Adversarial attacks on fingerprint liveness detection

被引:26
作者
Fei, Jianwei [1 ]
Xia, Zhihua [1 ]
Yu, Peipeng [1 ]
Xiao, Fengjun [2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing 210044, Peoples R China
[2] Hangzhou Dianzi Univ, 1,2nd St Jianggan Dist, Hangzhou, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Deep learning; Fingerprint liveness detection; Adversarial attacks;
D O I
10.1186/s13640-020-0490-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical conditions. A typical example is the fingerprint liveness detection module in fingerprint authentication systems. Inspired by great progress of deep learning, deep networks-based fingerprint liveness detection algorithms spring up and dominate the field. Thus, we investigate the feasibility of deceiving state-of-the-art deep networks-based fingerprint liveness detection schemes by leveraging this property in this paper. Extensive evaluations are made with three existing adversarial methods: FGSM, MI-FGSM, and Deepfool. We also proposed an adversarial attack method that enhances the robustness of adversarial fingerprint images to various transformations like rotations and flip. We demonstrate these outstanding schemes are likely to classify fake fingerprints as live fingerprints by adding tiny perturbations, even without internal details of their used model. The experimental results reveal a big loophole and threats for these schemes from a view of security, and enough attention is urgently needed to be paid on anti-adversarial not only in fingerprint liveness detection but also in all deep learning applications.
引用
收藏
页数:11
相关论文
共 43 条
[1]  
[Anonymous], NIPS 17 COMPETITION
[2]  
[Anonymous], 2019, IEEE T EVOLUTIONARY
[3]  
[Anonymous], IEEE T SERVICES COMP
[4]  
[Anonymous], WIRELESS COMMUNICATI
[5]  
[Anonymous], 2014 IEEE WORKSH BIO
[6]  
[Anonymous], 2013, INT C MACHINE LEARNI
[7]  
[Anonymous], 2004, Practical Methods of Optimization
[8]  
[Anonymous], INT JOINT C BIOM FIN
[9]  
[Anonymous], IEEE T SYSTEMS MAN C
[10]  
[Anonymous], 2018, ADVERSARIAL ATTACKS