Enrolment stage
Document
identification
A passenger presents
his/her genuine travel
document in the expected
way
An attacker presents a manipulated travel document (case not
considered here)
Biometric verification
(chip sample vs. live
enrolment sample)
A passenger presents
his/her genuine biometric
features in the expected
way
EPA: An attacker tries to cheat
the enrolment system with
someone else’s biometric
features, with manipulated
biometric features or is not
collaborative with the system
EPA + VPA: An attacker
cheats the enrolment system
with someone else’s biometric
features, with manipulated
biometric features or is not
collaborative with the system,
and does it succesfully. Then
the attacker tries to repeat the
attack with the verification
system.
Verification stage
Biometric verification
(live enrolment
sample vs. live check
sample)
A passenger presents
his/her biometric features
in the expected way
VPA: After a bona fide
enrolment made by a
passenger, an attacker tries to
cheat the verification system
with someone else’s biometric
features, with manipulated
biometrics features or is not
collaborative with the system
three different presentation attacks:
Enrolment PA (EPA), when a presentation attack
occurs at the self-enrolment stage. For example,
an attacker provides the system with
documentation that belongs to someone else and
therefore tries to impersonate the true holder of
the documents.
Verification PA (VPA), when a presentation
attack occurs at the verification stage. An attacker
tries to impersonate a traveller who has previously
enrolled the system. For example, a correctly
registered traveller loses or is stolen his/her
documents between the self-stage and the
verification stage. Then an attacker uses those
documents to try to pass the verification.
Enrolment and Verification PA (EPA + VPA). In
this case, an impersonation has occurred at the
enrolment and the attacker continues
impersonating the true traveller at the verification
stage (double attack). For example, an attacker
presents travel documentation that belongs to
someone else and gets successfully enrolled. After
that, in the verification stage the attacker
continues to impersonate the true holder of the
documents in order to cross the e-gate.
These three possible scenarios complicate the
evaluation of the PAD subsystem (see Table 1).
3 EXPERIMENTAL SETUP
A pilot experience was performed at the Adolfo
Suárez Madrid-Barajas Airport T4-S international
arrivals terminal in December 2016. This airport,
which serves the capital of Spain and the centre of the
Iberian peninsula, is the busiest airport in Spain, the
fifth one in Europe and the 24th one worldwide
regarding passenger traffic. In 2015 it reached an
amount of almost 47 million passengers (ACI, 2016).
As we said above, ABC4EU systems capture the
fingerprint and an image of the face in the biometric
subsystem. Some studies have focused on fingerprint
recognition for these types of systems like Donida
Labati et al. (2016), but in our experiments, we have
focused on facial recognition for two reasons. On the
one hand, the face image is the only biometric
reference which is compulsorily present in all
passports in the world (in the Schengen zone also the
fingerprints of the left hand). And on the other hand,
the face is a feature that, in case of a false negative
system response, an agent can always contrast the
information with an easy visual inspection.
With our tests, we have analysed the attacks at the
self-enrolment stage (ESA) and at the verification
stage (VSA), both in isolation.
For the enrolment, the original passports have
always been used and all the PAIs have been built
with features of 9 people, who are also the owners of
those passports. Thus, a bona fide presentation (chip
sample) is cross-matched against one bona fide
presentation (enrolment live sample) and against 6
attacks with different PAIs.
At the verification, only those cases where the
enrolment has been made with a bona fide
presentation are used. In this way, a bona fide
presentation (enrolment live sample) is cross-
matched against one bona fide presentation
(verification live sample) and against 6 attacks with
different PAIs.