TY - JOUR
T1 - Gait biometrics under spoofing attacks
T2 - An experimental investigation
AU - Hadid, Abdenour
AU - Ghahramani, Mohammad
AU - Kellokumpu, Vili
AU - Feng, Xiaoyi
AU - Bustard, John
AU - Nixon, Mark
N1 - Publisher Copyright:
© 2015 SPIE and IS and T.
PY - 2015/11/1
Y1 - 2015/11/1
N2 - Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.
AB - Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.
KW - antispoofing
KW - biometrics
KW - gait recognition
KW - spoofing attacks
KW - video analysis
UR - http://www.scopus.com/inward/record.url?scp=84954106441&partnerID=8YFLogxK
U2 - 10.1117/1.JEI.24.6.063022
DO - 10.1117/1.JEI.24.6.063022
M3 - 文章
AN - SCOPUS:84954106441
SN - 1017-9909
VL - 24
JO - Journal of Electronic Imaging
JF - Journal of Electronic Imaging
IS - 6
M1 - 063022
ER -