Reducing bias and inefficiency in the selection algorithm
Proceedings of the Second International Conference on Genetic Algorithms on Genetic algorithms and their application
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Ten myths of multimodal interaction
Communications of the ACM
Perceptual user interfaces: multimodal interfaces that process what comes naturally
Communications of the ACM
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Information fusion in biometrics
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Toward a theory of organized multimodal integration patterns during human-computer interaction
Proceedings of the 5th international conference on Multimodal interfaces
Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
Overview of the Face Recognition Grand Challenge
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Audio-visual multimodal fusion for biometric person authentication and liveness verification
MMUI '05 Proceedings of the 2005 NICTA-HCSNet Multimodal User Interaction Workshop - Volume 57
Direct Attacks Using Fake Images in Iris Verification
Biometrics and Identity Management
Guide to Biometric Reference Systems and Performance Evaluation
Guide to Biometric Reference Systems and Performance Evaluation
Robustness of multimodal biometric fusion methods against spoof attacks
Journal of Visual Languages and Computing
On the vulnerability of face verification systems to hill-climbing attacks
Pattern Recognition
Score normalization in multimodal biometric systems
Pattern Recognition
Combining face and iris biometrics for identity verification
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)
IEEE Transactions on Pattern Analysis and Machine Intelligence
Hierarchical Fusion of Face and Iris for Personal Identification
ICPR '10 Proceedings of the 2010 20th International Conference on Pattern Recognition
Attack against robust watermarking-based multimodal biometric recognition systems
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.10 |
In certain applications based on multimodal interaction it may be crucial to determine not only what the user is doing (commands), but who is doing it, in order to prevent fraudulent use of the system. The biometric technology, and particularly the multimodal biometric systems, represent a highly efficient automatic recognition solution for this type of applications. Although multimodal biometric systems have been traditionally regarded as more secure than unimodal systems, their vulnerabilities to spoofing attacks have been recently shown. New fusion techniques have been proposed and their performance thoroughly analysed in an attempt to increase the robustness of multimodal systems to these spoofing attacks. However, the vulnerabilities of multimodal approaches to software-based attacks still remain unexplored. In this work we present the first software attack against multimodal biometric systems. Its performance is tested against a multimodal system based on face and iris, showing the vulnerabilities of the system to this new type of threat. Score quantization is afterwards studied as a possible countermeasure, managing to cancel the effects of the proposed attacking methodology under certain scenarios.