Mañana, JUEVES, 24 DE ABRIL, el sistema se apagará debido a tareas habituales de mantenimiento a partir de las 9 de la mañana. Lamentamos las molestias.
Multimodal biometric fusion: A study on vulnerabilities to indirect attacks
Entity
UAM. Departamento de Tecnología Electrónica y de las ComunicacionesPublisher
Springer Berlin HeidelbergDate
2013Citation
10.1007/978-3-642-41827-3_45
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications: 18th Iberoamerican Congress, CIARP, Havana, Cuba, November 20-23, 2013, Proceedings, Part II. Lecture Notes in Computer Science, Volumen 8259. Springer, 2013. 358-365
ISSN
0302-9743 (print); 1611-3349 (online)ISBN
978-3-642-41826-6 (print); 978-3-642-41827-3 (online)DOI
10.1007/978-3-642-41827-3_45Funded by
This work has been partially supported by projects Contexts (S2009/TIC-1485) from CAM, Bio-Challenge (TEC2009-11186) and Bio-Shield (TEC2012-34881) from Spanish MINECO, TABULA RASA (FP7-ICT-257289) and BEAT (FP7-SEC-284989) from EU, and Cátedra UAM-Telefónica.Project
Comunidad de Madrid. S2009/TIC-1485/CONTEXTS; info:eu-repo/grantAgreement/EC/FP7/257289; info:eu-repo/grantAgreement/EC/FP7/284989Editor's Version
http://dx.doi.org/10.1007/978-3-642-41827-3_45Subjects
Face recognition; Fusion schemes; Iris recognition; Multimodality; Security; Vulnerabilities; TelecomunicacionesNote
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-41827-3_45Proceedings of 18th Iberoamerican Congress, CIARP 2013, Havana, Cuba
Rights
© Springer-Verlag Berlin Heidelberg 2013Abstract
Fusion of several biometric traits has traditionally been regarded as more secure than unimodal recognition systems. However, recent research works have proven that this is not always the case. In the present article we analyse the performance and robustness of several fusion schemes to indirect attacks. Experiments are carried out on a multimodal system based on face and iris, a user-friendly trait combination, over the publicly available multimodal Biosecure DB. The tested system proves to have a high vulnerability to the attack regardless of the fusion rule considered. However, the experiments prove that not necessarily the best fusion rule in terms of performance is the most robust to the type of attack considered.
Files in this item
Google Scholar:Gómez-Barrero, Marta
-
Galbally Herrero, Javier
-
Fiérrez Aguilar, Julián
-
Ortega García, Javier
This item appears in the following Collection(s)
Related items
Showing items related by title, author, creator and subject.