Academia.eduAcademia.edu

Outline

Paper1 Spoof Attacks on Gait Authentication System

https://doi.org/10.1109/TIFS.2007.902030

Abstract

Research in biometric gait recognition has increased. Earlier gait recognition works reported promising results, usually with a small sample size. Recent studies with a larger sample size confirm gait potential as a biometric from which individuals can be identified. Despite much research being carried out in gait recognition, the topic of vulnerability of gait to attacks has not received enough attention. In this paper, an analysis of minimal-effort impersonation attack and the closest person attack on gait biometrics are presented. Unlike most previous gait recognition approaches, where gait is captured using a (video) camera from a distance, in our approach, gait is collected by an accelerometer sensor attached to the hip of subjects. Hip acceleration in three orthogonal directions (up-down, forward-backward, and sideways) is utilized for recognition. We have collected 760 gait sequences from 100 subjects. The experiments consisted of two parts. In the first part, subjects walked in their normal walking style, and using the averaged cycle method, an EER of about 13% was obtained. In the second part, subjects were trying to walk as someone else. Analysis based on FAR errors indicates that a minimal-effort impersonation attack on gait biometric does not necessarily improve the chances of an impostor being accepted. However, attackers with knowledge of their closest person in the database can be a serious threat to the authentication system.

References (49)

  1. C. BenAbdelkader, R. Cutler, H. Nanda, and L. Davis, "Eigengait: Mo- tion-based recognition of people using image self-similarity," presented at the 3rd Int. Conf. Audio-and Video-Based Biometric Person Au- thentication, 2001.
  2. J. B. Hayfron-Acquah, M. S. Nixon, and J. N. Carter, "Automatic gait recognition by symmetry analysis," in Audio-and Video-Based Bio- metric Person Authentication, 2001, pp. 272-277.
  3. S. Sarkar, P. J. Phillips, Z. Liu, I. R. Vega, P. Grother, and K. W. Bowyer, "The humanID gait challenge problem: Data sets, perfor- mance, and analysis," IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 2, pp. 162-177, Feb. 2005.
  4. Y. Wang, S. Yu, Y. Wang, and T. Tan, "Gait recognition based on fusion of multi-view gait sequences," in Proc. Int. Conf. Biometrics, 2006, pp. 605-611.
  5. T. H. W. Lam and R. S. T. Lee, "A new representation for human gait recognition: Motion silhouettes image (MSI)," in Proc. Int. Conf. Bio- metrics, 2006, pp. 612-618.
  6. M. S. Nixon, T. N. Tan, and R. Chellappa, Human Identification Based on Gait. Berlin, Germany: Springer, 2006.
  7. A. Kale, A. Sundaresan, A. N. Rajagopalan, N. P. Cuntoor, A. K. Roy- Chowdhury, V. Kruger, and R. Chellappa, "Identification of humans using gait," IEEE Trans. Image Process., vol. 13, no. 9, pp. 1163-1173, Sep. 2004.
  8. Z. Liu and S. Sarkar, "Improved gait recognition by gait dynamics nor- malization," IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 6, pp. 863-876, Jun. 2006.
  9. J. Han and B. Bhanu, "Individual recognition using gait energy image," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 2, pp. 316-322, Feb. 2006.
  10. R. J. Orr and G. D. Abowd, "The smart floor: A mechanism for natural user identification and tracking," presented at the Conf. Human Factors in Computing Systems, The Hague, The Netherlands, 2000.
  11. L. Middleton, A. A. Buss, A. Bazin, and M. S. Nixon, "A floor sensor system for gait recognition," in Proc. 4th IEEE Workshop on Automatic Identification Advanced Technologies, 2005, pp. 171-176.
  12. H. J. Ailisto, M. Lindholm, J. Mäntyjärvi, E. Vildjiounaite, and S.-M. Mäkelä, "Identifying people from gait pattern with accelerometers," in Proc. SPIE Volume: 5779; Biometric Technology for Human Identifi- cation II, 2005, pp. 7-14.
  13. J. Mäntyjärvi, M. Lindholm, E. Vildjiounaite, S.-M. Mäkelä, and H. J. Ailisto, "Identifying users of portable devices from gait pattern with accelerometers," presented at the IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Philadelphia, PA, 2005.
  14. D. Gafurov, K. Helkala, and T. Sondrol, "Gait recognition using accel- eration from MEMS," in Proc. 1st IEEE Int. Conf. Availability, Relia- bility and Security, Vienna, Austria, Apr. 2006.
  15. X. Chen, J. Tian, Q. Su, X. Yang, and F. Y. Wang, "A secured mobile phone based on embedded fingerprint recognition systems," presented at the IEEE Int. Conf. Intelligence and Security Informatics, Atlanta, GA, May 2005.
  16. Q. Su, J. Tian, X. Chen, and X. Yang, "A fingerprint authentication mobile phone based on sweep sensor," in Proc. 3rd Int. Conf. Advances in Pattern Recognition, 2005, pp. 295-301.
  17. Y. Lee, C. Seo, J. Lee, and K. Y. Lee, "Speaker verification system for PDA in mobile-commerce," in Web Communication Technologies and Internet-Related Social Issues-HSI 2003, Second Int. Conf. Human Society@Internet, Seoul, Korea, Jun. 2003.
  18. C. C. Leung, Y. S. Moon, and H. Meng, "A pruning approach for gmm- based speaker verification in mobile embedded systems," in Proc. 1st Int. Conf. Biometric Authentication, Jul. 2004, pp. 607-613.
  19. Y. Ijiri, M. Sakuragi, and S. Lao, "Security management for mobile devices by face recognition," presented at the Int. Conf. Mobile Data Management, Nara, Japan, 2006.
  20. J.-L. Nagel, P. Stadelmann, M. Ansorge, and F. Pellandini, "Compar- ison of feature extraction techniques for face verification using elastic graph matching on low-power mobile devices," presented at the IEEE Region 8 EUROCON 2003 the Int. Conf. Computer as a Tool, Ljubl- jana, Slovenia, 2003.
  21. E. Vildjiounaite, S.-M. Mäkelä, M. Lindholm, R. Riihimäki, V. Kyllönen, J. Mäntyjärvi, and H. Ailisto, "Unobtrusive multimodal biometrics for ensuring privacy and information security with personal devices," in Pervasive. Berline, Germany: Springer-Verlag LNCS, 2006, pp. 187-201.
  22. N. L. Clarke and S. M. Furnell, "Authenticating mobile phone users using keystroke analysis," Int. J. Inf. Security, pp. 1-14, 2006.
  23. J. J. Lee, S. Noh, K. R. Park, and J. Kim, "Iris recognition in wearable computer," in Proc. 1st Int. Conf. Biometric Authentication, Jul. 2004, pp. 475-483.
  24. T. E. Starner, "Attention, memory, and wearable interfaces," IEEE Per- vasive Computing, vol. 1, no. 4, pp. 88-91, Oct.-Dec. 2002.
  25. Mobile data security: Access, content, identity & threat management 2006-2011 Juniper-Research, 2006 [Online]. Available: http://www. juniperresearch.com.
  26. D. Gafurov, E. Snekkenes, and T. E. Buvarp, "Robustness of biometric gait authentication against impersonation attack," presented at the 1st Int. Workshop on Information Security OnTheMove Federated Conf. Montpellier, France, Oct. 30-Nov. 1, 2006.
  27. C. BenAbdelkader, R. Cutler, and L. Davis, "Stride and cadence as a biometric in automatic person identification and verification," in Proc. 5h IEEE Int. Conf. Automatic Face and Gesture Recognition, May 2002, pp. 357-362.
  28. A. I. Bazin, L. Middleton, and M. S. Nixon, "Probabilistic fusion of gait features for biometric verification," presented at the 8th Int. Conf. Information Fusion, Philadelphia, PA, 2005.
  29. L. Wang, H. Ning, T. Tan, and W. Hu, "Fusion of static and dynamic body biometrics for gait recognition," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 2, pp. 149-158, Feb. 2004.
  30. L. Wang, T. Tan, W. Hu, and H. Ning, "Automatic gait recognition based on statistical shape analysis," IEEE Trans. Image Process., vol. 12, no. 9, pp. 1120-1131, Sep. 2003.
  31. A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: A tool for informa- tion security," IEEE Trans. Inf. Forensics Security, vol. 1, no. 2, pp. 125-143, Jun. 2006.
  32. N. K. Ratha, J. H. Connell, and R. M. Bolle, "An analysis of minutiae matching strength," in Proc. 3rd Int. Conf. Audio-and Video-Based Biometric Person Authentication, Jun. 2001, pp. 223-228.
  33. D. Baldisserra, A. Franco, D. Maio, and D. Maltoni, "Fake fingerprint detection by odor analysis," in Proc. Int. Conf. Biometrics, 2006, pp. 265-272.
  34. A. Antonelli, R. Cappelli, D. Maio, and D. Maltoni, "Fake finger detec- tion by skin distortion analysis," IEEE Trans. Inf. Forensics Security, vol. 1, no. 3, pp. 360-373, Sep. 2006.
  35. D. Alvarez, R. C. Gonzalez, A. Lopez, and J. C. Alvarez, "Compar- ison of step length estimators from weareable accelerometer devices," in Proc. 28th Annu. Int. Conf. IEEE on Engineering in Medicine and Biology Soc., Aug. 2006, pp. 5964-5967.
  36. M. Sekine, Y. Abe, M. Sekimoto, Y. Higashi, T. Fujimoto, T. Tamura, and Y. Fukui, "Assessment of gait parameter in hemiplegic patients by accelerometry," in Proc. 22nd Annu. Int. Conf. IEEE Engineering in Medicine and Biology Society, 2000, pp. 1879-1882.
  37. J. L. Wayman, "Confidence interval and test size estimation for bio- metric data," presented at the IEEE Workshop on Automatic Identifi- cation Advanced Technologies, Summit, NJ, 1999.
  38. P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, "The FERET evaluation methodology for face-recognition algorithms," IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 10, pp. 1090-1104, Oct. 2000.
  39. R. M. Bolle, N. K. Ratha, and S. Pankati, "Error analysis of pattern recognition systems-The subsets bootstrap," Comput. Vis. Image Un- derstanding, 2004.
  40. R. M. Bolle, N. K. Ratha, and S. Pankati, "Evaluating authentication systems using bootstrap confidence intervals," in Proc. IEEE Work- shop on Automatic Identification Advanced Technologies, Oct. 1999, pp. 9-13.
  41. M. S. Nixon and J. N. Carter, "Automatic recognition by gait," Proc. IEEE, vol. 94, no. 11, pp. 2013-2024, Nov. 2006.
  42. X. Zhou and B. Bhanu, "Integrating face and gait for human recogni- tion," presented at the Conf. Computer Vision and Pattern Recognition Workshop, New York, Jun. 2006.
  43. F. Horiuchi, R. Kadoya, Y. Higasi, T. Fujimoto, M. Sekine, and T. Tamura, "Evaluation by accelerometry of walking pattern before falls in hemiplegic patients," in Proc. IEEE 23rd Annu. Int. Conf. Engi- neering in Medicine and Biology Soc., 2001, pp. 1153-1154.
  44. V. Christopher, D. Brian, and O. Jeremy, Dynamics of Human Gait. Cape Town, South Africa: Kiboho, 1999.
  45. U. Uludag and A. K. Jain, "Attacks on biometric systems: A case study in fingerprints," in Proc. SPIE-EI 2004, Security, Seganography and Watermarking of Multimedia Contents VI, Jan. 2004, pp. 622-633.
  46. W. L. Yee, M. Wagner, and D. Tran, "Vulnerability of speaker verifi- cation to voice mimicking," in Proc. Int. Symp. Intelligent Multimedia, Video and Speech Processing, Oct. 2004, pp. 145-148.
  47. C. Sung-Hyuk and C. C. Tappert, "Automatic detection of handwriting forgery," in Proc. 8th Int. Workshop on Frontiers in Handwriting Recognition, Aug. 2002, pp. 264-267.
  48. L. Ballard, D. Lopresti, and F. Monrose, "Evaluating the security of handwriting biometrics," presented at the 10th Int. Workshop on Fron- tiers in Handwriting Recognition, La Baule, France, Oct. 2006.
  49. G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, "Sheep, goats, lambs and wolves a statistical analysis of speaker per- formance in the NIST 1998 speaker recognition evaluation," presented at the 5th Int. Conf. Spoken Language Processing, Sydney, Australia, 1998. Davrondzhon Gafurov received the M.Sc. degree in computer engineering from Technological Uni- versity of Tajikistan (TUT), Khujand, Tajikistan, in 2000 and is currently pursuing the Ph.D. degree