Biometric Presentation Attack Detection

Authors

  • Abdulrafiu Musa Imam Nottingham Trent University

DOI:

https://doi.org/10.47672/ajce.2631

Keywords:

Cyber Security, Ethical Behavior, Web Based

Abstract

Abstract

 

Purpose: Biometric systems play a crucial role in authentication and identification processes but are vulnerable to various attacks that compromise their security and reliability. Detecting such attacks is critical to ensuring the integrity of these systems and maintaining user trust. This study focuses on detecting face presentation attacks using a cost-effective thermal sensor array. The primary goal is to combine an RGB camera, a thermal sensor array, and deep convolutional neural networks (CNNs) to differentiate between genuine face presentations and facial presentation attacks. The aim is to develop a novel biometric attack detection technique using the thermal sensor array, which is more affordable compared to other existing technologies.

Materials and Methods: The process involves the collection of 46,000 thermal images under various conditions and the application of CNN models for analysis. The thermal images are gathered under diverse lighting conditions, distances, and environments, and are then analyzed using deep learning models, specifically AlexNet and ResNet. The thermal sensor array is chosen for its cost-effectiveness.

Findings: The research findings demonstrate the effectiveness of the proposed approach in detecting attacks on biometric systems. Performance metrics such as an accuracy of 0.9671, an F1 score of 0.9893, a precision score of 0.9872, and a recall of 0.9914 highlight the robustness of the model in distinguishing between genuine and attacked presentations.

Implications to Theory, Practice and Policy:: This study contributes to the field of biometric attack detection by introducing a cost-effective approach using a thermal sensor array. It offers insights into detecting various types of attacks and highlights advancements made in the area of biometric system security. The findings have significant implications for enhancing the security and reliability of biometric systems in diverse applications.

Downloads

Download data is not yet available.

References

Adama, D. (2022). Principles of Responsible AI.

Alessandro Mascellino. (2021). Adversarial image attacks could spawn new biometric presentation attacks. Biom. Res. Group.

Ali, A., Deravi, F., & Hoque, S. (2013). Directional sensitivity of gaze-collinearity features in liveness detection. In 2013 Fourth International Conference on Emerging Security Technologies (pp. 8–11). IEEE. https://doi.org/10.1109/EST.2013.7

Ben-Yacoub, S., Abdeljaoued, Y., & Mayoraz, E. (1999). Fusion of face and speech data for person identity verification. IEEE Transactions on Neural Networks, 10(5), 1065–1074. https://doi.org/10.1109/72.788647

Biometrics Research Group. (2021). China’s facial recognition fraud scandal highlights security risks. South China Morning Post.

Brunelli, R., & Falavigna, D. (1995). Person identification using multiple cues. IEEE Transactions on Pattern Analysis and Machine Intelligence, 17(10), 955–966. https://doi.org/10.1109/34.464560

Chaudhari, U. V., Ramaswamy, G. N., Potamianos, G., & Neti, C. (2003). Information fusion and decision cascading for audio-visual speaker recognition based on time-varying stream reliability prediction. In 2003 International Conference on Multimedia and Expo (pp. III–9). IEEE. https://doi.org/10.1109/ICME.2003.1221235

Chrzan, B.C. Martin. (2014). Liveness detection for face recognition (Master's thesis). Masaryk University, Faculty of Informatics.

Cooper, I., & Yon, J. (2019). Ethical issues in biometrics. Science Insights, 30, 63–69. https://doi.org/10.15354/si.19.re095

Dieckmann, U., Plankensteiner, P., Schamburger, R., Fröba, B., & Meller, S. (1997). SESAM: A biometric person identification system using sensor fusion. In J. Bigün, G. Chollet, & G. Borgefors (Eds.), Audio- and Video-Based Biometric Person Authentication (pp. 301–310). Springer Berlin Heidelberg. https://doi.org/10.1007/BFb0016009

George, A., Marcel, S., & Evans, N. (2019). Biometric Presentation Attack Detection: Beyond Handcrafted Features. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1(3), 170–181.

Hevesi, P., Wille, S., Pirkl, G., Wehn, N., & Lukowicz, P. (2014). Monitoring household activities and user location with a cheap, unobtrusive thermal sensor array. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (pp. 141–145). ACM. https://doi.org/10.1145/2632048.2636084

Institute of Electrical and Electronics Engineers (Ed.). (2007). 2007 IEEE 11th International Conference on Computer Vision: ICCV 2007; Rio de Janeiro, Brazil, 14 - 21 October 2007. IEEE Service Center.

Korshunov, P., & Marcel, S. (2018). DeepFakes: Realism and Vulnerability of Face Recognition to Image Manipulations. IEEE Transactions on Information Forensics and Security, 13(11), 2842–2855.

Naser, A., Lotfi, A., & Zhong, J. (2021). Adaptive thermal sensor array placement for human segmentation and occupancy estimation. IEEE Sensors Journal, 21(3), 1993–2002. https://doi.org/10.1109/JSEN.2020.3020401

Nguyen, D. T., Park, Y. H., Shin, K. Y., Kwon, S. Y., Lee, H. C., & Park, K. R. (2013). Fake finger-vein image detection based on Fourier and wavelet transforms. Digital Signal Processing, 23(6), 1401–1413. https://doi.org/10.1016/j.dsp.2013.04.001

Patel, K., Han, H., Jain, A. K., & Rathgeb, C. (2016). Cross-Spectral Face Recognition: A Survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, 38(5), 1041–1055.

Pontes, B., Cunha, M., Pinho, R., & Fuks, H. (2017). Human-sensing: Low-resolution thermal array sensor data classification of location-based postures. In N. Streitz & P. Markopoulos (Eds.), Distributed, Ambient and Pervasive Interactions (pp. 444–457). Springer International Publishing. https://doi.org/10.1007/978-3-319-58697-7_33

Raghavendra, R., Raja, K. B., & Busch, C. (2015a). Presentation attack detection for face recognition using light field camera. IEEE Transactions on Image Processing, 24(3), 1060–1075. https://doi.org/10.1109/TIP.2015.2395951

Raghavendra, R., Raja, K. B., Yang, B., & Busch, C. (2015). Presentation Attack Detection for Face Recognition using Multi-Spectral Imaging. IEEE Transactions on Information Forensics and Security, 10(3), 556–569.

Raghavendra, R., Surbiryala, J., & Busch, C. (2015b). An efficient finger vein indexing scheme based on unsupervised clustering. In IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015) (pp. 1–8). IEEE. https://doi.org/10.1109/ISBA.2015.7126343

Ramachandra, R., & Busch, C. (2017). Presentation attack detection methods for face recognition systems: A comprehensive survey. ACM Computing Surveys, 50(8), 8:1–8:37. https://doi.org/10.1145/3038924

Sanderson, C., & Paliwal, K. K. (2004). Identity verification using speech and face information. Digital Signal Processing, 14(6), 449–480. https://doi.org/10.1016/j.dsp.2004.05.001

Smith, D. F., Wiliem, A., & Lovell, B. C. (2015). Face recognition on consumer devices: Reflections on replay attacks. IEEE Transactions on Information Forensics and Security, 10(5), 736–745. https://doi.org/10.1109/TIFS.2015.2398819

Sun, Y., Wang, X., & Tang, X. (2017). Beyond Part Models: Person Retrieval with Refined Part Pooling (and A Strong Convolutional Baseline). IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, 4809–4818.

Unite, A. (2021). Adversarial Attacks on Object Recognition Systems Raise Security Concerns for Biometrics. University of Adelaide Research Blog.

Wark, T., Sridharan, S., & Chandran, V. (1999). Robust speaker verification via fusion of speech and lip modalities. In 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing (Vol. 6, pp. 3061–3064). IEEE. https://doi.org/10.1109/ICASSP.1999.757487

Yi, D., Lei, Z., Zhang, Z., & Li, S. Z. (2014). Face anti-spoofing: Multi-spectral approach. In S. Marcel, M. S. Nixon, & S. Z. Li (Eds.), Handbook of Biometric Anti-Spoofing (pp. 83–102). Springer London. https://doi.org/10.1007/978-1-4471-6524-8_5

Zhang, J., Liu, Y., Zhang, X., & Tao, D. (2020). Face Anti-Spoofing: From 2D and 3D Masks to Deep Learning. International Journal of Computer Vision, 128(1), 2223–2246.

Zhang, Z., Yi, D., Lei, Z., & Li, S. Z. (2011). Face liveness detection by learning multispectral reflectance distributions. In Face and Gesture 2011 (pp. 436–441). IEEE.

Downloads

Published

2025-02-19

How to Cite

Imam, A. M. (2025). Biometric Presentation Attack Detection. American Journal of Computing and Engineering, 8(1), 32 – 56. https://doi.org/10.47672/ajce.2631

Issue

Section

Articles