B. Biggio, Z. Akhtar, G. Fumera, G. Marcialis, F. Roli
{"title":"Robustness of multi-modal biometric verification systems under realistic spoofing attacks","authors":"B. Biggio, Z. Akhtar, G. Fumera, G. Marcialis, F. Roli","doi":"10.1109/IJCB.2011.6117474","DOIUrl":null,"url":null,"abstract":"Recent works have shown that multi-modal biometric systems are not robust against spoofing attacks [12, 15, 13]. However, this conclusion has been obtained under the hypothesis of a “worst case” attack, where the attacker is able to replicate perfectly the genuine biometric traits. Aim of this paper is to analyse the robustness of some multi-modal verification systems, combining fingerprint and face biometrics, under realistic spoofing attacks, in order to investigate the validity of the results obtained under the worst-case attack assumption.","PeriodicalId":103913,"journal":{"name":"2011 International Joint Conference on Biometrics (IJCB)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Joint Conference on Biometrics (IJCB)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IJCB.2011.6117474","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
Abstract
Recent works have shown that multi-modal biometric systems are not robust against spoofing attacks [12, 15, 13]. However, this conclusion has been obtained under the hypothesis of a “worst case” attack, where the attacker is able to replicate perfectly the genuine biometric traits. Aim of this paper is to analyse the robustness of some multi-modal verification systems, combining fingerprint and face biometrics, under realistic spoofing attacks, in order to investigate the validity of the results obtained under the worst-case attack assumption.