skip to main content
10.1145/2523649.2523666acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Seeing is not believing: visual verifications through liveness analysis using mobile devices

Published:09 December 2013Publication History

ABSTRACT

The visual information captured with camera-equipped mobile devices has greatly appreciated in value and importance as a result of their ubiquitous and connected nature. Today, banking customers expect to be able to deposit checks using mobile devices, and broadcasting videos from camera phones uploaded by unknown users is admissible on news networks. We present Movee, a system that addresses the fundamental question of whether the visual stream coming into a mobile app from the camera of the device can be trusted to be un-tampered with, live data, before it can be used for a variety of purposes.

Movee is a novel approach to video liveness analysis for mobile devices. It is based on measuring the consistency between the data from the accelerometer sensor and the inferred motion from the captured video. Contrary to existing algorithms, Movee has the unique strength of not depending on the audio track. Our experiments on real user data have shown that Movee achieves 8% Equal Error Rate.

References

  1. Arxan: Protecting the App Economy. http://www.arxan.com/.Google ScholarGoogle Scholar
  2. Chicago Works. http://www.chicagoworksapp.com/.Google ScholarGoogle Scholar
  3. Kickstarter. http://www.kickstarter.com/.Google ScholarGoogle Scholar
  4. NYC 311: Pothole or Other Street Surface Complaint. http://www.nyc.gov/apps/311/allServices.htm?requestType=topService&serviceName=Pothole+or+Other+Street+Surface+Complaint.Google ScholarGoogle Scholar
  5. Open Source Computer Vision. http://opencv.org/.Google ScholarGoogle Scholar
  6. Optical mouse. https://en.wikipedia.org/wiki/Optical_mouse.Google ScholarGoogle Scholar
  7. Root and Me. https://play.google.com/store/apps/details?id=com.iamjake.root&hl=en.Google ScholarGoogle Scholar
  8. Sensor Delay. http://developer.android.com/reference/android/hardware/SensorManager.html.Google ScholarGoogle Scholar
  9. Unlock Root. http://www.unlockroot.com/.Google ScholarGoogle Scholar
  10. Vine. http://vine.co/.Google ScholarGoogle Scholar
  11. Weka. http://www.cs.waikato.ac.nz/ml/weka/.Google ScholarGoogle Scholar
  12. XPrivacy 1.9.5: The ultimate privacy manager. http://forum.xda-developers.com/showthread.php?t=2320783.Google ScholarGoogle Scholar
  13. YouTube. http://www.youtube.com.Google ScholarGoogle Scholar
  14. A. Ali, F. Deravi, and S. Hoque. Liveness detection using gaze collinearity. In Emerging Security Technologies (EST), pages 62--65, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Anjos and S. Marcel. Counter-measures to photo attacks in face recognition: A public database and a baseline. In Biometrics (IJCB), pages 1--7, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Breiman. Random forests. Machine Learning, 45:5--32, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Capkun, K. B. Rasmussen, M. Cagalj, and M. B. Srivastava. Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput., 7(4):470--483, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Chetty. Biometric liveness detection based on cross modal fusion. In Information Fusion, 2009. FUSION '09. 12th International Conference on, pages 2255--2262, July.Google ScholarGoogle Scholar
  19. G. Chetty and M. Wagner. Multi-level liveness verification for face-voice biometric authentication. In Biometric Symposium, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  20. D. Clifford and G. Stone. Variable penalty dynamic time warping code for aligning mass spectrometry chromatograms in r. Journal of Statistical Software, 47(8):1--17, 4 2012.Google ScholarGoogle ScholarCross RefCross Ref
  21. I. Coope. Circle fitting by linear and nonlinear least squares. Journal of Optimization Theory and Applications, 76:381--388, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. J. Davison, I. D. Reid, N. D. Molton, and O. Stasse. Monoslam: Real-time single camera slam. IEEE Trans. Pattern Anal. Mach. Intell., 29(6):1052--1067, June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. De Castro and C. Morandi. Registration of translated and rotated images using finite fourier transforms. IEEE Trans. Pattern Anal. Mach. Intell., 9(5):700--703, May 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. B. J. Fourier and A. Freeman. The Analytical Theory of Heat. Cambridge University Press, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  25. R. Frischholz and U. Dieckmann. Bioid: A multimodal biometric identification system. IEEE Computer, 33(2):64--68, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. I. Gallant. Perceptron-based learning algorithms. Trans. Neur. Netw., 1(2):179--191, June 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. F. Hildebrand. Introduction to numerical analysis: 2nd edition. Dover Publications, Inc., 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. G. Hong, A. Rahmati, Y. Wang, and L. Zhong. Sensecoding: accelerometer-assisted motion estimation for efficient video encoding. MM '08, pages 749--752. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. P. Indyk, G. Iyengar, and N. Shivakumar. Finding pirated video sequences on the internet. Technical report, Stanford University, 1999.Google ScholarGoogle Scholar
  30. R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. pages 1137--1143, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. K. Kollreider, H. Fronthaler, and J. Bigün. Non-intrusive liveness detection by face images. Image Vision Comput., 27(3):233--244, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S.-M. Makela, and H. Ailisto. Identifying users of portable devices from gait pattern with accelerometers. In ICASSP '05, volume 2, pages ii/973--ii/976 Vol. 2, March.Google ScholarGoogle Scholar
  33. F. Moiz, D. Leon-Salas, and Y. Lee. A wearable motion tracker. BodyNets '10, pages 214--219. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Mãijller. Dynamic time warping. In Information Retrieval for Music and Motion, pages 69--84. Springer Berlin Heidelberg, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  35. G. Pan, L. Sun, Z. Wu, and S. Lao. Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In ICCV 2007., pages 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  36. G.-t. Park, H. Wang, and Y.-s. Moon. Liveness detection method and apparatus of video image, August 2007.Google ScholarGoogle Scholar
  37. T. Pylvänäinen. Accelerometer based gesture recognition using continuous hmms. IbPRIA'05, pages 639--646. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. A. Shabtai, Y. Fledel, and Y. Elovici. Securing android-powered mobile devices using selinux. Security Privacy, IEEE, 8(3):36--44, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. J. Six. Application Security for the Android Platform: Processes, Permissions, and Other Safeguards. O'Reilly, 2011.Google ScholarGoogle Scholar
  40. J. O. Smith. Spectral Audio Signal Processing. W3K Publishing, 2011. online book.Google ScholarGoogle Scholar
  41. N. P. H. Thian and S. Bengio. Evidences of equal error rate reduction in biometric authentication fusion, 2004.Google ScholarGoogle Scholar
  42. L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. Captcha: Using hard ai problems for security. In In Proceedings of EUROCRYPT, pages 294--311. Springer-Verlag, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Wikipedia. http://en.wikipedia.org/wiki/Receiver_operating_characteristic.Google ScholarGoogle Scholar

Index Terms

  1. Seeing is not believing: visual verifications through liveness analysis using mobile devices

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
          December 2013
          374 pages
          ISBN:9781450320153
          DOI:10.1145/2523649

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 December 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate104of497submissions,21%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader