Generative Adversarial Attacks on Fingerprint Recognition Systems

被引:6
作者
Kwon, Hee Won [1 ]
Nam, Jea-Won [2 ]
Kim, Joongheon [3 ]
Lee, Youn Kyu [1 ]
机构
[1] Seoul Womens Univ, Dept Informat Secur, Seoul, South Korea
[2] Seoul Natl Univ Sci & Tech, Dept Elect Engn, Seoul, South Korea
[3] Korea Univ, Sch Elect Engn, Seoul, South Korea
来源
35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021) | 2021年
基金
新加坡国家研究基金会;
关键词
deep learning; adversarial attack; fingerprint recognition;
D O I
10.1109/ICOIN50884.2021.9333904
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a recent distribution of mobile and fintech systems, user authentication via biometric recognition has been widely used. Specifically, deep learning-based fingerprint recognition methods became popular due to their high accuracy in fingerprint liveness detection. However, existing deep learning-based approaches contain inherent vulnerabilities such as adversarial attack. In this paper, we propose a new method for generative adversarial attack on fingerprint recognition systems. Our method generates fingerprint images which effectively break existing deep learning-based fingerprint recognition systems while maintaining real-looking appearance of target fingerprints.
引用
收藏
页码:483 / 485
页数:3
相关论文
共 10 条
[1]  
Nguyen A, 2015, PROC CVPR IEEE, P427, DOI 10.1109/CVPR.2015.7298640
[2]  
[Anonymous], 2016, P 29 IEEE C COMPUTER
[3]  
Goodfellow Ian J., 2014, INT C LEARNING REPRE
[4]   DeepFool: a simple and accurate method to fool deep neural networks [J].
Moosavi-Dezfooli, Seyed-Mohsen ;
Fawzi, Alhussein ;
Frossard, Pascal .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :2574-2582
[5]   Fingerprint Liveness Detection Using Convolutional Neural Networks [J].
Nogueira, Rodrigo Frassetto ;
Lotufo, Roberto de Alencar ;
Machado, Rubens Campos .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1206-1213
[6]  
Nougueira RF., 2014, IEEE WORKSH BIOM MEA
[7]  
Szegedy C., 2013, ARXIV13121699
[8]  
Weonjin K., 2017, J KOREA I INFORM SEC
[9]  
Zhang Y., 2016, CHIN C BIOM REC
[10]   Deep Learning Hash for Wireless Multimedia Image Content Security [J].
Zheng, Yu ;
Zhu, Jiezhong ;
Fang, Wei ;
Chi, Lian-Hua .
SECURITY AND COMMUNICATION NETWORKS, 2018,