Gait anti-spoofing

John D. Bustard*, Mohammad Ghahramani, John N. Carter, Abdenour Hadid, Mark S. Nixon

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)


Gait recognition is a relatively new biometric and as a result relatively little effort has yet been devoted to studying spoofing attacks against it. This chapter examines the effects of two different spoofing attacks against two different state-of-the-art gait recognition systems. The first attack uses clothing impersonation where an attacker replicates the clothing of a legitimately enrolled individual. The second attack is a targeted attack where an imposter deliberately selects the legitimately enrolled subject whose gait signature is closest to the attacker. The analysis presented here reveals that both systems are vulnerable to both attacks. In particular, if both attacks are combined and the systems have acceptance thresholds set at the EER of their baseline performance, the attacks cause the FAR to rise from 5% to between 60 and 95%. The chapter describes two countermeasures that can be applied to minimise the effects of the spoofing attacks. Using the same acceptance thresholds the countermeasure to clothing attacks reduces the FAR performance under clothing impersonation from 40 to 15%. Likewise, the targeting countermeasure reduces the FAR for targeted attacks from 20 to 2.5% sufficient to even improve on the baseline performance.

Original languageEnglish
Title of host publicationAdvances in Computer Vision and Pattern Recognition
PublisherSpringer-Verlag London Ltd
Number of pages17
Publication statusPublished - 18 Jul 2014
Externally publishedYes

Publication series

NameAdvances in Computer Vision and Pattern Recognition
ISSN (Print)2191-6586
ISSN (Electronic)2191-6594

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Computer Vision and Pattern Recognition
  • Artificial Intelligence


Dive into the research topics of 'Gait anti-spoofing'. Together they form a unique fingerprint.

Cite this