- KonferenzbeitragPre-processing cascades and fusion in finger vein recognition(BIOSIG 2014, 2014) Kauba, Christoph; Reissig, Jakob; Uhl, Andreas; Brömme, Arslan; Busch, ChristophPreprocessing and fusion techniques for finger vein recognition are investigated. An experimental study involving a set of preprocessing approaches shows the importance of selecting the appropriate single technique and the usefulness of cascading several different preprocessing methods for subsequent feature extraction of various types. Score level fusion is able to significantly improve recognition results, in particular when combining features describing complementary finger image properties.
- KonferenzbeitragOn the vulnerability of finger vein recognition to spoofing(BIOSIG 2014, 2014) Tome, Pedro; Vanoni, Matthias; Marcel, Sébastien; Brömme, Arslan; Busch, ChristophThe vulnerability of finger vein recognition to spoofing is studied in this paper. A collection of spoofing finger vein images has been created from real finger vein samples. Finger vein images are printed using a commercial printer and then, presented at an open source finger vein sensor. Experiments are carried out using an extensible framework, which allows fair and reproducible benchmarks. Experimental results lead to a spoofing false accept rate of 86\%, thus showing that finger vein biometrics is vulnerable to spoofing attacks, pointing out the importance to investigate countermeasures against this type of fraudulent actions.
- KonferenzbeitragShattering the glass maze(BIOSIG 2014, 2014) Hermans, Jens; Peeters, Roel; Mennink, Bart; Brömme, Arslan; Busch, ChristophTemplate protection plays a crucial role in protecting the privacy of biometric data, by providing irreversibility and unlinkability. The Glass Maze, as presented by Trugenberger at BIOSIG 2011, is a fingerprint key binding mechanism that is claimed to provide template protection. With the correct fingerprint, the key that is entangled with the fingerprint data can be retrieved. The template protection of the Glass Maze is based on the convergence properties of a Hopfield model, a neural network. We however show how to revert the Glass Maze to recover the key, without requiring a correct fingerprint. This completely breaks the irreversibility property, and hence also unlinkability.
- KonferenzbeitragSpeedup for European epassport authentication(BIOSIG 2014, 2014) Peeters, Roel; Hermans, Jens; Mennink, Bart; Brömme, Arslan; Busch, ChristophThe overall ePassport authentication procedure should be fast to have a sufficient throughput of people at border crossings such as airports. At the same time, the ePassport and its holder should be checked as thoroughly as possible. By speeding up the ePassport authentication procedure, more time can be spend on verification of biometrics. We demonstrate that our proposed solution allows to replace the current combination of PACE and EAC with a more efficient authentication procedure that provides even better security and privacy guarantees. When abstracting away from the time needed for the ePassport to verify the terminal's certificate, a speed-up of at least 40\% in comparison with the current ePassport authentication procedure is to be expected.
- KonferenzbeitragWhen a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system(BIOSIG 2014, 2014) Hermans, Jens; Mennink, Bart; Peeters, Roel; Brömme, Arslan; Busch, ChristophBiometric template protection systems are expected to meet two major security requirements: irreversibility and unlinkability. We analyze the Bloom filter based iris biometric template protection system recently introduced by Rathgeb et al. at ICB 2013 and IET Biometrics 2014. We demonstrate that the scheme does not achieve unlinkability, presenting a simple attack that in the worst case succeeds with probability at least 96\%. We also present a security analysis on generating false positives or recovering the key, both leading to undesirably low attack complexities: 225 for generating false positives for the smaller versions of the scheme, and a complexity between 22 and 28 for recovering the secret key.
- KonferenzbeitragBimodal palm biometric feature extraction using a single RGB image(BIOSIG 2014, 2014) Eglitis, Teodors; Pudzs, Mihails; Greitans, Modris; Brömme, Arslan; Busch, ChristophThis paper proposes a method for palm bimodal biometric feature (vein and crease pattern) acquisition from a single RGB image. Typical bimodal biometric systems require combining infrared and visible images for this task. We use a single CMOS color sensor and a specific illumination comprising of two wavelengths to acquire the image. As a result each biometric modality is more pronounced in its own color channel. The image is processed by applying adapted matched filters with nonlinear modifications. Performance of the proposed method is evaluated against feature separation with optical band-pass and band-stop approach on a database of 64 people. The results show the average true positive rate is 70.6 \% for vein detection and 64.7 \% for crease detection, whereas in 14.8 \% and 9.29 \% of the cases feature of wrong modality is detected.
- KonferenzbeitragSymmetry assessment by finite expansion: application to forensic fingerprints(BIOSIG 2014, 2014) Mikaelyan, Anna; Bigun, Josef; Brömme, Arslan; Busch, ChristophCommon image features have too poor information for identification of forensic images of fingerprints, where only a small area of the finger is imaged and hence a small amount of key points are available. Noise, nonlinear deformation, and unknown rotation are additional issues that complicate identification of forensic fingerprints. We propose a feature extraction method which describes image information around key points: Symmetry Assessment by Finite Expansion (SAFE). The feature set has built-in quality estimates as well as a rotation invariance property. The theory is developed for continuous space, allowing compensation for features directly in the feature space when images undergo such rotation without actually rotating them. Experiments supporting that use of these features improves identification of forensic fingerprint images of the public NIST SD27 database are presented. Performance of matching orientation information in a neighborhood of core points has an EER of 24\% with these features alone, without using minutiae constellations, in contrast to 36\% when using minutiae alone. Rank-20 CMC is 58\%, which is lower than 67\% when using notably more manually collected minutiae information.
- KonferenzbeitragFuzzy vault and template-level fusion applied to a binary fingerprint representation(BIOSIG 2014, 2014) Bringer, Julien; Favre, Mélanie; Pelle, Chloé; Saxcé, Hughes De; Brömme, Arslan; Busch, ChristophThe fuzzy vault is an error-tolerant authentication scheme that stores data in a privacy-preserving way. It allows to hide and retrieve a secret by presenting a set of elements that can slightly differ. This paper aims at applying the scheme to a transformation-invariant binary fingerprint representation. We also show how to perform multi-finger fusion with no extra space requirement and perform fuzzy vault in this case. Our results are quite encouraging with respect to the inherent constraint of decreasing False Accept attacks on template protection schemes in order to ensure higher privacy.
- Editiertes BuchBIOSIG 2014(2014) Brömme, Arslan; Busch, Christoph
- KonferenzbeitragFingerprint pore characteristics for liveness detection(BIOSIG 2014, 2014) Johnson, Peter; Schuckers, Stephanie; Brömme, Arslan; Busch, Christoph