Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack

Hanrui Wang, Xingbo Dong, Zhe Jin, A. Teoh, M. Tistarelli
{"title":"Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack","authors":"Hanrui Wang, Xingbo Dong, Zhe Jin, A. Teoh, M. Tistarelli","doi":"10.1109/WACVW52041.2021.00012","DOIUrl":null,"url":null,"abstract":"In cancellable biometrics (CB) schemes, template security is achieved by applying, mainly non-linear, transformations to the biometric template. The transformation is designed to preserve the template distance/similarity in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB are underestimated. Dong et al. [BTAS’19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that are generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong’s genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We interpret the effectiveness of CSA from the supervised learning perspective. We identify such constraints then conduct extensive experiments to demonstrate CSA against CB with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing and BioHashing security, and outperforms GASA significantly. Inferring from the above results, we further remark that, other than IoM and BioHashing, CSA is critical to other CB schemes as far as the constraints can be formulated. Furthermore, we reveal the correlation of hash code size and the attack performance of CSA.","PeriodicalId":313062,"journal":{"name":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WACVW52041.2021.00012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

In cancellable biometrics (CB) schemes, template security is achieved by applying, mainly non-linear, transformations to the biometric template. The transformation is designed to preserve the template distance/similarity in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB are underestimated. Dong et al. [BTAS’19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that are generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong’s genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We interpret the effectiveness of CSA from the supervised learning perspective. We identify such constraints then conduct extensive experiments to demonstrate CSA against CB with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing and BioHashing security, and outperforms GASA significantly. Inferring from the above results, we further remark that, other than IoM and BioHashing, CSA is critical to other CB schemes as far as the constraints can be formulated. Furthermore, we reveal the correlation of hash code size and the attack performance of CSA.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用约束优化的基于相似性攻击的可取消生物特征的可解释安全性分析
在可取消生物识别(CB)方案中,模板安全性主要是通过对生物识别模板进行非线性转换来实现的。该转换被设计为在转换域中保持模板距离/相似性。尽管它很有效,但由于相似度保持特性所带来的安全问题被低估了。Dong等[BTAS ' 19]利用了CB的相似度保持特性,提出了一种基于相似度的攻击,攻击成功率高。基于相似性的攻击利用从受保护的生物识别模板生成的预映像进行模拟并执行交叉匹配。在本文中,我们提出了一种基于约束优化的基于相似度攻击(CSA),它是在Dong的遗传算法支持的基于相似度攻击(GASA)的基础上改进的。CSA应用算法特定的等式或不等式关系作为约束,以优化预图像生成。我们从监督学习的角度来解释CSA的有效性。我们确定了这些约束,然后进行了广泛的实验,用LFW人脸数据集证明了CSA对CB的影响。结果表明,CSA能够有效地攻破iohashing和BioHashing的安全性,并且显著优于gaa。从上述结果推断,我们进一步指出,除了IoM和BioHashing之外,只要约束可以制定,CSA对其他CB方案至关重要。此外,我们还揭示了哈希码大小与CSA攻击性能的相关性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Automatic Virtual 3D City Generation for Synthetic Data Collection Facial Expression Neutralization With StoicNet Explainable Fingerprint ROI Segmentation Using Monte Carlo Dropout An Explainable Attention-Guided Iris Presentation Attack Detector Geeks and guests: Estimating player’s level of experience from board game behaviors
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1