Poisoning Attacks to Compromise Face Templates

被引:0
|
作者
Biggio, Batista [1 ]
Didaci, Luca [1 ]
Fumera, Giorgio [1 ]
Roli, Fabio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adaptive biometric systems update clients' templates during operation to account for natural changes over time (e. g., aging of biometric templates). Recently, it has been shown that this update can be exploited by an attacker to compromise the clients' templates: by presenting a proper sequence of fake biometric traits to the sensor, the attacker may eventually impersonate the targeted clients without any fake trait, and even force the system to deny access to them. This attack has however been shown only for PCA-based face verification, with one template per client, under worstcase assumptions about the attacker's knowledge of the system. In this paper, we show that it can be successful even in the case of multiple templates per client, for different matchers, and under more realistic scenarios, and validate it by experiments to highlight its practical relevance.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] BENCHMARKING BINARISATION SCHEMES FOR DEEP FACE TEMPLATES
    Drozdowski, P.
    Struck, F.
    Rathgeb, C.
    Busch, C.
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2018, : 191 - 195
  • [42] Optimizing Discriminability of Globally Binarized Face Templates
    Eslam Hamouda
    Osama Ouda
    Xiaohui Yuan
    Taher Hamza
    Arabian Journal for Science and Engineering, 2016, 41 : 2837 - 2846
  • [43] Optimizing Discriminability of Globally Binarized Face Templates
    Hamouda, Eslam
    Ouda, Osama
    Yuan, Xiaohui
    Hamza, Taher
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (08) : 2837 - 2846
  • [44] A new face recognition scheme with renewable templates
    Huang, Wenjun
    Yu, Xin
    Li, Qiong
    Niu, Xiamu
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1426 - 1429
  • [45] A Revisit of DNS Kaminsky Cache Poisoning Attacks
    Wang, Zheng
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [46] Defend Data Poisoning Attacks on Voice Authentication
    Li, Ke
    Baird, Cameron
    Lin, Dan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1754 - 1769
  • [47] Fair Detection of Poisoning Attacks in Federated Learning
    Singh, Ashneet Khandpur
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    Sanchez, David
    Rebollo-Monedero, David
    2020 IEEE 32ND INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2020, : 224 - 229
  • [48] Targeted Poisoning Attacks on Social Recommender Systems
    Hu, Rui
    Guo, Yuanxiong
    Pan, Miao
    Gong, Yanmin
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [49] Classifying Poisoning Attacks in Software Defined Networking
    Sattolo, Thomas A., V
    Macwan, Saumil
    Vezina, Michael J.
    Matrawy, Ashraf
    2019 IEEE 7TH INTERNATIONAL CONFERENCE ON WIRELESS FOR SPACE AND EXTREME ENVIRONMENTS (WISEE 2019), 2019, : 59 - 64
  • [50] Indirect Invisible Poisoning Attacks on Domain Adaptation
    Wu, Jun
    He, Jingrui
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1852 - 1862