Post on 17-Dec-2015
transcript
IQA(Image Quality Assessment)for
Fake Biometric Detection
Vulnerability of Biometric Systems Security
face recognition fingerprint iris
introduction hypothesis method results conclusion more
hypothesis method results conclusion more
classification of attack & detection methods
introduction
requirement
non-invasive
user friendly
fast
low cost
performance
introduction hypothesis method results conclusion more
introduction
hypothesis
It is expected that a fake image captured in an attack attempt will havedifferent quality than a real sample acquired in the normal operation scenario for which the sensor was designed.
degree of sharpness color and luminance levelentropy( 信息熵 )structural distortion
hypothesis method results conclusion more
introduction
current problems
objection
none of current detection methods is generalexample:ridge and valley frequencyamount of occlusion of eyegummy fingers made out of silicone & gelatin
providing the method with multi-attack protection capability
hypothesis method results conclusion more
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
Main Page
Topic 1 Topic 2 Topic 3 Topic 4 Topic 5introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
Edge_Based:Sobel operator
introduction hypothesis method results conclusion more
SSIM(Structural Similarity Index Measure)
contrast or brghtness changes (nonstructural disortions)
introduction hypothesis method results conclusion more
VIF:Visual Information Fidelity
distortion change
HVS:human visual system
introduction hypothesis method results conclusion more
JPEG Quality Index
introduction hypothesis method results conclusion more
Experiments and Results
FGR:False Genuine RateFFR:False Fake RateHTER:HTER=(FGR+FFR)/2AV TIME
1.iris2.fingerprint3.2-D face
i.spoofing attackii.synthetic sample attackiii.other methods
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more
1.validate the "quality difference" hypothesis2.show high potential of IQA for secruing biometric systems3.proposal and validation of a new biometric protectiong method
conclusion
introduction hypothesis method results conclusion more
introduction hypothesis method results conclusion more