Poisoning Attacks to Compromise Face Templates

被引:0
|
作者
Biggio, Batista [1 ]
Didaci, Luca [1 ]
Fumera, Giorgio [1 ]
Roli, Fabio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adaptive biometric systems update clients' templates during operation to account for natural changes over time (e. g., aging of biometric templates). Recently, it has been shown that this update can be exploited by an attacker to compromise the clients' templates: by presenting a proper sequence of fake biometric traits to the sensor, the attacker may eventually impersonate the targeted clients without any fake trait, and even force the system to deny access to them. This attack has however been shown only for PCA-based face verification, with one template per client, under worstcase assumptions about the attacker's knowledge of the system. In this paper, we show that it can be successful even in the case of multiple templates per client, for different matchers, and under more realistic scenarios, and validate it by experiments to highlight its practical relevance.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Poisoning attacks on face authentication systems by using the generative deformation model
    Chan, Chak-Tong
    Huang, Szu-Hao
    Choy, Patrick Puiyui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (19) : 29457 - 29476
  • [2] Poisoning attacks on face authentication systems by using the generative deformation model
    Chak-Tong Chan
    Szu-Hao Huang
    Patrick Puiyui Choy
    Multimedia Tools and Applications, 2023, 82 : 29457 - 29476
  • [3] Face templates for the Chicago Face Database
    Singh, Balbir
    Gambrell, Ashleigh
    Correll, Joshua
    BEHAVIOR RESEARCH METHODS, 2023, 55 (02) : 639 - 645
  • [4] Face templates for the Chicago Face Database
    Balbir Singh
    Ashleigh Gambrell
    Joshua Correll
    Behavior Research Methods, 2023, 55 : 639 - 645
  • [5] Node compromise attacks and network connectivity
    Chan, Kevin
    Fekri, Faramarz
    DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2007, 2007, 6578
  • [6] Detection of attacks based on compromise marks
    Cherniashchuk, Nataliia
    Kostiuchko, Serhiy
    2022 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), 2022,
  • [7] FACE VERIFICATION WITH CHANGEABLE TEMPLATES
    Wang, Yongjin
    Hatzinakos, Dimitrios
    2009 IEEE 22ND CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1 AND 2, 2009, : 324 - 329
  • [8] Face biometrics with renewable templates
    van der Veen, M
    Kevenaar, T
    Schrijen, GJ
    Akkermans, TH
    Zuo, F
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [9] Protected Honey Face Templates
    Martiri, Edlira
    Yang, Bian
    Busch, Christoph
    BIOSIG 2015 PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP, 2015,
  • [10] DEFORMABLE TEMPLATES FOR FACE RECOGNITION
    YUILLE, AL
    JOURNAL OF COGNITIVE NEUROSCIENCE, 1991, 3 (01) : 59 - 70