Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

A Comprehensive Study of the Usability of multiple Graphical Passwords SoumChowdhury (Presenter) Ron Poet Lewis Mackenzie 1 School of Computing Science.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Decision Errors and Power
Statistical Issues in Research Planning and Evaluation
Thursday, September 12, 2013 Effect Size, Power, and Exam Review.
LECTURE 3 Introduction to Linear Regression and Correlation Analysis
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Face Databases. Databases for Face Recognition The appearance of a face is affected by many factors because of its non-rigidity and complex 3D structure:
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
MARE 250 Dr. Jason Turner Hypothesis Testing II To ASSUME is to make an… Four assumptions for t-test hypothesis testing: 1. Random Samples 2. Independent.
MARE 250 Dr. Jason Turner Hypothesis Testing II. To ASSUME is to make an… Four assumptions for t-test hypothesis testing:
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
Dynamic Face Recognition Committee Machine Presented by Sunny Tang.
Biometrics II CUBS, University at Buffalo
Evaluating Hypotheses
FACE RECOGNITION, EXPERIMENTS WITH RANDOM PROJECTION
Thwarting Attacks Dr. Pushkin Kachroo. Introduction Biometrics can help convenience and security Might remove or strengthen some weak points but get new.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
The Analysis of Variance
Three-Dimensional Face Recognition Using Surface Space Combinations Thomas Heseltine, Nick Pears, Jim Austin Advanced Computer Architecture Group Department.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
The t Tests Independent Samples.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Facial Recognition CSE 391 Kris Lord.
Biometrics: Ear Recognition
8/20/2015Slide 1 SOLVING THE PROBLEM The two-sample t-test compare the means for two groups on a single variable. the The paired t-test compares the means.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. Chapter 9 Hypothesis Testing.
Chapter 13 – 1 Chapter 12: Testing Hypotheses Overview Research and null hypotheses One and two-tailed tests Errors Testing the difference between two.
ANOVA Greg C Elvers.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Lecture 7 Introduction to Hypothesis Testing. Lecture Goals After completing this lecture, you should be able to: Formulate null and alternative hypotheses.
A statistical method for testing whether two or more dependent variable means are equal (i.e., the probability that any differences in means across several.
Types of Data in FCS Survey Nominal Scale – Labels and categories (branch, farming operation) Ordinal Scale – Order and rank (expectations, future plans,
Customer Dr. Beigi, Recognition Tech., Inc Hugh Eng, DPS ‘16 Dr. Tappert, CSIS Vinnie Monaco, PhD’15 Smartphone/Laptop Security Acceptability/Ease-of-Use.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
1 Chapter 9 Hypothesis Testing. 2 Chapter Outline  Developing Null and Alternative Hypothesis  Type I and Type II Errors  Population Mean: Known 
Dissertation Defense Machine Assisted Grading of Rare Collectibles through the COINS framework By: Rick Bassett July 24, 2003.
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Lecture 17 Dustin Lueker.  A way of statistically testing a hypothesis by comparing the data to values predicted by the hypothesis ◦ Data that fall far.
Robust Real Time Face Detection
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Chapter 10 The t Test for Two Independent Samples
Experimentation in Computer Science (Part 2). Experimentation in Software Engineering --- Outline  Empirical Strategies  Measurement  Experiment Process.
IMPORTANCE OF STATISTICS MR.CHITHRAVEL.V ASST.PROFESSOR ACN.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
By: David Gelbendorf, Hila Ben-Moshe Supervisor : Alon Zvirin
FACE DETECTION : AMIT BHAMARE. WHAT IS FACE DETECTION ? Face detection is computer based technology which detect the face in digital image. Trivial task.
Fast face localization and verification J.Matas, K.Johnson,J.Kittler Presented by: Dong Xie.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
FACE RECOGNITION TECHNOLOGY
Biometric Authentication
Face Recognition 1.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Understanding Results
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
INTRODUCTORY STATISTICS FOR CRIMINAL JUSTICE Test Review: Ch. 7-9
Reasoning in Psychology Using Statistics
Reasoning in Psychology Using Statistics
STA 291 Spring 2008 Lecture 17 Dustin Lueker.
Presentation transcript:

Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate MSc thesis – Information Security – NISlab

Tom Introduction to the problem The new Visa Information System  Initiated by the end of 2006  Face recognition mandatory?  Is face recognition the solution? – Will face recognition provide an acceptable false acceptance rate when facing non-zero effort impostors? – Is today’s evaluation of false acceptance rate, based on zero- effort attacks, sufficient? – A more realistic false acceptance rate based on non-zero effort attacks – The use of a human supervisor to reduce the false acceptance rate

Tom Research questions  What efforts does an imposter need to make to decieve a face recognition product in a border control environment? –The attacker must circumvent both the human guard and the computerbased recognition system –Zero effort impostors provide some false acceptances (Kosmerlj’s report 2004) when evaluated by a computerbased face recognition system. Are these also able to fool the human guard?  How will the resources of an attacker influence the security of a face recognition product in a border control environment?

Tom Research questions  Could today’s procedures for calculating FAR result in a positive evaluation of insecure products?  What effect will non-zero effort attacks have on the FAR of a face recognition product in a border control environment?

Tom Purpose of the project  Examine whether todays face recognition products are suitable for the new Visa Information System  Make both vendors and employers of face recognition more aware of the threats to face recognition  See what effort an impostor must make in order to circumvent both a human guard and the face recognition system

Tom Method  Theory review –State of the art Face recognition Human vs. computerbased face recognition Evaluation of face recognition software Multimodal biometrics –Different methods to circumvent face recognition systems  correspondence –Information about the Visa Information System and the process of applying for a visa  Experiment –Human abillity to capture false acceptances made by Face Recognition Systems –The effect hair has on human face recognition

Tom Theory Circumvention of face recognition software in a border control  Identical twins  Replay and alteration of templates  Illegitimate enrollment  Trojan horse  Impersonation attack –Orthodontic treatment –Facial makeup –Eyebrows  Attacks between the sensor and the biometric system  Back doors

Tom Theory Countermeasures  Controlled environment  Upper part of the face are less affected by facial expression  Frequently re-enrollment of the users  Cancelable biometrics  Liveliness detection –Weight –Human guard –Challenge the user to perform an particular expression –Stress level –Video surveillance  Multimodal biometrics

Tom The experiment Experiment description  Human comparison of image pairs with and without hair that have already been accepted as of the same individual by the computer- based face recognition system  Based on the results from Kosmerlj’s MSc thesis spring of 2004 (Passport of the future) using the best performing algorithm PCA MahCosine.  Used the images that produced more than one false acceptance  61 participants –31 was presented with imagepairs without hair visible –30 was presented with imagepairs with the hair visible  60 image pairs presented, not in the same order  10 sec. pr imagepair to evaluate

Tom The experiment

Tom The experiment Presentation of image with hair removed Presentation of image with hair and background present

Tom Analysis  Application to collect data from the experiment database –Semicolon separated result file –Developed in Java  Analysis of the results –Semicolon separated result- file were imported into SPSS (Statistical Package for the Social Sciences) for analysis

Tom Results  Hair –Mean number of false acceptances: With hair 3.90 Without hair 9.61

Tom Results  Hair – Distribution of errors With hair – 18 image-pairs were never evaluated wrong Without hair – Only 3 image-pairs were never evaluated wrong

Tom Results  Other aspects – Age of the participants Number of false acceptances are lower for people between the age of 27 and 37 than for those above and below that age

Tom Results  Other aspects – Educational degree Lower number of false acceptances with higher degree. – Time Error rate is constant Evaluation time decreases – Experience Only one participant had previous experience with such authentication

Tom Validity  With hair vs. without hair – The Levene’s test for equality and variance on False Acceptance and False Rejections on the two groups of image-pairs shows that there are a significant (sign. 0,019) difference between the false acceptances for human evaluation of face with hair and those where the hair is removed  Age and educational degree – The differeces in evaluation performance due to age could be a result of experience and better eyesight. – The differences in educational degree are propably a result of the age of these participants and not a result of the education of the participant.

Tom Interpretation of the results  Images where the hair is absent is more difficult to evaluate: –Hair has an influence on human recognition of faces  A human supervisor is able to capture some (less than 80% on average) of the faces that falsely passes a face recognition system –Combined with alteration of beard, makeup, eyebrows and teeth the capture rate could become significantly smaller –The results may indicate that a human supervisor provide some additional security, but may not be satisfactory in a border control setting. Face recognition should be combined with other security measures to achieve higher robustness.  The distribution of errors may indicate that the images resembled –The use of facial make-up, and alteration of beard, eyebrows and hair may provide a higher error rate –The additional security of a human guard may be further reduced

Tom The influence of the results  More awareness of the limited additional value of a human guard –other methods than only combining human guards and face recognition should be preferred –Use of multimodal biometrics an option for more accurate recognition  More awareness of the threats to face recognition –Hopefully more countermeasures will be made  More awareness of the importance of more accurate face recognition product  Training –Studies show that training improve the error rate, and should be used on border control personell. –In the training process the effect hair has on recognition performance should also be considered.

Tom Summary  Limited additional security with a human supervisor  Hair influences human evaluation of faces  Other authentication methods may be preferable to a combination of face recognition and a human supervisor

Tom Face Recognition Software Questions?