Cargando…
Reinforced Palmprint Reconstruction Attacks in Biometric Systems
Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in th...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8781289/ https://www.ncbi.nlm.nih.gov/pubmed/35062552 http://dx.doi.org/10.3390/s22020591 |
_version_ | 1784638055221559296 |
---|---|
author | Sun, Yue Leng, Lu Jin, Zhe Kim, Byung-Gyu |
author_facet | Sun, Yue Leng, Lu Jin, Zhe Kim, Byung-Gyu |
author_sort | Sun, Yue |
collection | PubMed |
description | Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in the database of a biometric system can possibly be leaked, and then used to reconstruct a fake image to fool the biometric system. As such, many reconstruction attacks have been proposed, yet unsatisfactory naturalness, poor visual quality or incompleteness remains as major limitations. Thus, two reinforced palmprint reconstruction attacks are proposed. Any palmprint image, which can be easily obtained, is used as the initial image, and the region of interest is iteratively modified with deep reinforcement strategies to reduce the matching distance. In the first attack, Modification Constraint within Neighborhood (MCwN) limits the modification extent and suppresses the reckless modification. In the second attack, Batch Member Selection (BMS) selects the significant pixels (SPs) to compose the batch, which are simultaneously modified to a slighter extent to reduce the matching number and the visual-quality degradation. The two reinforced attacks can satisfy all the requirements, which cannot be simultaneously satisfied by the existing attacks. The thorough experiments demonstrate that the two attacks have a highly successful attack rate for palmprint systems based on the most state-of-the-art coding-based methods. |
format | Online Article Text |
id | pubmed-8781289 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-87812892022-01-22 Reinforced Palmprint Reconstruction Attacks in Biometric Systems Sun, Yue Leng, Lu Jin, Zhe Kim, Byung-Gyu Sensors (Basel) Article Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in the database of a biometric system can possibly be leaked, and then used to reconstruct a fake image to fool the biometric system. As such, many reconstruction attacks have been proposed, yet unsatisfactory naturalness, poor visual quality or incompleteness remains as major limitations. Thus, two reinforced palmprint reconstruction attacks are proposed. Any palmprint image, which can be easily obtained, is used as the initial image, and the region of interest is iteratively modified with deep reinforcement strategies to reduce the matching distance. In the first attack, Modification Constraint within Neighborhood (MCwN) limits the modification extent and suppresses the reckless modification. In the second attack, Batch Member Selection (BMS) selects the significant pixels (SPs) to compose the batch, which are simultaneously modified to a slighter extent to reduce the matching number and the visual-quality degradation. The two reinforced attacks can satisfy all the requirements, which cannot be simultaneously satisfied by the existing attacks. The thorough experiments demonstrate that the two attacks have a highly successful attack rate for palmprint systems based on the most state-of-the-art coding-based methods. MDPI 2022-01-13 /pmc/articles/PMC8781289/ /pubmed/35062552 http://dx.doi.org/10.3390/s22020591 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Sun, Yue Leng, Lu Jin, Zhe Kim, Byung-Gyu Reinforced Palmprint Reconstruction Attacks in Biometric Systems |
title | Reinforced Palmprint Reconstruction Attacks in Biometric Systems |
title_full | Reinforced Palmprint Reconstruction Attacks in Biometric Systems |
title_fullStr | Reinforced Palmprint Reconstruction Attacks in Biometric Systems |
title_full_unstemmed | Reinforced Palmprint Reconstruction Attacks in Biometric Systems |
title_short | Reinforced Palmprint Reconstruction Attacks in Biometric Systems |
title_sort | reinforced palmprint reconstruction attacks in biometric systems |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8781289/ https://www.ncbi.nlm.nih.gov/pubmed/35062552 http://dx.doi.org/10.3390/s22020591 |
work_keys_str_mv | AT sunyue reinforcedpalmprintreconstructionattacksinbiometricsystems AT lenglu reinforcedpalmprintreconstructionattacksinbiometricsystems AT jinzhe reinforcedpalmprintreconstructionattacksinbiometricsystems AT kimbyunggyu reinforcedpalmprintreconstructionattacksinbiometricsystems |