhao, Zhen Lei, and Guoying Zhao. 2021. Deep learning for face anti-spoofing: A survey. arXiv preprint arXiv:2106.14948 (2021).
[37]
Bowen Zhang, Benedetta Tondi, and Mauro Barni. 2020. Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability. Computer Vision and Image Understanding 197 (2020), 102988.
[38]
Meigui Zhang, Kehui Zeng, and Jinwei Wang. 2020. A Survey on Face Anti-Spoofing Algorithms. Journal of Information Hiding and Privacy Protection 2, 1 (2020), 21.
[39]
Zhiwei Zhang, Dong Yi, Zhen Lei, and Stan Z Li. 2011. Face liveness detection by learning multispectral reflectance distributions. In 2011 IEEE International Conference on Automatic Face & Gesture Recognition (FG). IEEE, 436–441.
[40]
Zheng-Yu Zhu, Qian-Hua He, Xiao-Hui Feng, Yan-Xiong Li, and Zhi-Feng Wang. 2013. Liveness detection using time drift between lip movement and voice. In 2013 International Conference on Machine Learning and Cybernetics, Vol. 2. IEEE, 973–978.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
August 2023
1440 pages
ISBN:9798400707728
DOI:10.1145/3600160
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 August 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptive authentication
  2. biometrics
  3. liveness detection

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Flemish Research Programme Cybersecurity
  • Research Fund KU Leuven

Conference

ARES 2023

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 71
    Total Downloads
  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)3
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media