ICB 2013 TABULA RASA Spoofing Challenge
In ICB 2013, Tabula Rasa Spoofing Challenge invited researchers to develop ingenious attack plans and to deceive various biometric authentications systems of different modalities. With large participation of researchers, visitors and contestants, the challenge has successfully raised awareness about spoofing vulnerabilities of biometric systems and additionally, it has given way to many different and creative ways to attack the systems.
The goal of this challenge was to stimulate novel ideas to spoof state-of-the-art biometric authentication systems with 4 different modalities:
- 2D face in visible spectra
- 2D face in infra-red spectra
Each system was reinforced with countermeasures for numerous attack types and the participants were invited to find ways to break through the system using their imagination and creativity.
What is Spoofing?
A spoofing attack is a situation in which a person successfully masquerades as another by presenting a counterfeit biometric evidence of a valid user and thereby gaining an illegitimate authentication. It is a direct attack to the sensory input of a biometric system and the attacker does not need previous knowledge about the recognition algorithm.
For each system, a small set of subjects was enrolled as authenticated users. For the first group of enrolled persons, the face images, voice recordings or fingerprints were made available through this website, in order to be used in forging the attacks.
However for the second group, only the identity information was released and their biometric samples had to be acquired by the attackers themselves. For this purpose, these subjects were selected among the attendees of the conference and their enrollment were done on-site.
During 2 afternoons, in addition to the attempts of the attackers, there were many interesting demos, showing the system performances with and without countermeasures, accompanied by informative posters. Additionally for fingerprint spoofing, gummy fingers were presented via a small instructional workshop on how to forge them.
The most brilliant attempt among 9 contestants, which was decided on its spoofing success and originality, was awarded with the "Best Spoofing Attack Award", accompanied by an incentive prize: a Samsung Galaxy Tab 2.
Using make-up to look like one of the enrolled subjects, Antitza Dantcheva tried to spoof the 2D face recognition system in visible spectra and succeeded to be recognized as her victim. Additionally, due to the intrinsic nature of the attack, she could easily bypass the liveness detection based counter-measures that were implemented in the system. We congratulate her once more!
Nesli Erdogmus - nesli DOT erdogmus AT idiap DOT ch
Sébastien Marcel - sebastien DOT marcel AT idiap DOT ch