Abstract
From biometric image acquisition to matching to decision making, designing a selfie biometric system is riddled with security, privacy, and usability challenges. In this chapter, we provide a discussion of some of these challenges, examine some real-world examples, and discuss both existing solutions and potential new solutions. The majority of these issues will be discussed in the context of mobile devices, as they comprise a major platform for selfie biometrics; face, voice, and fingerprint biometric modalities are the most popular modalities used with mobile devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Apple Corporation (2018) IPhone 5s—technical specifications. Retrieved from https://support.apple.com/kb/sp685?locale=en_US. Cited 24 Sept 2018
Chaos Computer Club (CCC) (2013) Chaos Computer Club breaks Apple TouchID. Retrieved from https://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid. Cited 15 Aug 2018
Rogers M (2014) Why I hacked TouchID (again) and still think it’s awesome. Lookout Blog. Retrieved from https://blog.lookout.com/iphone-6-touchid-hack. Cited 2 July 2018
Cao K, Jain AK (2016) Hacking mobile phones using 2D printed fingerprints. MSU technical report
Heisler Y (2017) Security researchers demo how “easy” it is to fool face ID with a 3D mask. BGR. Retrieved from https://bgr.com/2017/11/28/face-id-hack-3d-mask-iphone-x-security/. Cited 2 July 2018
Matteson S (2017) IPhone’s face ID can be hacked, but here’s why nobody needs to panic. TechRepublic. Retrieved from https://www.techrepublic.com/article/iphones-face-id-can-be-hacked-but-heres-why-nobody-needs-to-panic/. Cited 2 July 2018
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40(3):614–634
Apple Corporation (2018) IOS security. Retrieved from https://www.apple.com/business/site/docs/iOS_Security_Guide.pdf. Cited 2 Sept 2018
Brandom R (2016) Your phone’s biggest vulnerability is your fingerprint. Retrieved from https://www.theverge.com/2016/5/2/11540962/iphone-samsung-fingerprint-duplicate-hack-security. Cited 4 June 2018
McKane J (2018) We made fake fingerprints and hacked into a Nokia 5. MyBroadband. Retrieved from https://mybroadband.co.za/news/security/267331-we-made-fake-fingerprints-and-hacked-into-a-nokia-5.html. Cited 3 Aug 2018
Smith C (2017) The iPhone X’s face ID has one real vulnerability: your kids. BGR. Retrieved from https://bgr.com/2017/11/14/iphone-x-face-id-hacked-children/. Cited 3 July 2018
Smith C (2017) Face ID shown unlocking for family members who aren’t alike. BGR. Retrieved from https://bgr.com/2017/12/31/iphone-x-face-id-hack-family-members/. Cited 3 July 2018
Williams-Grut O (2016) A researcher claims 2 bank apps can be hacked using iPhone’s “Live Photos.” Business Insider. Retrieved from https://www.businessinsider.com/bank-apps-facial-recognition-hacked-using-iphone-live-photos-2016-8. Cited 3 July 2018
International Organization for Standardization (2016) Information technology—biometric presentation attack detection—part 1: framework. Retrieved from https://www.iso.org/standard/53227.html
National Institute of Standards and Technology (2013) Standards for biometric technologies. Retrieved from https://www.nist.gov/speech-testimony/standards-biometric-technologies
Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710–724
Rattani A, Derakhshani R (2018) A survey of mobile face biometrics. Comput Electr Eng 72:39–52
Amadeo R (2017) Galaxy S8 face recognition already defeated with a simple picture. Ars Technica. Retrieved from https://arstechnica.com/gadgets/2017/03/video-shows-galaxy-s8-face-recognition-can-be-defeated-with-a-picture/. Cited 3 July 2018
Moren D (2015) Face recognition security, even with a “blink test,” is easy to trick. Popular Science. Retrieved from https://www.popsci.com/its-not-hard-trick-facial-recognition-security?utm_medium=twitter&utm_source=twitterfeed. Cited 3 July 2018
de Freitas Pereira T, Anjos A, De Martino JM, Marcel S (2013) Can face anti spoofing countermeasures work in a real world scenario? Paper presented at the IEEE international conference on biometrics (ICB). Madrid, Spain
Pudil P, Novovičová J, Kittler J (1994) Floating search methods in feature selection. Pattern Recogn Lett 15(11):1119–1125
Erdogmus N, Marcel S (2013) Spoofing 2D face recognition systems with 3D masks. Paper presented at the 2013 international conference of the biometrics special interest group (BIOSIG), Darmstadt, Germany
Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041
Li J, Wang Y, Tan T, Jain AK (2004) Live face detection based on the analysis of fourier spectra. Biomet Technol Hum Ident 5404:296–304
Cardinal D (2017) How Apple’s iPhone X TrueDepth camera works. ExtremeTech. Retrieved from https://www.extremetech.com/mobile/255771-apple-iphone-x-truedepth-camera-works. Cited 14 Sept 2017
Apple Corporation (2017) Face ID security. Retrieved from https://www.apple.com/business/site/docs/FaceID_Security_Guide.pdf
InAuth (2017) Fingerprints: the most popular biometric. Retrieved from https://www.inauth.com/blog/fingerprints-popular-biometric/. Cited 2 July 2018
Tess (2017) Realistic 3D printed finger could make smartphone fingerprint scanners harder to hack. 3drs.org. Retrieved from https://www.3ders.org/articles/20170925-realistic-3d-printed-finger-could-make-smartphone-fingerprint-scanners-harder-to-hack.html
Marasco E, Ross A (2015) A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput Surv (CSUR) 47(2):28
Bowden-Peters E, Phan RCW, Whitley JN, Parish DJ (2012) Fooling a liveness-detecting capacitive fingerprint scanner. Cryptography and security: from theory to applications. Springer, Berlin, pp 484–490
Phone Arena (2018) Samsung Galaxy S9 vs Samsung Galaxy S5—Phone specs comparison. Retrieved from https://www.phonearena.com/phones/compare/Samsung-Galaxy-S9,Samsung-Galaxy-S5/phones/10717,8202. Cited 3 July 2018
Fox-Brewster T (2018) Yes, cops are now opening iPhones with dead people’s fingerprints. Forbes. Retrieved from https://www.forbes.com/sites/thomasbrewster/2018/03/22/yes-cops-are-now-opening-iphones-with-dead-peoples-fingerprints/#3e50d3c7393e. Cited 3 July 2018
Hardy E (2018) Cops will use Touch ID on your corpse to unlock your iPhone. Cult of Mac. Retrieved from https://www.cultofmac.com/536691/police-unlock-iphones-with-dead-fingers-touch-id/. Cited 4 July 2018
Wehner M (2016) Why a disembodied finger can’t be used to unlock the touch ID sensor on the iPhone 5s. Engadget. Retrieved from https://www.engadget.com/2013/09/16/why-a-disembodied-finger-cant-be-used-to-unlock-the-touch-id-se/. Cited 4 July 2018
Etherington D (2013). Watch a cat unlock the iPhone 5s using touch ID and the fingerprint sensor. Retrieved from https://techcrunch.com/2013/09/19/watch-a-cat-unlock-the-iphone-5s-using-touch-id-and-the-fingerprint-sensor/. Cited 4 July 2018
Leopold T (2013) New iPhone 5S fingerprint sensor works for dogs. CNN. Retrieved from https://www.cnn.com/2013/09/20/tech/mobile/iphone-dog-paw-print-ireport/index.html. Cited 3 July 2018
Kooser A (2016) See a hedgehog unlock an iPhone with its tiny paw. CNET. Retrieved from https://www.cnet.com/news/hedgehog-unlock-iphone-sashimi/. Cited 4 July 2018
Qualcomm (2017) Qualcomm fingerprint sensors. Retrieved from https://www.qualcomm.com/solutions/mobile-computing/features/security/fingerprint-sensors. Cited 4 July 2018
Qualcomm (2018) Qualcomm announces advanced fingerprint scanning and authentication technology. Retrieved from https://www.qualcomm.com/news/releases/2017/06/28/qualcomm-announces-advanced-fingerprint-scanning-and-authentication. Cited 4 July 2018
Avila CS, Casanova JG, Ballesteros F, Garcia LRT, Gomez MFA, Sierra DS (2014) State of the art of mobile biometrics, liveness and non-coercion detection. Personalized Centralized Authentication System
Abhyankar A, Schuckers S (2006) Fingerprint liveness detection using local ridge frequencies and multiresolution texture analysis techniques. Paper presented at the IEEE international conference on image processing (ICIP). Atlanta, GA
Jiao J, Deng Z (2017) Deep combining of local phase quantization and histogram of oriented gradients for indoor positioning based on smartphone camera. Int J Distrib Sens Netw 13(1):1550147716686978
Coli P, Marcialis G, Roli F (2007) Power spectrum-based fingerprint vitality detection. Paper presented at the IEEE international work on automatic identification advanced technologies (AutoID). Alghero, Italy
Six J, Cornelis O, Leman M (2014) TarsosDSP, a real-time audio processing framework in Java. Paper presented at the audio engineering society 53rd international conference: semantic audio. London, England
Ojala T, Pietikäinen M, Harwood D (1996) A comparative study of texture measures with classification based on featured distributions. Pattern Recogn 29(1):51–59
Muhammad A (2015) OpenCV Android programming by example. Packt Publishing Ltd, Birmingham
Nikam SB, Agarwal S (2008) Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems. Paper presented at the 2018 first international conference on emerging trends in engineering and technology, Nagpur, Maharashtra, India
Jia X, Yang X, Cao K, Zang Y, Zhang N, Dai R, Tian J (2014) Multi-scale local binary pattern with filters for spoof fingerprint detection. Inf Sci 268:91–102
Yambay D, Ghiani L, Denti P, Marcialis GL, Roli F, Schuckers S (2012) LivDet 2011—Fingerprint liveness detection competition 2011. Paper presented at the 2012 5th IAPR international conference on biometrics (ICB), New Delhi, India
Kumpituck S, Li D, Kunieda H, Isshiki T (2017) Fingerprint spoof detection using wavelet based local binary pattern. Paper presented at the 8th international conference on graphic and image processing (ICGIP 2016). Bellingham, WA
Kumar L, Sharma K (2013) Web based novel technique for watermarking colour images on Android mobile phones. Int J Adv Res Comput Sci Softw Eng 3(7)
Gragnaniello D, Poggi G, Sansone C, Verdoliva L (2013) Fingerprint liveness detection based on weber local image descriptor. Paper presented at the 2013 IEEE workshop on biometric measurements and systems for security and medical applications (BIOMS). Naples, Italy
Kannala J, Rahtu E (2012) Bsif: binarized statistical image features. Paper presented at the 2012 21st international conference on pattern recognition (ICPR). Tsukuba, Japan
Superpowered (n.d.) IOS and Android FFT & iOS and Android Polar FFT. Retrieved from https://superpowered.com/fft-and-polar-fft. Cited 4 July 2018
Manivanan N, Memon S, Balachandran W (2010) Automatic detection of active sweat pores of fingerprint using highpass and correlation filtering. Electron Lett 46(18):1268–1269
Manivanan N, Memon S, Balachandran W (2010) Security breaks a sweat. Electron Lett 46(18):1241–1242
Espinoza M, Champod C (2011) Using the number of pores on fingerprint images to detect spoofing attacks. Paper presented at the 2011 international conference on hand-based biometrics (ICHB), Hong Kong, China
Marcialis GL, Roli F, Tidu A (2010) Analysis of fingerprint pores for vitality detection. Paper presented at the 2010 20th international conference on pattern recognition (ICPR). Istanbul, Turkey
Memon SA (2012) Novel active sweat pores based liveness detection techniques for fingerprint biometrics. Doctoral dissertation. Brunel University School of Engineering and Design Ph.D. theses
Memon S, Manivannan N, Balachandran W (2011) Active pore detection for liveness in fingerprint identification system. Paper presented at the 2011 19th telecommunications forum (TELFOR), Belgrade, Serbia
Rattani A, Scheirer WJ, Ross A (2015) Open set fingerprint spoof detection across novel fabrication materials. IEEE Trans Inf Forensics Secur 10(11):2447–2460
Rattani A, Ross A (2014) Automatic adaptation of fingerprint liveness detector to new spoof materials. Paper presented at the IEEE international joint conference on biometrics. Clearwater, FL
Rattani A, Ross A (2014a) Minimizing the impact of spoof fabrication material on fingerprint liveness detector. Paper presented at the 2014 IEEE international conference on image processing (ICIP). Paris, France
Bhide B (2013) Low-pass-filter-to-Android-sensors. Retrieved from https://github.com/Bhide/Low-Pass-Filter-To-Android-Sensors. Cited 4 July 2018
W3C Working Group (2017) Motion sensors explainer. Retrieved from https://www.w3.org/TR/motion-sensors/#low-pass-filters. Cited 4 July 2018
Alzantot M, Wang Y, Ren Z, Srivastava MB (2017) RSTensorFlow: GPU enabled TensorFlow for deep learning on commodity android devices. Paper presented at the 1st international workshop on deep learning for mobile systems and applications. Niagara Falls, NY
Google Corporation (n.d.) Change “Ok Google” settings. Retrieved from https://support.google.com/assistant/answer/7394306?hl=en. Cited 4 July 2018
Young PJ, Jin JH, Woo S, Lee DH (2016) BadVoice: soundless voice-control replay attack on modern smartphones. Paper presented at the 2016 eighth international conference on ubiquitous and future networks (ICUFN). Vienna, Austria
Richardson M, Wallace S (2012) Getting started with raspberry PI. O’Reilly Media Inc., Sebastopol
Wu Z, Evans N, Kinnunen T, Yamagishi J, Alegre F, Li H (2015) Spoofing and countermeasures for speaker verification: a survey. Speech Commun 66:130–153
Pew Research Center (2018) Demographics of mobile device ownership and adoption in the United States. Retrieved from http://www.pewinternet.org/fact-sheet/mobile/. Cited 3 July 2018
Shang W, Stevenson M (2010) Score normalization in playback attack detection. Paper presented at the IEEE international conference on acoustics, speech, and signal processing (ICASSP). Dallas, TX
Villalba J, Lleida E (2011) Detecting replay attacks from far-field recordings on speaker verification systems. European workshop on biometrics and identity management. Springer, Berlin, pp 274–285
Wang ZF, Wei G, He QH (2011) Channel pattern noise based playback attack detection algorithm for speaker recognition. Paper presented at the 2011 international conference on machine learning and cybernetics (ICMLC). Guilin, China
Rossi M, Feese S, Amft O, Braune N, Martis S, Tröster G (2013) AmbientSense: a real-time ambient sound recognition system for smartphones. Paper presented at the 2013 IEEE international conference on pervasive computing and communications workshops (PERCOM Workshops). San Diego, CA
Chen LW, Guo W, Dai LR (2010) Speaker verification against synthetic speech. Paper presented at the 7th international symposium on Chinese spoken language processing (ISCSLP). Tainan, Taiwan
Wu Z, Chng ES, Li H (2012) Detecting converted speech and natural speech for anti-spoofing attack in speaker recognition. Interspeech
Wu Z, Kinnunen T, Chng ES, Li H, Ambikairajah E (2012) A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case. Paper presented at the 2012 Asia-Pacific signal information processing association annual summit and conference (APSIPA ASC). Hollywood, CA
Alegre F, Amehraye A, Evans N (2013) A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns. Paper presented at the international conference on biometrics: theory, applications and systems (BTAS). Alrington, VA
Alegre F, Amehraye A, & Evans N (2013) Spoofing countermeasures to protect automatic speaker verification from voice conversion. Paper presented at the IEEE international conference on acoustics, speech, and signal processing (ICASSP). Vancouver, BC
Matrouf D, Bonastre JF, Fredouille C (2006) Effect of speech transformation on impostor acceptance. Paper presented at the 2006 IEEE international conference on acoustics, speech, and signal processing (ICASSP). Toulouse, France
Gofman M, Sandico N, Mitra S, Suo E, Muhi S, Vu T (2018) Multimodal biometrics via discriminant correlation analysis on mobile devices. Paper presented at the 2018 international conference on security and management. Las Vegas, NV
Chen S, Ren K, Piao S, Wang C, Wang Q, Weng J, Su L, Mohaisen A (2017) You can hear but you cannot steal: defending against voice impersonation attacks on smartphones. Paper presented at the 2017 IEEE 37th international conference on distributed computing systems (ICDCS). Atlanta, GA
Khoury E, El Shafey L, Marcel S (2014) Spear: an open source toolbox for speaker recognition based on Bob. Paper presented at the 2014 IEEE international conference on acoustics, speech and signal processing (ICASSP). Florence, Italy
Kominek J, Black AW (2004) The CMU arctic speech databases. Paper presented at the 5th ISCA workshop on speech synthesis. Pittsburgh, PA
Feng H, Fawaz K, Shin KG (2017) Continuous authentication for voice assistants. Paper presented at the 23rd annual international conference on mobile computing and networking. Snowbird, UT
Zhang L, Tan S, Yang J (2017) Hearing your voice is not enough: an articulatory gesture based liveness detection for voice authentication. Paper presented at the 2017 ACM SIGSAC conference on computer and communications security. Dallas, TX
Zhang L, Tan S, Yang J, Chen Y (2016) Voicelive: a phoneme localization based liveness detection for voice authentication on smartphones. Paper presented at the 2016 ACM SIGSAC conference on computer and communications security. Vienna, Austria
Rodrigues RN, Ling LL, Govindaraju V (2009) Robustness of multimodal biometric fusion methods against spoof attacks. J Vis Lang Comput 20(3):169–179
Gofman MI, Mitra S, Smith N (2016) Hidden Markov models for feature-level fusion of biometrics on mobile devices. Paper presented at the 2016 IEEE/ACS 13th international conference of computer systems and applications (AICCSA). Agadir, Morocco
Gofman MI, Mitra S, Cheng THK, Smith NT (2016) Multimodal biometrics for enhanced mobile device security. Commun ACM 59(4):58–65
Katona M et al (2005) FPGA design and implementation of a wavelet-domain video denoising system. Lect Notes Comput Sci 3708:650–657
Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition, 2nd edn. Springer, New York City
Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901
Arjona R, Baturone I (2015) A fingerprint biometric cryptosystem in FPGA. Paper presented at the 2015 IEEE international conference on industrial technology (ICIT). Seville, Spain
Imamverdiyev Y, Teoh ABJ, Kim J (2013) Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Syst Appl 40(5):1888–1901
Pepicq B (2017) Why do some people refuse to use Google Assistant? AndroidPIT. Retrieved from https://www.androidpit.com/why-not-use-google-assistant. Cited 3 June 2018
Mohsin MA (2017) An FPGA-based hardware accelerator for k-nearest neighbor classification for machine learning. Master thesis. University of Colorado Springs
Paul R (2011) Unwrapping a new ice cream sandwich: Android 4.0 reviewed. Ars Technica. Retrieved from https://arstechnica.com/gadgets/2011/12/unwrapping-a-new-ice-cream-sandwich-android-40-reviewed-1/. Cited 20 June 2018
Apple (2018) Using touch ID on the iPhone. Retrieved from http://support.apple.com/kb/ht5883. Cited 20 June 2018
Chamary JV (2017) No, Apple’s face ID is not a “secure Password”. Forbes. Retrieved from https://www.forbes.com/sites/jvchamary/2017/09/18/security-apple-face-id-iphone-x/#99580fc4c835. Cited 28 June 2018
Bhagavatula C, Ur B, Iacovino K, Kywe SM, Cranor LF, Savvides M (2015) Biometric authentication on iPhone and Android: usability, perceptions, and influences on adoption. Paper presented at the usable security (USEC). Workshop. San Diego, CA
Clarke NL, Furnell SM (2006) Authenticating mobile phone users using keystroke analysis. Int J Inf Secur 6(1):1–14
Trewin S, Swart C, Koved L, Martino J, Singh K, Ben-David S (2012) Biometric authentication on a mobile device: a study of user effort, error and task disruption. Paper presented at the 28th annual computer security applications conference (ACSAC). Orlando, FL
Braz C, Robert J-M (2006) Security and usability: the case of the user authentication methods. Paper presented at the 18th International conference of the association francophone d’Interaction Homme-Machine. Montreal, Quebec
Egelman S, Jain S, Portnoff RS, Liao K, Consolvo S, Wagner D (2014) Are you ready to lock? Paper presented at the ACM SIGSAC conference on computer & communications security. Scottsdale, AZ
Harbach M, von Zezschwitz E, Fichtner A, De Luca A, Smith M (2014) It’s a hard lock life: A field study of smartphone (un)locking behavior and risk perception. Paper presented at the symposium on usable privacy and security. Menlo Park, CA
Sathiah S (2017) Face ID on the iPhone X is a backwards step in usability. Notebookcheck. Retrieved from https://www.notebookcheck.net/Face-ID-on-the-iPhone-X-is-a-backwards-step-in-usability.264306.0.html. Cited 28 June 2018
Burgbacher U, Hinrichs K (2014) An implicit author verification system for text messages based on gesture typing biometrics. Paper presented at the ACM CHI conference on human factors in computing systems. Toronto, Canada
Crawford H (2010) Keystroke dynamics: characteristics and opportunities. In: 8th international conference on privacy, security and trust. Ottawa, CA
Campisi P, Maiorana E, Lo Bosco M, Neri A (2009) User authentication using keystroke dynamics for cellular phones. IET Sig Process 3(5):333–341
Nauman M, Ali T, Rauf A (2013) Using trusted computing for privacy preserving keystroke-based authentication in smartphones. Telecommun Syst 52:2149–2161
Saevanee H, Bhattarakosol P (2009) Authenticating user using keystroke dynamics and finger pressure. Paper presented at the 6th IEEE consumer communications and networking conference. Las Vegas, NV
Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability, and usability of keystroke biometrics on mobile touchscreen devices. Paper presented at the ACM CHI 2015 conference, crossings. Seoul, Korea
Acknowledgements
We would like to thank the students in our research laboratory for their assistance in developing and implementing the approaches discussed in this chapter—specifically, Narciso Sandico, Sadun Muhi, and Eryu Suo. We would additionally like to thank Maria Villa and Bryan Villa for their illustrative work in Fig. 16.5.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Gofman, M., Mitra, S., Bai, Y., Choi, Y. (2019). Security, Privacy, and Usability Challenges in Selfie Biometrics. In: Rattani, A., Derakhshani, R., Ross, A. (eds) Selfie Biometrics. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-030-26972-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-26972-2_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-26971-5
Online ISBN: 978-3-030-26972-2
eBook Packages: Computer ScienceComputer Science (R0)