TY - GEN
T1 - Improving gait biometrics under spoofing attacks
AU - Hadid, Abdenour
AU - Ghahramani, Mohammad
AU - Bustard, John
AU - Nixon, Mark
PY - 2013/10/3
Y1 - 2013/10/3
N2 - Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analysed for the first time the effects of spoofing attacks on silhouette based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. These findings are exploited in this current work for developing new solutions to cope with such possible spoofing attacks. We describe then in this paper an initial solution coping with gait spoofing attacks using part-based gait analysis. The proposed solution is thoroughly evaluated on the challenging USOU gait spoofing database collected within the EU Tabula Rasa project. The database consists of records of 22 subjects (14 male and 8 female), between 20-55 years old, walking through the Southampton tunnel in both their normal clothes and whilst wearing a common uniform. The obtained results are very promising and point out very interesting findings which can be used as a reference for developing more enhanced countermeasures by the research community.
AB - Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analysed for the first time the effects of spoofing attacks on silhouette based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. These findings are exploited in this current work for developing new solutions to cope with such possible spoofing attacks. We describe then in this paper an initial solution coping with gait spoofing attacks using part-based gait analysis. The proposed solution is thoroughly evaluated on the challenging USOU gait spoofing database collected within the EU Tabula Rasa project. The database consists of records of 22 subjects (14 male and 8 female), between 20-55 years old, walking through the Southampton tunnel in both their normal clothes and whilst wearing a common uniform. The obtained results are very promising and point out very interesting findings which can be used as a reference for developing more enhanced countermeasures by the research community.
KW - gait recognition
KW - LBP features
KW - spoofing attacks
UR - http://www.scopus.com/inward/record.url?scp=84884728295&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-41184-7_1
DO - 10.1007/978-3-642-41184-7_1
M3 - Conference contribution
AN - SCOPUS:84884728295
SN - 9783642411830
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 10
BT - Image Analysis and Processing, ICIAP 2013 - 17th International Conference, Proceedings
T2 - 17th International Conference on Image Analysis and Processing, ICIAP 2013
Y2 - 9 September 2013 through 13 September 2013
ER -