Novel Approaches to Developing Multimodal Biometric Systems with Autonomic Liveness Detection Characteristics

  • Peter Matthew
  • Mark Anderson
Part of the Studies in Computational Intelligence book series (SCI, volume 542)


Liveness detection in biometric systems has become an integral part of system viability, but it has innate disadvantages concerning implementation, situational suitability and acceptance. This article looks at the potential for combining liveness detection techniques with autonomous concepts to minimize, negate or even improve the original system. This is done by considering two potential areas within the autonomous system purview, autonomous architectures and the human nervous system paradigm. Within each there are a number of areas that could accept liveness detection incorporation and potentially improve each applicable subsystem. This article will cover an introduction into these topics and a discussion about their suitability.


biometric liveness detection autonomous systems template capture human nervous system paradigm biometric security autonomous architectures 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    International Biometric Group, How is ‘Biometrics’ Defined? (2007), (accessed May 15, 2009)
  2. 2.
    Abernathy, W., Tien, L.: Biometrics: Who’s Watching You? (2003), (accessed April 28, 2009)
  3. 3.
    Roberts, C.: Biometric attack vectors and defences. Science Direct Computers & Security 26, 14–25 (2007)CrossRefGoogle Scholar
  4. 4.
    Clarke, N., Furnell, S.: Biometrics – The promise versus the practice. Computer Fraud & Security 9, 12–16 (2005)CrossRefGoogle Scholar
  5. 5.
    Kurzweil, R.: The Law of Accelerating Returns (March 7, 2001), March 21, 2013)
  6. 6.
    Horn, P.: Autonomic Computing: IBM’s Perspective on the State of Information Technology, IBM (2001)Google Scholar
  7. 7.
    Jain, A., Nandakumar, K., Nag, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Pricessing (2007)Google Scholar
  8. 8.
    Ratha, N.K., Connell, J., Bolle, R.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 3 (2001)Google Scholar
  9. 9.
    Wayman, J.L.: Technical testing and evaluation of biometric devices. In: Biometrics – Personal Identification in Networked Society, pp. 345–368. Springer, US (2005)Google Scholar
  10. 10.
    Bartlow, N., Cukic, B.: The vulnerabilities of biometric systems – an integrated look and old and new ideas. In: Biometric Consortium Conference (2005a)Google Scholar
  11. 11.
    Gordon, L., Loeb, M., Lucyshyn, W., Richardson, R.: Tenth Annual CSI/FBI Computer Crime and Security Survey (2005)Google Scholar
  12. 12.
    Woodward, J., Horn, C., Gatune, J., Thomas, A.: Biometrics: A Look at Facial Recognition, Santa Monica, CA (2003)Google Scholar
  13. 13.
    Nabti, M., Bouridane, A.: An effective and fast iris recognition system based on a combined multiscale feature extraction technique. Pattern Recognition 41(1), 868–879 (2008)CrossRefMATHGoogle Scholar
  14. 14.
    Markowitz, J.: The Many Roles of Speaker Classification in Speaker Verification and Identification. In: Müller, C. (ed.) Speaker Classification 2007. LNCS (LNAI), vol. 4343, pp. 218–225. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  15. 15.
    Adolph, M.: Biometric and Standards, International Telecommunication Union (2009)Google Scholar
  16. 16.
    Furnell, S., Evangelatosa, K.: Public awareness and perceptions of biometrics next term. Computer Fraud & Security 1, 8–13 (2007)CrossRefGoogle Scholar
  17. 17.
    Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Optical security and counterfeit deterrence techniques IV. In: Proceedings of SPIE, Japan, vol. 4677 (2002)Google Scholar
  18. 18.
    van der Putte, T., Keuning, J.: Biometrical Fingerprint Recognition Don’t Get Your Fingers Burned. In: Fourth Working Conference on Smart Card Research and Advanced Applications (2000)Google Scholar
  19. 19.
    Clarkson University, Clarkson University Engineer Outwits High-Tech Fingerprint Fraud (2005), (accessed July 15, 2009)
  20. 20.
    Kung, S., Mak, M., Lin, S.: Biometric Authentication: A Machine Learning Approach. Prentice Hall Information and System Sciences Series (2004)Google Scholar
  21. 21.
    Toth, B.: Biometric Liveness Detection. Infomation Security Bulletin 10, 291–297 (2005)Google Scholar
  22. 22.
    Schuckers, S.A.C.: Spoofing and anti-spoofing measures. Infomation Security Technical Report 7(4), 56–62 (2002)Google Scholar
  23. 23.
    Drahansky, M.: Liveness Detection in Biometrics. In: Advanced Biometric Technologies (2011)Google Scholar
  24. 24.
    Jain, A.K.: An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems fir Vudei Technology 14(1) (2004)Google Scholar
  25. 25.
    Biel, L., Pettersson, O., Philipson, L., Wide, P.: ECG analysis: A new approach in human identification. IEEE Trans. Instrum. 50(3), 808–812 (2001)CrossRefGoogle Scholar
  26. 26.
    Qureshi, M.K.: Liveness detcion of biomtric traits. International Journal of Information Technology and Knowledge Management 4(1), 293–295 (2011)Google Scholar
  27. 27.
    Johnson, P., Lazarick, R., Marasco, E., Newton, E., Ross, A., Schuckers, S.: Biometric Liveness Detection: Framework and Metrics. In: International Biometric Performance Conference (IBPC) (2012)Google Scholar
  28. 28.
    Hariri, S., Khargharia, B., Chen, H., Yang, J., Zhang, Y., Parashar, M., Liu, H.: The Autonomic Computing Paradigm. Cluster Computing 9, 5–17 (2006)CrossRefGoogle Scholar
  29. 29.
    Sterritt, R.: Autonomic computing. Innovations in Systems and Software Engineering 1(1), 79–88 (2005)CrossRefGoogle Scholar
  30. 30.
    Parashar, M., Hariri, S.: Autonomic Computing: An Overview. In: Banâtre, J.-P., Fradet, P., Giavitto, J.-L., Michel, O. (eds.) UPP 2004. LNCS, vol. 3566, pp. 257–269. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  31. 31.
    Kephart, J., Chess, D.: The vision of autonomic computing. IEEE Computer 6, 41–50 (2003)CrossRefGoogle Scholar
  32. 32.
    Agarwal, M., Bhat, V., Li, Z., Liu, H., Khargha, B., Khargharia, B., Matossian, V., Putty, V., Schmidt, C., Zhang, G., Hariri, S., Parashar, M.: AutoMate: Enabling Autonomic Applications on the Grid. In: Proceedings of the Autonomic Computing Workshop, 5th Annual International Active Middleware Services Workshop (AMS 2003), Seattle, WA, USA (2003)Google Scholar
  33. 33.
    Hinchey, M., Sterritt, R.: 99% (Biological) Inspiration... In: Proceedings of the Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems, EASE 2007, Washington, DC, USA (2007)Google Scholar
  34. 34.
    Tianfield, H., Unland, R.: Towards autonomic computing systems. Engineering Applications of Artificial Intelligence 17(7), 689–699 (2004)CrossRefGoogle Scholar
  35. 35.
    Murch, R.: Autonomic Computing. I pp. 0-20:25–40. Prentice-Hall (2004)Google Scholar
  36. 36.
    White, S., et al.: An architectural approach to autonomic computing. In: Proceedings International Conference on Autonomic Computing, New York (2004)Google Scholar
  37. 37.
    Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM Systems Journal 42(1), 5–18 (2003)CrossRefGoogle Scholar
  38. 38.
    Nami, R.M., Sharifi, M.: A Survey of Autonomic Computing Systems. Intelligent Infomation Processing III, pp. 101–110 (2007)Google Scholar
  39. 39.
    La, H.J., Kim, S.D.: A Practical Framework of Realizing Actuators for Autonomous Fault Management in SOA. In: World Conference on Services - I (2009)Google Scholar
  40. 40.
    Bhanu, B., Govindaraju, V.: Multibiometrics for Human Identification. Cambridge University Press, New York (2011)CrossRefGoogle Scholar
  41. 41.
    Ross, A.: Multibiometrics. In: Encylopedia of Biometrics, pp. 967–973. Springer (2012)Google Scholar
  42. 42.
    Hong, L., Jain, A.K., Pankanti, S.: Can multibiometrics improve performance. In: Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies (AutoID), New Jersey (1999)Google Scholar
  43. 43.
    Mitchell, H.B.: Multi-Sensor Data Fusion: An Introduction. Springer (2007)Google Scholar
  44. 44.
    Kiski, D., et al.: Biometrics sensor fusion. In: Thomas, C. (ed.) Sensor Fusion and its Applications, pp. 395–405. Sciyo (2010)Google Scholar
  45. 45.
    Singh, S., Gyaourova, G., Pavlidis, I.: Infrared and visible image fusion for face recognition. In: SPIE Defense and Security Symposium (2004)Google Scholar
  46. 46.
    Zhou, X., Bhanu, B.: Feature fusion of face and Gait for Human Recognition at a distance in video. In: International Conference on Pattern Recognition, Hongkong (2006)Google Scholar
  47. 47.
    Nandakumar, K., Chen, Y., Dass, S.C., Jain, A.K.: Likelihood Ratio-Based Biometric Score Fusion. IEEE Transactions on Pattern Analysis and Machine Intelligence 30(2), 342–347 (2008)CrossRefGoogle Scholar
  48. 48.
    Monwar, M., Gavrilova, M.L.: Multimodal Biometric System Using Rank-Level Fusion Approach. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 39(4), 867–878 (2009)CrossRefGoogle Scholar
  49. 49.
    Prabhakar, S., Jain, A.K.: Decision-level fusion in fingerprint verification. Pattern Recognition 35, 861–874 (2002)CrossRefMATHGoogle Scholar
  50. 50.
    Choundhury, T., Kanaujia, A., Li, Z., Metaxas, D.: Multimodal person recognition using unconstrained audio and video. In: International Conference on Audio- and Video-Based Biometric Person Authentication, Washington, DC (1999)Google Scholar
  51. 51.
    Pan, G., Wu, Z., Sun, L.: Liveness Detection for Face Recognition. In: Delac, K., Grgic, M., Steward Bartlett, M. (eds.) Recent Advances in Face Recognition, p. 236. I-Tech, Vienna (2008)Google Scholar
  52. 52.
    Jee, H., Jung, S., Yoo, J.: Liveness detection for embedded face recognition system. World Academy of Science, Engineering and Technology 18 (2008)Google Scholar
  53. 53.
    Thalheim, L., Krissler, J.: Body Check: Biometric access protection devices and thier programs put to the test (2002)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Peter Matthew
    • 1
  • Mark Anderson
    • 1
  1. 1.Department of ComputingEdge Hill UniversityOrmskirkUK

Personalised recommendations