Cargando…

Reinforced Palmprint Reconstruction Attacks in Biometric Systems

Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in th...

Descripción completa

Detalles Bibliográficos
Autores principales: Sun, Yue, Leng, Lu, Jin, Zhe, Kim, Byung-Gyu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8781289/
https://www.ncbi.nlm.nih.gov/pubmed/35062552
http://dx.doi.org/10.3390/s22020591
_version_ 1784638055221559296
author Sun, Yue
Leng, Lu
Jin, Zhe
Kim, Byung-Gyu
author_facet Sun, Yue
Leng, Lu
Jin, Zhe
Kim, Byung-Gyu
author_sort Sun, Yue
collection PubMed
description Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in the database of a biometric system can possibly be leaked, and then used to reconstruct a fake image to fool the biometric system. As such, many reconstruction attacks have been proposed, yet unsatisfactory naturalness, poor visual quality or incompleteness remains as major limitations. Thus, two reinforced palmprint reconstruction attacks are proposed. Any palmprint image, which can be easily obtained, is used as the initial image, and the region of interest is iteratively modified with deep reinforcement strategies to reduce the matching distance. In the first attack, Modification Constraint within Neighborhood (MCwN) limits the modification extent and suppresses the reckless modification. In the second attack, Batch Member Selection (BMS) selects the significant pixels (SPs) to compose the batch, which are simultaneously modified to a slighter extent to reduce the matching number and the visual-quality degradation. The two reinforced attacks can satisfy all the requirements, which cannot be simultaneously satisfied by the existing attacks. The thorough experiments demonstrate that the two attacks have a highly successful attack rate for palmprint systems based on the most state-of-the-art coding-based methods.
format Online
Article
Text
id pubmed-8781289
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87812892022-01-22 Reinforced Palmprint Reconstruction Attacks in Biometric Systems Sun, Yue Leng, Lu Jin, Zhe Kim, Byung-Gyu Sensors (Basel) Article Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in the database of a biometric system can possibly be leaked, and then used to reconstruct a fake image to fool the biometric system. As such, many reconstruction attacks have been proposed, yet unsatisfactory naturalness, poor visual quality or incompleteness remains as major limitations. Thus, two reinforced palmprint reconstruction attacks are proposed. Any palmprint image, which can be easily obtained, is used as the initial image, and the region of interest is iteratively modified with deep reinforcement strategies to reduce the matching distance. In the first attack, Modification Constraint within Neighborhood (MCwN) limits the modification extent and suppresses the reckless modification. In the second attack, Batch Member Selection (BMS) selects the significant pixels (SPs) to compose the batch, which are simultaneously modified to a slighter extent to reduce the matching number and the visual-quality degradation. The two reinforced attacks can satisfy all the requirements, which cannot be simultaneously satisfied by the existing attacks. The thorough experiments demonstrate that the two attacks have a highly successful attack rate for palmprint systems based on the most state-of-the-art coding-based methods. MDPI 2022-01-13 /pmc/articles/PMC8781289/ /pubmed/35062552 http://dx.doi.org/10.3390/s22020591 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Sun, Yue
Leng, Lu
Jin, Zhe
Kim, Byung-Gyu
Reinforced Palmprint Reconstruction Attacks in Biometric Systems
title Reinforced Palmprint Reconstruction Attacks in Biometric Systems
title_full Reinforced Palmprint Reconstruction Attacks in Biometric Systems
title_fullStr Reinforced Palmprint Reconstruction Attacks in Biometric Systems
title_full_unstemmed Reinforced Palmprint Reconstruction Attacks in Biometric Systems
title_short Reinforced Palmprint Reconstruction Attacks in Biometric Systems
title_sort reinforced palmprint reconstruction attacks in biometric systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8781289/
https://www.ncbi.nlm.nih.gov/pubmed/35062552
http://dx.doi.org/10.3390/s22020591
work_keys_str_mv AT sunyue reinforcedpalmprintreconstructionattacksinbiometricsystems
AT lenglu reinforcedpalmprintreconstructionattacksinbiometricsystems
AT jinzhe reinforcedpalmprintreconstructionattacksinbiometricsystems
AT kimbyunggyu reinforcedpalmprintreconstructionattacksinbiometricsystems