Skip to content. | Skip to navigation

Personal tools


You are here: Home / Testing / ICB 2013 TABULA RASA Spoofing Challenge

ICB 2013 TABULA RASA Spoofing Challenge null

In ICB 2013, Tabula Rasa Spoofing Challenge invited researchers to develop ingenious attack plans and to deceive various biometric authentications systems of different modalities. With large participation of researchers, visitors and contestants, the challenge has successfully raised awareness about spoofing vulnerabilities of biometric systems and additionally, it has given way to many different and creative ways to attack the systems.


The goal of this challenge was to stimulate novel ideas to spoof state-of-the-art biometric authentication systems with 4 different modalities:

    • 2D face in visible spectra
    • 2D face in infra-red spectra
    • Speech
    • Fingerprint

Each system was reinforced with countermeasures for numerous attack types and the participants were invited to find ways to break through the system using their imagination and creativity.



What is Spoofing?

A spoofing attack is a situation in which a person successfully masquerades as another by presenting a counterfeit biometric evidence of a valid user and thereby gaining an illegitimate authentication. It is a direct attack to the sensory input of a biometric system and the attacker does not need previous knowledge about the recognition algorithm.


For each system, a small set of subjects was enrolled as authenticated users. For the first group of enrolled persons, the face images, voice recordings or fingerprints were made available through this website, in order to be used in forging the attacks.

However for the second group, only the identity information was released and their biometric samples had to be acquired by the attackers themselves. For this purpose, these subjects were selected among the attendees of the conference and their enrollment were done on-site.


During 2 afternoons, in addition to the attempts of the attackers, there were many interesting demos, showing the system performances with and without countermeasures, accompanied by informative posters. Additionally for fingerprint spoofing, gummy fingers were presented via a small instructional workshop on how to forge them.


The challenge was a success with many contestants and visitors. In total, 9 attacks participated in the challenge - 6 in face verification (both Vis and NIR) and 3 in fingerprint verification. Additionally, almost all of the conference attendees stopped by and tried the demos. We got a big opportunity to discuss with the community about the vulnerabilities of biometric systems against spoofing attacks and to show them the current state of the problem with live demos.


The most brilliant attempt among 9 contestants, which was decided on its spoofing success and originality, was awarded with the "Best Spoofing Attack Award", accompanied by an incentive prize: a Samsung Galaxy Tab 2.




Using make-up to look like one of the enrolled subjects, Antitza Dantcheva tried to spoof the 2D face recognition system in visible spectra and succeeded to be recognized as her victim. Additionally, due to the intrinsic nature of the attack, she could easily bypass the liveness detection based counter-measures that were implemented in the system. We congratulate her once more!

Contact Info

Nesli Erdogmus - nesli DOT erdogmus AT idiap DOT ch

Sébastien Marcel - sebastien DOT marcel AT idiap DOT ch

This is themeComment