Geometrical Analysis of Machine Learning Security in Biometric Authentication Systems

被引:23
|
作者
Sadeghi, Koosha [1 ]
Banerjee, Ayan [1 ]
Sohankar, Javad [1 ]
Gupta, Sandeep K. S. [1 ]
机构
[1] Arizona State Univ, CIDSE, iMPACT Lab, Tempe, AZ 85287 USA
来源
2017 16TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA) | 2017年
关键词
machine learning; security; geometrical analysis; BRAIN-COMPUTER INTERFACE; DIVERGENCE ESTIMATION;
D O I
10.1109/ICMLA.2017.0-142
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Feature extraction and Machine Learning (ML) techniques are required to reduce high variability of biometric data in Biometric Authentication Systems (BAS) toward improving system utilization (acceptance of legitimate subjects). However, reduction in data variability, also decreases the adversary's effort in manufacturing legitimate biometric data to break the system (security strength). Typically for BAS design, security strength is evaluated through variability analysis on data, regardless of feature extraction and ML, which are essential for accurate evaluation. In this research, we provide a geometrical method to measure the security strength in HAS, which analyzes the effects of feature extraction and ML on the biometric data. Using the proposed method, we evaluate the security strength of five state-of-the-art electroencephalogram based authentication systems, on data from 106 subjects, and the maximum achievable security strength is 83 bits.
引用
收藏
页码:309 / 314
页数:6
相关论文
共 50 条
  • [41] Machine Learning Techniques for Security of Internet of Things (IoT) and Fog Computing Systems
    Moh, Melody
    Raju, Robinson
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 709 - 715
  • [42] Authentication and Identification Methods Used in Keystroke Biometric Systems
    Ali, Md Liakat
    Tappert, Charles C.
    Qiu, Meikang
    Monaco, John V.
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1424 - 1429
  • [43] Application of New Alteration Attack on Biometric Authentication Systems
    Lafkih, Maryam
    Lacharme, Patrick
    Rosenberger, Cristophe
    Mikram, Mounia
    Ghouzali, Sanaa
    El Haziti, Mohammed
    Abdul, Wadood
    Aboutajdine, Driss
    2015 FIRST INTERNATIONAL CONFERENCE ON ANTI-CYBERCRIME (ICACC), 2015, : 96 - 100
  • [44] Security Engineering with Machine Learning for Adversarial Resiliency in Mobile Cyber Physical Systems
    Olowononi, Felix O.
    Rawat, Danda B.
    Garuba, Moses
    Kamhoua, Charles
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS, 2019, 11006
  • [45] Wolf Attack: Algorithmic Vulnerability in Biometric Authentication Systems
    Otsuka, Akira
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING (ICBAKE), 2013, : 309 - 313
  • [46] A Framework for Multimodal Biometric Authentication Systems With Template Protection
    Goh, Zheng Hui
    Wang, Yandan
    Leng, Lu
    Liang, Shiuan-Ni
    Jin, Zhe
    Lai, Yen-Lung
    Wang, Xin
    IEEE ACCESS, 2022, 10 : 96388 - 96402
  • [47] Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems
    Jadidi, Zahra
    Pal, Shantanu
    Nayak, Nithesh K.
    Selvakkumar, Arawinkumaar
    Chang, Chih-Chia
    Beheshti, Maedeh
    Jolfaei, Alireza
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [48] Analysis of the Security and Reliability of Cryptocurrency Systems Using Knowledge Discovery and Machine Learning Methods
    Shahbazi, Zeinab
    Byun, Yung-Cheol
    SENSORS, 2022, 22 (23)
  • [49] Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches
    Kotenko, Igor
    Izrailov, Konstantin
    Buinevich, Mikhail
    SENSORS, 2022, 22 (04)
  • [50] A New Approach to Security Analysis of Smart Home Authentication Systems
    Zhang, Miao
    Wang, Chenyu
    Wang, Jiteng
    Tian, Si
    Li, Yanwei
    FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 153 - 165