کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
530404 869765 2014 15 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Masquerade attack on transform-based binary-template protection based on perceptron learning
ترجمه فارسی عنوان
حمله تهاجمی به حفاظت داینامیک مبتنی بر تبدیل مبتنی بر یادگیری پیش فرض
کلمات کلیدی
حمله پنهان، دودویی، حفاظت از الگو، یادگیری پرایسترن
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر چشم انداز کامپیوتر و تشخیص الگو
چکیده انگلیسی


• We propose masquerade attacks to violate the security of transform-based binary template protection schemes.
• We identify two different attacking scenarios and develop a perceptron-learning-based attack for each.
• Our attack algorithms allow offline iterative processing in the generation of synthetic biometric image.
• We obtain very encouraging empirical results for our attack algorithms on two benchmark face datasets.

With the increasing deployment of biometric systems, security of the biometric systems has become an essential issue to which serious attention has to be given. To prevent unauthorized access to a biometric system, protection has to be provided to the enrolled biometric templates so that if the database is compromised, the stored information will not enable any adversary to impersonate the victim in gaining an illegal access. In the past decade, transform-based template protection that stores binary one-way-transformed templates (e.g. Biohash) has appeared being one of the benchmark template protection techniques. While the security of such approach lies in the non-invertibility of the transform (e.g. given a transformed binary template, deriving the corresponding face image is infeasible), we will prove in this paper that, irrespective of whether the algorithm of transform-based approach is revealed, a synthetic face image can be constructed from the binary template and the stolen token (storing projection and discretization parameters) to obtain a highly-probable positive authentication response. Our proposed masquerade attack algorithms are mainly composed of a combination of perceptron learning and customized hill climbing algorithms. Experimental results show that our attack algorithms achieve very promising results where the best setting of our attack achieves 100% and 98.3% rank one recognition rates for the CMU PIE and FRGC databases correspondingly when the binarization algorithm (transformation plus discretization) is known; and 85.29% and 46.57% rank one recognition rates for the CMU PIE and FRGC databases correspondingly when the binarization algorithm is unknown.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Pattern Recognition - Volume 47, Issue 9, September 2014, Pages 3019–3033
نویسندگان
, , ,