论文标题

可解释的可解释的可取消生物识别技术使用基于约束的相似性攻击

Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack

论文作者

Wang, Hanrui, Dong, Xingbo, Jin, Zhe, Teoh, Andrew Beng Jin, Tistarelli, Massimo

论文摘要

在可取消生物识别(CB)方案中,通过将非线性转换应用于生物识别模板来实现模板安全性。转换旨在保留转换域中的模板距离/相似性。尽管具有有效性,但归因于CB的相似性保护属性的安全问题仍被低估了。 Dong等。 [BTAS'19]利用了CB的相似性保存特征,并提出了基于相似性的攻击,并具有很高的成功攻击率。基于相似性的攻击利用了从受保护的生物识别模板生成的预印象,以模拟并执行交叉匹配。在本文中,我们提出了基于优化的相似性攻击(CSA)的约束,该攻击(CSA)在Dong的遗传算法中得到了改进,从而启用了基于相似性的攻击(GASA)。 CSA将算法特异性平等或不平等关系作为约束,以优化前图生成。我们从监督的学习角度来解释CSA的有效性。然后,我们确定这样的约束,然后进行大量实验,以证明使用LFW Face DataSet针对CB的CSA。结果表明,CSA有效地破坏了IOM哈希和生物实施的安全性,并且胜过Gasa的表现。从上述结果推断出来,我们进一步指出,除了IOM和生物施用外,CSA对其他CB方案至关重要,就可以制定约束而言。此外,我们揭示了哈希代码大小和CSA攻击性能的相关性。

In cancellable biometrics (CB) schemes, template security is achieved by applying, mainly non-linear, transformations to the biometric template. The transformation is designed to preserve the template distance/similarity in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB are underestimated. Dong et al. [BTAS'19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that are generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong's genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We interpret the effectiveness of CSA from the supervised learning perspective. We identify such constraints then conduct extensive experiments to demonstrate CSA against CB with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing and BioHashing security, and outperforms GASA significantly. Inferring from the above results, we further remark that, other than IoM and BioHashing, CSA is critical to other CB schemes as far as the constraints can be formulated. Furthermore, we reveal the correlation of hash code size and the attack performance of CSA.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源