{"title":"分析一种静脉活动性检测方案","authors":"Thomas Herzog, A. Uhl","doi":"10.1109/IWBF49977.2020.9107960","DOIUrl":null,"url":null,"abstract":"We examine a previously published liveness detection method for guarding against presentation attacks on vein recognition systems which employs motion magnification on video frames, and develop three new attacks that circumvent the proposed protective scheme. The first pair of attacks are direct attacks or presentation attacks, and involve presenting a fake sample with rhythmic motions to the biometric system. The third attack is an indirect attack that feeds the biometric system a synthetic video signal designed to circumvent the liveness detection scheme. Results show that the analysed liveness detection system must not be used as a standalone technique. We conclude by recommending improvements to the analysed scheme to harden against attacks of the kind we presented and to avoid having to combine it with other presentation attack detection techniques.","PeriodicalId":174654,"journal":{"name":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Analysing a Vein Liveness Detection Scheme\",\"authors\":\"Thomas Herzog, A. Uhl\",\"doi\":\"10.1109/IWBF49977.2020.9107960\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We examine a previously published liveness detection method for guarding against presentation attacks on vein recognition systems which employs motion magnification on video frames, and develop three new attacks that circumvent the proposed protective scheme. The first pair of attacks are direct attacks or presentation attacks, and involve presenting a fake sample with rhythmic motions to the biometric system. The third attack is an indirect attack that feeds the biometric system a synthetic video signal designed to circumvent the liveness detection scheme. Results show that the analysed liveness detection system must not be used as a standalone technique. We conclude by recommending improvements to the analysed scheme to harden against attacks of the kind we presented and to avoid having to combine it with other presentation attack detection techniques.\",\"PeriodicalId\":174654,\"journal\":{\"name\":\"2020 8th International Workshop on Biometrics and Forensics (IWBF)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 8th International Workshop on Biometrics and Forensics (IWBF)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWBF49977.2020.9107960\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Workshop on Biometrics and Forensics (IWBF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWBF49977.2020.9107960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We examine a previously published liveness detection method for guarding against presentation attacks on vein recognition systems which employs motion magnification on video frames, and develop three new attacks that circumvent the proposed protective scheme. The first pair of attacks are direct attacks or presentation attacks, and involve presenting a fake sample with rhythmic motions to the biometric system. The third attack is an indirect attack that feeds the biometric system a synthetic video signal designed to circumvent the liveness detection scheme. Results show that the analysed liveness detection system must not be used as a standalone technique. We conclude by recommending improvements to the analysed scheme to harden against attacks of the kind we presented and to avoid having to combine it with other presentation attack detection techniques.