Spoof attack by replicating biometric traits represents a real threat to an automatic biometric verification/ authentication system. This is because the system, originally designed to distinguish between genuine users from impostors, simply cannot distinguish between a replicated biometric sample (replica) from a live sample. An effective solution is to obtain some measures that can indicate whether or not a biometric trait has been tempered with, e.g., liveness detection measures. These measures are referred to as evidence of spoofing or anti-spoofing measures. In order to make the final accept/rejection decision, a straightforward solution to define two thresholds: one for the anti-spoofing measure, and another for the verification score. We compared two variants of a method that relies on applying two thresholds – one to the verification (matching) score and another to the anti-spoofing measure. Our experiments carried out using a signature database as well as by simulation show that both the brute-force and its probabilistic variant turn out to be optimal under different operating conditions.
KEYWORDS: Biometrics, Quality measurement, Databases, Lawrencium, Data fusion, Algorithm development, Information fusion, Signal to noise ratio, Data acquisition, Image fusion
We address the problem of score level fusion of intramodal and multimodal experts in the context of biometric
identity verification. We investigate the merits of confidence based weighting of component experts. In contrast
to the conventional approach where confidence values are derived from scores, we use instead raw measures of
biometric data quality to control the influence of each expert on the final fused score. We show that quality based
fusion gives better performance than quality free fusion. The use of quality weighted scores as features in the
definition of the fusion functions leads to further improvements. We demonstrate that the achievable performance
gain is also affected by the choice of fusion architecture. The evaluation of the proposed methodology involves
6 face and one speech verification experts. It is carried out on the XM2VTS data base.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.