Defending Against Adversarial Fingerprint Attacks Based on Deep Image Prior

被引:1
作者
Yoo, Hwajung [1 ]
Hong, Pyo Min [1 ]
Kim, Taeyong [1 ]
Yoon, Jung Won [1 ]
Lee, Youn Kyu [1 ]
机构
[1] Hongik Univ, Dept Comp Engn, Seoul 04066, South Korea
基金
新加坡国家研究基金会;
关键词
Adversarial attack defense; image reconstruction; fingerprint authentication system; deep learning; denoising; deep image prior; DEFENSE;
D O I
10.1109/ACCESS.2023.3299862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, deep learning-based biometric authentication systems, especially fingerprint authentication, have been used widely in real-world. However, these systems are vulnerable to adversarial attacks which prevent deep learning models from distinguishing input data properly. To solve these problems, various defense methods have been proposed, especially utilizing denoising mechanisms, but they provided limited defense performance. In this study, we proposed a new defense method against adversarial fingerprint attacks. To ensure defense performance, we have introduced Deep Image Prior mechanism which has superior performance in image reconstruction without prior training and a large amount of dataset. The proposed method aims to remove adversarial perturbations of the input fingerprint image and reconstruct it close to the original fingerprint image by adapting Deep Image Prior. Our method has achieved robust defense performance against various types of adversarial fingerprint attacks across different datasets, encompassing variations in sensors, shapes, and materials of fingerprint images. Furthermore, our method has demonstrated that it is superior to other image reconstruction methods.
引用
收藏
页码:78713 / 78725
页数:13
相关论文
共 46 条
[1]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[2]  
[Anonymous], 2015, Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on, DOI DOI 10.1109/BTAS.2015.7358776
[3]   A non-local algorithm for image denoising [J].
Buades, A ;
Coll, B ;
Morel, JM .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 2, PROCEEDINGS, 2005, :60-65
[4]   Non-Local Means Denoising [J].
Buades, Antoni ;
Coll, Bartomeu ;
Morel, Jean-Michel .
IMAGE PROCESSING ON LINE, 2011, 1 :208-212
[5]   Adversarial Attack and Defense on Deep Neural Network-Based Voice Processing Systems: An Overview [J].
Chen, Xiaojiao ;
Li, Sheng ;
Huang, Hao .
APPLIED SCIENCES-BASEL, 2021, 11 (18)
[6]   Image denoising by sparse 3-D transform-domain collaborative filtering [J].
Dabov, Kostadin ;
Foi, Alessandro ;
Katkovnik, Vladimir ;
Egiazarian, Karen .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2007, 16 (08) :2080-2095
[7]   Deep image prior based defense against adversarial examples [J].
Dai, Tao ;
Feng, Yan ;
Chen, Bin ;
Lu, Jian ;
Xia, Shu-Tao .
PATTERN RECOGNITION, 2022, 122
[8]   Efficient Decision-based Black-box Adversarial Attacks on Face Recognition [J].
Dong, Yinpeng ;
Su, Hang ;
Wu, Baoyuan ;
Li, Zhifeng ;
Liu, Wei ;
Zhang, Tong ;
Zhu, Jun .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :7706-7714
[9]  
Thang DD, 2020, Arxiv, DOI arXiv:2003.02750
[10]   Adversarial attacks on fingerprint liveness detection [J].
Fei, Jianwei ;
Xia, Zhihua ;
Yu, Peipeng ;
Xiao, Fengjun .
EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)