A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics

被引:35
作者
Dong, Xingbo [1 ]
Jin, Zhe [1 ]
Jin, Andrew Teoh Beng [2 ]
机构
[1] Monash Univ Malaysia, Sch Informat Technol, Subang Jaya 46150, Malaysia
[2] Yonsei Univ, Sch Elect & Elect Engn, Seoul, South Korea
来源
2019 IEEE 10TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS) | 2019年
关键词
TEMPLATE PROTECTION; CANCELABLE BIOMETRICS; RECONSTRUCTION; QUANTIZATION;
D O I
10.1109/btas46853.2019.9185997
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cancellable biometrics (CB) as a means for biometric template protection approach refers to an irreversible yet similarity preserving transformation on the original template. With similarity preserving property, the matching between template and query instance can be performed in the transform domain without jeopardizing accuracy performance. Unfortunately, this trait invites a class of attack, namely similarity-based attack (SA). SA produces a preimage, an inverse of transformed template, which can be exploited for impersonation and cross-matching. In this paper, we propose a Genetic Algorithm enabled similarity-based attack framework (GASAF) to demonstrate that CB schemes whose possess similarity preserving property are highly vulnerable to similarity-based attack. Besides that, a set of new metrics is designed to measure the effectiveness of the similarity-based attack. We conduct the experiment on two representative CB schemes, i.e. BioHashing and Bloom-filter. The experimental results attest the vulnerability under this type of attack.
引用
收藏
页数:8
相关论文
共 24 条
[1]  
[Anonymous], 2003, MATLAB SOURCE CODE B
[2]  
[Anonymous], P IEEE, V94, P1927
[3]   Learning Fingerprint Reconstruction: From Minutiae to Image [J].
Cao, Kai ;
Jain, Anil K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :104-117
[4]  
Chandra E., 2011, 2011 3rd International Conference on Electronics Computer Technology (ICECT 2011), P15, DOI 10.1109/ICECTECH.2011.5941948
[5]   Deep Secure Quantization: On secure biometric hashing against similarity-based attacks [J].
Chen, Yanzhi ;
Wo, Yan ;
Xie, Renjie ;
Wu, Chudan ;
Han, Guoqiang .
SIGNAL PROCESSING, 2019, 154 :314-323
[6]  
Deng JK, 2019, Arxiv, DOI [arXiv:1801.07698, DOI 10.1109/CVPR.2019.00482]
[7]   Masquerade attack on transform-based binary-template protection based on perceptron learning [J].
Feng, Yi C. ;
Lim, Meng-Hui ;
Yuen, Pong C. .
PATTERN RECOGNITION, 2014, 47 (09) :3019-3033
[8]   Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms [J].
Galbally, Javier ;
Ross, Arun ;
Gomez-Barrero, Marta ;
Fierrez, Julian ;
Ortega-Garcia, Javier .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2013, 117 (10) :1512-1525
[9]   Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters [J].
Gomez-Barrero, Marta ;
Rathgeb, Christian ;
Galbally, Javier ;
Fierrez, Julian ;
Busch, Christoph .
2014 22ND INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2014, :4483-4488
[10]  
Huang GB, 2008, WORKSH FAC REAL LIF