Abstract
Biometric verification is widely employed on smartphones for various applications, including financial transactions. In this work, we present a new multi-modal biometric dataset (face, voice, and periocular) acquired using a smartphone. The new dataset consists of 150 subjects captured in six different sessions reflecting real-life scenarios of smartphone authentication. A unique feature of this dataset is that it is collected in four different geographic locations representing a diverse population and ethnicity. Additionally, we also present a multi-modal presentation attack dataset using low-cost presentation attack Instruments such as print and electronic display attacks. The novel acquisition protocols and the diversity of the data subjects collected from different geographic locations will allow the development of novel algorithms for either uni-modal or multi-modal biometrics. Further, we also report results obtained on the newly collected dataset after conducting performance evaluation experiments using a set of baseline verification and presentation attack detection algorithms that will be described in further detail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
ISO/IEC JTC1 SC37 Biometrics (2017) ISO/IEC 2382-37:2017 Information technology - vocabulary - Part 37: biometrics. International Organization for Standardization (2017)
Ramachandra R, Busch C (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput Surv 50(1):8:1–8:37. https://doi.org/10.1145/3038924
Marcel S, Nixon MS, Li SZ (2018) Handbook of biometric anti-spoofing, vol 1. Springer
Zhang Y, Chen Z, Xue H, Wei T (2015) Fingerprints on mobile devices: abusing and leaking. In: Black hat conference (2015)
Roy A, Memon N, Ross A (2017) Masterprint: exploring the vulnerability of partial fingerprint-based authentication systems. IEEE Trans Inf Forensics Secur 12(9):2013–2025. https://doi.org/10.1109/TIFS.2017.2691658
Rattani A, Derakhshani R (2018) A survey of mobile face biometrics.Comput Electr Eng 72:39 – 52 https://doi.org/10.1016/j.compeleceng.2018.09.005. http://www.sciencedirect.com/science/article/pii/S004579061730650X
De Marsico M, Nappi M, Riccio D, Wechsler H (2015) Mobile iris challenge evaluation (miche)-i, biometric iris dataset and protocols. Pattern Recognit Lett 57(C):17–23. https://doi.org/10.1016/j.patrec.2015.02.009
Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61. https://doi.org/10.1109/MSP.2016.2555335
Sankaran A, Malhotra A, Mittal A, Vatsa M, Singh R (2015) On smartphone camera based fingerphoto authentication. In: 2015 IEEE 7th international conference on biometrics theory, applications and systems (BTAS), pp 1–7
McCool C, Marcel S, Hadid A, Pietikäinen M, Matejka P, Cernocký J, Poh N, Kittler J, Larcher A, Lévy C, Matrouf D, Bonastre J, Tresadern P, Cootes T (2012) Bi-modal person recognition on a mobile phone: Using mobile phone data. In: 2012 IEEE international conference on multimedia and expo workshops, pp 635–640
Bartuzi E, Roszczewska K, Białobrzeski R et al (2018) Mobibits: multimodal mobile biometric database. In: 2018 international conference of the biometrics special interest group (BIOSIG). IEEE, pp 1–5
NTNU (2019) Secure access control over wide area network (SWAN). https://www.ntnu.edu/iik/swan/. Accessed from 2019-08-09
Santos G, Grancho E, Bernardo MV, Fiadeiro PT (2015) Fusing iris and periocular information for cross-sensor recognition. Pattern Recognit Lett 57:52–59. https://doi.org/10.1016/j.patrec.2014.09.012, http://www.sciencedirect.com/science/article/pii/S0167865514003006. Mobile Iris CHallenge Evaluation part I (MICHE I)
Kim D, Chung K, Hong K (2010) Person authentication using face, teeth and voice modalities for mobile device security. IEEE Trans Consum Electron 56(4):2678–2685. https://doi.org/10.1109/TCE.2010.5681156
Sequeira AF, Monteiro JC, Rebelo A, Oliveira HP (2014) Mobbio: a multimodal database captured with a portable handheld device. In: 2014 international conference on computer vision theory and applications (VISAPP), vol 3, pp 133–139 (2014)
Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1–8
Bartuzi E, Roszczewska K, Rokielewicz M, Białobrzeski R (2018) Mobibits: multimodal mobile biometric database. In: 2018 international conference of the biometrics special interest group (BIOSIG), pp 1–5. https://doi.org/10.23919/BIOSIG.2018.8553108
Ortega-Garcia J, Fierrez J, Alonso-Fernandez F, Galbally J, Freire MR, Gonzalez-Rodriguez J, Garcia-Mateo C, Alba-Castro J, Gonzalez-Agulla E, Otero-Muras E, Garcia-Salicetti S, Allano L, Ly-Van B, Dorizzi B, Kittler J, Bourlai T, Poh N, Deravi F, Ng MNR, Fairhurst M, Hennebert J, Humm A, Tistarelli M, Brodo L, Richiardi J, Drygajlo A, Ganster H, Sukno FM, Pavani S, Frangi A, Akarun L, Savran A (2010) The multiscenario multienvironment biosecure multimodal database (bmdb). IEEE Trans Pattern Anal Mach Intell 32(6):1097–1111. https://doi.org/10.1109/TPAMI.2009.76
Anjos A, El-Shafey L, Marcel S (2017) BEAT: An Open-Science Web Platform. In: International Conference on Machine Learning (ICML). https://publications.idiap.ch/downloads/papers/2017/Anjos_ICML2017_2017.pdf
Parkhi OM, Vedaldi A, Zisserman A (2015) Deep face recognition. In: British machine vision conference, vol. 1. BMVA Press, pp 41.1 – 41.12
Schroff F, Kalenichenko D, Philbin J (2015) FaceNet: a unified Embedding for Face Recognition and Clustering. In: Proceedings of IEEE conference on computer vision and pattern recognition (CVPR). IEEE, pp 815 – 823. 00297
Sandberg D (2017) facenet: face recognition using tensorflow. https://github.com/davidsandberg/facenet. Accessed from 2017-08-01
Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical Report 07-49, University of Massachusetts, Amherst
Raghavendra R, Busch C (2016) Learning deeply coupled autoencoders for smartphone based robust periocular verification. In: 2016 IEEE international conference on image processing (ICIP), pp 325–329. https://doi.org/10.1109/ICIP.2016.7532372
Raja KB, Raghavendra R, Busch C (2016) Collaborative representation of deep sparse filtered features for robust verification of smartphone periocular images. In: 2016 IEEE international conference on image processing (ICIP), pp 330–334. https://doi.org/10.1109/ICIP.2016.7532373
Vogt R, Sridharan S (2008) Explicit modelling of session variability for speaker verification. Comput Speech Lang 22(1):17–38. https://doi.org/10.1016/j.csl.2007.05.003, http://www.sciencedirect.com/science/article/pii/S0885230807000277
McCool C, Wallace R, McLaren M, El Shafey L, Marcel S (2013) Session variability modelling for face authentication. IET Biom 2(3):117–129. https://doi.org/10.1049/iet-bmt.2012.0059
Le N, Odobez JM (2018) Robust and discriminative speaker embedding via intra-class distance variance regularization. In: Proceedings interspeech, pp 2257–2261
Reynolds DA, Quatieri TF, Dunn RB (2000) Speaker verification using adapted Gaussian mixture models. Digit signal Process 10(1):19–41
Nagrani A, Chung JS, Zisserman A (2017) VoxCeleb: a large-scale speaker identification dataset. ar**v:1706.08612 [cs]
Chingovska I, André A, Marcel S (2014) Biometrics evaluation under spoofing attacks. IEEE Trans Inf Forensics Secur (T-IFS) 9(12):2264–2276
Ramachandra R, Busch C (2014) Presentation attack detection algorithm for face and iris biometrics. In: 22nd European signal processing conference, EUSIPCO 2014, Lisbon, Portugal, pp 1387–1391
Wen D, Han H, Jain A (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(99):1–16
Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP). IEEE, pp 2636–2640
Sahidullah M, Kinnunen T, Hanilçi C (2015) A comparison of features for synthetic speech detection. In: Proceedings of INTERSPEECH, pp 2087–2091. Citeseer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.709.5379&rep=rep1&type=pdf
ISO/IEC JTC1 SC37 Biometrics (2017) ISO/IEC 30107-3. Information Technology - Biometric presentation attack detection - Part 3: testing and Reporting. International Organization for Standardization
Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. ar**v:1409.1556
Acknowledgements
This work is carried out under the funding of the Research Council of Norway (Grant No. IKTPLUSS 248030/O70)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Stokkenes, M. et al. (2023). Smartphone Multi-modal Biometric Presentation Attack Detection. In: Marcel, S., Fierrez, J., Evans, N. (eds) Handbook of Biometric Anti-Spoofing. Advances in Computer Vision and Pattern Recognition. Springer, Singapore. https://doi.org/10.1007/978-981-19-5288-3_19
Download citation
DOI: https://doi.org/10.1007/978-981-19-5288-3_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5287-6
Online ISBN: 978-981-19-5288-3
eBook Packages: Computer ScienceComputer Science (R0)