FB pixel

Explainer: Biometric presentation attack detection and liveness checks

Explainer: Biometric presentation attack detection and liveness checks
 

Biometrics as an authentication method have rapidly caught on not just for their accessibility, ease of use and being contactless, but for their precise security. Biometrics are, with some notable exceptions, unique, and although false positive matches can occur in any probabilistic system at scale, a malicious actor or a false positive is highly unlikely to receive access to that person’s services, accounts, and sensitive data with their own biometrics. But as with any security measure, biometric systems can be hacked.

A ‘presentation attack’ is a fraud attempt in which a bad actor acquires the biometric data of an individual and uses the data to grant access to a service they are unauthorized to access, manipulates data to do so, or uses a synthetic identity to spoof the system. Victims’ biometrics can be gained by hacking a database and copying biometric data such as voice files or fingerprint templates, or purchasing stolen data through the dark web. The copied data can then be used to access accounts and go through security measures unopposed. A bad actor could steal fingerprint data, replicate it as a fake fingerprint and pass fingerprint scans at a secured building, for example.

The need to protect against presentation attacks led to ‘presentation attack detection’ (PAD). A biometrics sensor can be built to automatically detect when a presentation attack is occurring and take appropriate defensive actions against it. PAD also extends to cases where people deliberately distort their biometrics to prevent an accurate record from being taken, such as damaging their fingerprints so a police fingerprint database will not have a proper record of them.

A subset of a PAD is the concept of ‘liveness,’ which senses whether the instance of PAD is involving a living being as opposed to a spoof of an image, recorded video, or a silicone fingerprint. Liveness distinguishes and analyzes for biometrics like anatomical details and reactions such as eye movements during a face scan to determine if the input is from a living subject.

PAD and liveness detection systems are either ‘active,’ meaning they challenge the user to perform an action such as move their head or the camera, or ‘passive.’

An international standard for PAD is provided in the form of ISO/IEC 30107. Part 1 sets out a framework for biometric presentation attack detection, part 2 with data formats, and part 3 with testing and reporting. Part 4 extends the testing profile to mobile devices.

National science authorities, including but not limited to the National Institute of Standards and Technology (NIST) in the United States can accredit laboratories to test the performance of vendor solutions against the ISO 30107 standard.

To provide a fair and unbiased analysis of the efficacy of PAD, independent testing labs are accredited to offer their analysis of how well a particular biometric system detects presentation attacks. Accredited labs are contracted by biometric algorithm providers to offer proof of the effectiveness of their algorithms, gain public awareness and market their product. The results of the testing are sometimes publicly released, but not always.

Attacks are classified according to their sophistication and divided into levels. Different PAD systems must evolve over time to defend against new attack techniques.

Any PAD system also must balance a fine line between being secure but not overly-sensitive, which would be inconvenient to the vast majority of legitimate users.

Click here for more explainers on concepts in the field of biometrics.

Article Topics

 |   |   |   |   |   |   | 

Latest Biometrics News

 

OpenAI joins FIDO Alliance to help AI agent authentication push

OpenAI is the newest member of the FIDO Alliance, joining the passwordless authentication group to contribute to its efforts to…

 

iDenfy integrates reusable digital IDs to help businesses avoid onboarding fails

Businesses have long been dealing with a common behavioral issue when clients attempt their Know Your Customer (KYC) onboarding workflow:…

 

UK public mostly happy with ‘age verification’ laws, campaigners less so

Age assurance may not stop that many children from accessing online pornography, but it’s a good idea anyway, according to…

 

Authsignal brings identity orchestration to IATA as airlines modernize authentication

Authsignal has joined the International Air Transport Association’s (IATA) Strategic Partnership Program. The announcement follows IATA’s World Data Symposium in…

 

Self Labs acquires startup Loam to build agentic AI’s digital identity infrastructure

Zero-Knowledge Proof (ZKP) identity verification and proof-of-personhood (PoP) company Self Labs has completed the acquisition of U.S.-based AI agent and automation…

 

Arizona Wallet creator AstreaX launches digital ID app

Government software and digital identity developer AstreaX has officially launched its mobile wallet, which will be used by the U.S….

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events