Smartphone Multi-modal Biometric Presentation Attack Detection

  • Chapter
  • First Online:
Handbook of Biometric Anti-Spoofing

Abstract

Biometric verification is widely employed on smartphones for various applications, including financial transactions. In this work, we present a new multi-modal biometric dataset (face, voice, and periocular) acquired using a smartphone. The new dataset consists of 150 subjects captured in six different sessions reflecting real-life scenarios of smartphone authentication. A unique feature of this dataset is that it is collected in four different geographic locations representing a diverse population and ethnicity. Additionally, we also present a multi-modal presentation attack dataset using low-cost presentation attack Instruments such as print and electronic display attacks. The novel acquisition protocols and the diversity of the data subjects collected from different geographic locations will allow the development of novel algorithms for either uni-modal or multi-modal biometrics. Further, we also report results obtained on the newly collected dataset after conducting performance evaluation experiments using a set of baseline verification and presentation attack detection algorithms that will be described in further detail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 192.59
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 246.09
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 246.09
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.beat-eu.org/platform/.

  2. 2.

    Website: www.robots.ox.ac.uk/~vgg/software/vgg_face.

  3. 3.

    https://www.idiap.ch/software/bob/docs/bob/bob.learn.pytorch/v0.0.4/guide_audio_extractor.html.

References

  1. ISO/IEC JTC1 SC37 Biometrics (2017) ISO/IEC 2382-37:2017 Information technology - vocabulary - Part 37: biometrics. International Organization for Standardization (2017)

    Google Scholar 

  2. Ramachandra R, Busch C (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput Surv 50(1):8:1–8:37. https://doi.org/10.1145/3038924

  3. Marcel S, Nixon MS, Li SZ (2018) Handbook of biometric anti-spoofing, vol 1. Springer

    Google Scholar 

  4. Zhang Y, Chen Z, Xue H, Wei T (2015) Fingerprints on mobile devices: abusing and leaking. In: Black hat conference (2015)

    Google Scholar 

  5. Roy A, Memon N, Ross A (2017) Masterprint: exploring the vulnerability of partial fingerprint-based authentication systems. IEEE Trans Inf Forensics Secur 12(9):2013–2025. https://doi.org/10.1109/TIFS.2017.2691658

    Article  Google Scholar 

  6. Rattani A, Derakhshani R (2018) A survey of mobile face biometrics.Comput Electr Eng 72:39 – 52 https://doi.org/10.1016/j.compeleceng.2018.09.005. http://www.sciencedirect.com/science/article/pii/S004579061730650X

  7. De Marsico M, Nappi M, Riccio D, Wechsler H (2015) Mobile iris challenge evaluation (miche)-i, biometric iris dataset and protocols. Pattern Recognit Lett 57(C):17–23. https://doi.org/10.1016/j.patrec.2015.02.009

  8. Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61. https://doi.org/10.1109/MSP.2016.2555335

    Article  Google Scholar 

  9. Sankaran A, Malhotra A, Mittal A, Vatsa M, Singh R (2015) On smartphone camera based fingerphoto authentication. In: 2015 IEEE 7th international conference on biometrics theory, applications and systems (BTAS), pp 1–7

    Google Scholar 

  10. McCool C, Marcel S, Hadid A, Pietikäinen M, Matejka P, Cernocký J, Poh N, Kittler J, Larcher A, Lévy C, Matrouf D, Bonastre J, Tresadern P, Cootes T (2012) Bi-modal person recognition on a mobile phone: Using mobile phone data. In: 2012 IEEE international conference on multimedia and expo workshops, pp 635–640

    Google Scholar 

  11. Bartuzi E, Roszczewska K, Białobrzeski R et al (2018) Mobibits: multimodal mobile biometric database. In: 2018 international conference of the biometrics special interest group (BIOSIG). IEEE, pp 1–5

    Google Scholar 

  12. NTNU (2019) Secure access control over wide area network (SWAN). https://www.ntnu.edu/iik/swan/. Accessed from 2019-08-09

  13. Santos G, Grancho E, Bernardo MV, Fiadeiro PT (2015) Fusing iris and periocular information for cross-sensor recognition. Pattern Recognit Lett 57:52–59. https://doi.org/10.1016/j.patrec.2014.09.012, http://www.sciencedirect.com/science/article/pii/S0167865514003006. Mobile Iris CHallenge Evaluation part I (MICHE I)

  14. Kim D, Chung K, Hong K (2010) Person authentication using face, teeth and voice modalities for mobile device security. IEEE Trans Consum Electron 56(4):2678–2685. https://doi.org/10.1109/TCE.2010.5681156

    Article  Google Scholar 

  15. Sequeira AF, Monteiro JC, Rebelo A, Oliveira HP (2014) Mobbio: a multimodal database captured with a portable handheld device. In: 2014 international conference on computer vision theory and applications (VISAPP), vol 3, pp 133–139 (2014)

    Google Scholar 

  16. Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1–8

    Google Scholar 

  17. Bartuzi E, Roszczewska K, Rokielewicz M, Białobrzeski R (2018) Mobibits: multimodal mobile biometric database. In: 2018 international conference of the biometrics special interest group (BIOSIG), pp 1–5. https://doi.org/10.23919/BIOSIG.2018.8553108

  18. Ortega-Garcia J, Fierrez J, Alonso-Fernandez F, Galbally J, Freire MR, Gonzalez-Rodriguez J, Garcia-Mateo C, Alba-Castro J, Gonzalez-Agulla E, Otero-Muras E, Garcia-Salicetti S, Allano L, Ly-Van B, Dorizzi B, Kittler J, Bourlai T, Poh N, Deravi F, Ng MNR, Fairhurst M, Hennebert J, Humm A, Tistarelli M, Brodo L, Richiardi J, Drygajlo A, Ganster H, Sukno FM, Pavani S, Frangi A, Akarun L, Savran A (2010) The multiscenario multienvironment biosecure multimodal database (bmdb). IEEE Trans Pattern Anal Mach Intell 32(6):1097–1111. https://doi.org/10.1109/TPAMI.2009.76

    Article  Google Scholar 

  19. Anjos A, El-Shafey L, Marcel S (2017) BEAT: An Open-Science Web Platform. In: International Conference on Machine Learning (ICML). https://publications.idiap.ch/downloads/papers/2017/Anjos_ICML2017_2017.pdf

  20. Parkhi OM, Vedaldi A, Zisserman A (2015) Deep face recognition. In: British machine vision conference, vol. 1. BMVA Press, pp 41.1 – 41.12

    Google Scholar 

  21. Schroff F, Kalenichenko D, Philbin J (2015) FaceNet: a unified Embedding for Face Recognition and Clustering. In: Proceedings of IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 815 – 823. 00297

    Google Scholar 

  22. Sandberg D (2017) facenet: face recognition using tensorflow. https://github.com/davidsandberg/facenet. Accessed from 2017-08-01

  23. Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical Report 07-49, University of Massachusetts, Amherst

    Google Scholar 

  24. Raghavendra R, Busch C (2016) Learning deeply coupled autoencoders for smartphone based robust periocular verification. In: 2016 IEEE international conference on image processing (ICIP), pp 325–329. https://doi.org/10.1109/ICIP.2016.7532372

  25. Raja KB, Raghavendra R, Busch C (2016) Collaborative representation of deep sparse filtered features for robust verification of smartphone periocular images. In: 2016 IEEE international conference on image processing (ICIP), pp 330–334. https://doi.org/10.1109/ICIP.2016.7532373

  26. Vogt R, Sridharan S (2008) Explicit modelling of session variability for speaker verification. Comput Speech Lang 22(1):17–38. https://doi.org/10.1016/j.csl.2007.05.003, http://www.sciencedirect.com/science/article/pii/S0885230807000277

  27. McCool C, Wallace R, McLaren M, El Shafey L, Marcel S (2013) Session variability modelling for face authentication. IET Biom 2(3):117–129. https://doi.org/10.1049/iet-bmt.2012.0059

    Article  Google Scholar 

  28. Le N, Odobez JM (2018) Robust and discriminative speaker embedding via intra-class distance variance regularization. In: Proceedings interspeech, pp 2257–2261

    Google Scholar 

  29. Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted Gaussian mixture models. Digit signal Process 10(1):19–41

    Article  Google Scholar 

  30. Nagrani A, Chung JS, Zisserman A (2017) VoxCeleb: a large-scale speaker identification dataset. ar**v:1706.08612 [cs]

  31. Chingovska I, André A, Marcel S (2014) Biometrics evaluation under spoofing attacks. IEEE Trans Inf Forensics Secur (T-IFS) 9(12):2264–2276

    Google Scholar 

  32. Ramachandra R, Busch C (2014) Presentation attack detection algorithm for face and iris biometrics. In: 22nd European signal processing conference, EUSIPCO 2014, Lisbon, Portugal, pp 1387–1391

    Google Scholar 

  33. Wen D, Han H, Jain A (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(99):1–16

    Google Scholar 

  34. Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP). IEEE, pp 2636–2640

    Google Scholar 

  35. Sahidullah M, Kinnunen T, Hanilçi C (2015) A comparison of features for synthetic speech detection. In: Proceedings of INTERSPEECH, pp 2087–2091. Citeseer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.709.5379&rep=rep1&type=pdf

  36. ISO/IEC JTC1 SC37 Biometrics (2017) ISO/IEC 30107-3. Information Technology - Biometric presentation attack detection - Part 3: testing and Reporting. International Organization for Standardization

    Google Scholar 

  37. Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. ar**v:1409.1556

Download references

Acknowledgements

This work is carried out under the funding of the Research Council of Norway (Grant No. IKTPLUSS 248030/O70)

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Martin Stokkenes , Raghavendra Ramachandra , Amir Mohammadi , Sushma Venkatesh , Kiran Raja , Pankaj Wasnik , Eric Poiret , Sébastien Marcel or Christoph Busch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Stokkenes, M. et al. (2023). Smartphone Multi-modal Biometric Presentation Attack Detection. In: Marcel, S., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Singapore. https://doi.org/10.1007/978-981-19-5288-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-5288-3_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-5287-6

  • Online ISBN: 978-981-19-5288-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation