Biometrics Institute CEO outlines strengths and vulnerabilities of biometric security

Biometrics Institute CEO Isabelle Moeller recently penned an opinion-editorial emphasizing how stakeholders must balance the strengths and vulnerabilities of biometric technology, as its credibility relies on the industry’s efforts to collaborate globally. The recent rise of biometrics deployments in consumer services has confirmed spoofing as a vulnerability that needs careful management. Moeller states that the weaknesses in biometrics have “spawned a race between those creating and applying the solutions.” She adds that while all biometric systems have some flaws, what

MSU researchers creating fake fingers to test fingerprint recognition systems

Michigan State University biometrics expert Anil Jain and his team are developing a fake finger that possesses multiple key properties of human skin to determine how secure biometric recognition systems are, according to a report by MSU Today. Jain, a University Distinguished Professor, and doctoral student Joshua Engelsma have used the fake finger to test two of the most common types of fingerprint readers to help determine their resilience to spoof attacks. The team created the fake fingers using a

Precise Biometrics releases whitepaper on spoof and liveness detection

Precise Biometrics released a new whitepaper entitled “Spoof and Liveness Detection for the Mobile Biometrics Market”, which offers an introduction to spoof and liveness detection. Among the topics covered in the whitepaper are how a fingerprints spoof is done, current anti-spoofing solutions, and the standardization efforts taken to discover ways to evaluate spoof detection. According to Precise Biometrics, mobile payments is expected to be the next “killer application for biometrics and further accelerating the adoption.” The whitepaper forecasts that the

Researchers develop prototype app that blocks voice hacking attacks

A new study by the University of Buffalo’s (UB) School of Engineering and Applied Sciences has found that voice-based smartphone apps such as Siri and WeChat can expose make you vulnerable to the growing security threat of voice hacking, according to a report on Phys.Org. Using only a few minutes of audio samples, attackers can replay your voice convincingly enough to trick people and advanced digital security systems to steal money from your bank account. A UB team of engineers

CCC researchers use iris image to breach Samsung Galaxy S8 scanner

Researchers from the Chaos Computer Club (CCC) have successfully breached the Samsung Galaxy S8’s iris recognition system to unlock the device using an image of an iris, according to a report by Motherboard. CCC has posted a video demonstrating how they bypassed the iris scanner’s protections using a camera, a printer, and a contact lens. “We’ve had iris scanners that could be bypassed using a simple print-out,” said Linus Neumann, one of the CCC researchers who appears in the video.

BBC reporter and his twin dupe HSBC voice ID recognition system

HSBC’s voice ID authentication software designed to prevent bank fraud has been duped by BBC Click reporter Dan Simmons and his non-identical twin, according to a report by BBC News. Simmons created an HSBC account and signed up to the bank’s voice ID authentication service. His non-identical twin, Joe, was able to access the account via the telephone by impersonating his brother’s voice. HSBC said it would “review” ways to make the ID system more sensitive following the BBC investigation.

Idiap study explores impact of score fusion on voice biometrics, presentation attack detection

Researchers at Idiap Research Institute Biometrics Group in Switzerland have conducted an extensive study of eight presentation attack detection (PAD methods) in which they assessed their ability to detect known and unknown attacks using publically available speaker databases with spoofing attacks, AVspoof and ASVspoof. Authored by research associate Pavel Korshunov and senior researcher Sébastien Marcel, the study is published in the latest issue of IEEE Journal of Selected Topics in Signal Processing. Automatic speaker verification (ASV) systems are highly vulnerable

Novetta VP appointed to ISO editor position

Novetta vice president of special projects, Michael Thieme, has been appointed editor of ISO/IEC 30107-4, a performance testing standard related to biometric presentation attack detection. This performance testing standard will address spoofing and presentation attacks against mobile devices such as iPhones and Android smartphones. “This appointment further solidifies Novetta’s role as a thought leader in emerging biometric and identity-related technologies,” said Tiffanny Gates, Novetta president and chief executive officer. “We look forward to supporting this important and challenging work.” According

Researchers find smartphone fingerprint sensors potentially vulnerable to “MasterPrints”

Smartphone fingerprint sensors could be fooled up to 65 percent of the time by “MasterPrints” digitally composed from common fingerprint features, according to findings published Monday by researchers at New York University and Michigan State University. In the report MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based Authentication Systems, the researchers warn that partial fingerprint-based authentication systems are potentially vulnerable to compromise, particularly when multiple impressions of each finger are enrolled. Enrolling multiple impressions is often required by devices to ensure

Crossmatch wins $5.8M IARPA contract

Crossmatch has been awarded a $5.8 million contract to develop next-generation presentation attack detection (PAD) technologies for the Intelligence Advanced Research Projects Activity (IARPA) Thor program. “Innovation has been a driving force within Crossmatch from the onset and IARPA’s Thor program will allow us to innovate and develop new technologies and solutions that surpass existing PAD systems,” said Crossmatch SVP-CTO Bill McClurg. “These solutions will drive new commercial opportunities and market demand, and Crossmatch is excited to have this opportunity