| Literature DB >> 35062552 |
Yue Sun1, Lu Leng1, Zhe Jin1,2, Byung-Gyu Kim3.
Abstract
Biometric signals can be acquired with different sensors and recognized in secure identity management systems. However, it is vulnerable to various attacks that compromise the security management in many applications, such as industrial IoT. In a real-world scenario, the target template stored in the database of a biometric system can possibly be leaked, and then used to reconstruct a fake image to fool the biometric system. As such, many reconstruction attacks have been proposed, yet unsatisfactory naturalness, poor visual quality or incompleteness remains as major limitations. Thus, two reinforced palmprint reconstruction attacks are proposed. Any palmprint image, which can be easily obtained, is used as the initial image, and the region of interest is iteratively modified with deep reinforcement strategies to reduce the matching distance. In the first attack, Modification Constraint within Neighborhood (MCwN) limits the modification extent and suppresses the reckless modification. In the second attack, Batch Member Selection (BMS) selects the significant pixels (SPs) to compose the batch, which are simultaneously modified to a slighter extent to reduce the matching number and the visual-quality degradation. The two reinforced attacks can satisfy all the requirements, which cannot be simultaneously satisfied by the existing attacks. The thorough experiments demonstrate that the two attacks have a highly successful attack rate for palmprint systems based on the most state-of-the-art coding-based methods.Entities:
Keywords: batch member selection; modification constraint within neighborhood; naturalness; palmprint recognition; reinforced biometric reconstruction attack; visual quality
Mesh:
Year: 2022 PMID: 35062552 PMCID: PMC8781289 DOI: 10.3390/s22020591
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The two domains in biometric systems.
Figure 2The images and templates in the reconstruction attack.
Comparison of the reconstruction attacks in biometric systems (L, M, and H denote low, medium, and high, respectively).
| Ref. | Year | Modality | Methodology | Naturalness | Visual Quality |
|---|---|---|---|---|---|
| [ | 2001 | Fingerprint | The orientations were reconstructed from the singular points (core, delta) based on pole zero model. Some lines were drawn through the details, resulting in only a sketch of the fingerprints. | L | M |
| [ | 2004 | Fingerprint | The minutiae image was reconstructed using HC. | L | L |
| [ | 2007 | Fingerprint | The direction, category and ridge of the original fingerprint were extracted from the minutiae template. | L | M |
| [ | 2007 | Fingerprint | Local detail model was used to initialize the image, and then Gabor filter was iteratively applied to the image formed by the detail parts. | M | M |
| [ | 2009 | Fingerprint | The orientation field was used to reconstruct the continuous phase that was combined with spiral phase. | M | M |
| [ | 2011 | Fingerprint | The phase image was reconstructed from fingerprint minutiae template, and then converted into a gray image. | M | H |
| [ | 2012 | Fingerprint | A binary ridge pattern was generated, which has a similar ridge flow to that of the original fingerprint. The continuous phase was intuitively reconstructed by removing the spirals in the phase image estimated from the ridge pattern. | M | H |
| [ | 2015 | Fingerprint | The prior knowledge of fingerprint ridge structure was coded through the direction patch and continuous phase patch dictionary. Then the direction field and ridge pattern were reconstructed. | M | H |
| [ | 2018 | Fingerprint | Fingerprint images were reconstructed using cGNA and fingerprint minutiae templates. | M | H |
| [ | 2003 | Face | A candidate image was slightly modified by an eigenface image, and the modifications improving the match score were kept. | L | L |
| [ | 2004 | Face | Face images were reconstructed using HC. | L | L |
| [ | 2007 | Face | Given the coordinates of the targeted subject in the affine space, the original template was reconstructed based on inverse affine transformation. | M | H |
| [ | 2009 | Face | The HC based on Bayesian adaption was used to reconstruct face images. | M | H |
| [ | 2010 | Face | According to the global distribution calculated on the user set, the local characteristics of the attacked client are adapted. | M | H |
| [ | 2012 | Face | The HC based on uphill-simplex algorithm was used to reconstruct face images. | M | H |
| [ | 2013 | Face | A simple reconstruction method was proposed based on RBF regression in face eigenspace. | M | H |
| [ | 2014 | Face | Perceptual learning and HC were used to reconstruct real-valued features from the binary template. | M | M |
| [ | 2018 | Face | A Neighbor Deconvolutional Neural Network (NbNet) was proposed to reconstruct face images from deep face templates. | M | M |
| [ | 2010 | Iris | The initial template was divided into blocks of the same size. The pixels in blocks were modified by genetic algorithm. | M | M |
| [ | 2011 | Iris | The texture image was generated from iris template and embedded into a real iris image. | M | M |
| [ | 2013 | Iris | Genetic algorithm was used to reconstruct images from binary templates. | M | M |
| [ | 2020 | Palmprint | Palmprint images were generated by Generative Adversarial Network (GAN) for false acceptance attack. | H | H |
Figure 3Two windows of the filter for BMS: (a) overlapping; (b) traversal gap.
Normalized Hamming distances at EER, FNMR = 0, and FMR = 0 on PalmBigDatabaseA.
| NHD (FNMR = 0) | NHD (EER) | NHD (FMR = 0) | |
|---|---|---|---|
| PalmCode [ | 0.425 | 0.370 | 0.330 |
| BOCV [ | 0.450 | 0.390 | 0.365 |
| OrdinalCode [ | 0.440 | 0.340 | 0.285 |
| FusionCode [ | 0.430 | 0.370 | 0.335 |
| CompCode [ | 0.160 | 0.130 | 0.115 |
| RLOC [ | 0.475 | 0.410 | 0.390 |
| DOC [ | 0.465 | 0.420 | 0.400 |
| DRCC [ | 0.445 | 0.390 | 0.360 |
Attack performance of PalmCode [36].
| PalmCode [ | Matching Number | Matching Number | PSNR (Inf) ↑ | PSNR (Mean) ↑ | PSNR (Std) ↓ | SSIM (Mean) ↑ | SSIM (Std) ↓ |
|---|---|---|---|---|---|---|---|
| Galbally (FNMR = 0) | 1.0 | 6.760 | 940 | 23.2 | 3.392 | 0.988 | 0.050 |
| Galbally (EER = 0) | 465.6 | 364.91 | 15 | 24.1 | 2.754 | 0.795 | 0.087 |
| Galbally (FMR = 0) | 1618.7 | 893.351 | 1 | 22.2 | 1.855 | 0.695 | 0.086 |
| MCwN (FNMR = 0) | 1108.3 | 1101.942 | 317 | 35.0 | 3.868 | 0.972 | 0.028 |
| MCwN (EER) | 6013.9 | 1791.945 | 4 | 28.6 | 1.635 | 0.866 | 0.045 |
| MCwN (FMR = 0) | 9866.2 | 2192.273 | 0 | 26.4 | 1.179 | 0.794 | 0.060 |
| BMS (FNMR = 0) | 86.3 | 82.409 | 293 | 48.3 | 5.133 | 0.999 | 0 |
| BMS (EER) | 577.1 | 246.770 | 4 | 40.3 | 1.658 | 0.992 | 0 |
| BMS (FMR = 0) | 1511.2 | 655.849 | 0 | 36.9 | 1.098 | 0.983 | 0 |
Attack performance of BOCV [37].
| BOCV [ | Matching Number | Matching Number | PSNR (Inf) ↑ | PSNR (Mean) ↑ | PSNR (Std) ↓ | SSIM (Mean) ↑ | SSIM (Std) ↓ |
|---|---|---|---|---|---|---|---|
| Galbally (FNMR = 0) | 0 | 0 | 0 | 36.1 | 1.574 | 0.973 | 0 |
| Galbally (EER = 0) | 1117.8 | 875.181 | 0 | 28.7 | 2.546 | 0.927 | 0.022 |
| Galbally (FMR = 0) | 3731.1 | 2743.178 | 0 | 27.9 | 1.894 | 0.913 | 0.020 |
| MCwN (FNMR = 0) | 248.5 | 587.795 | 727 | 40.2 | 5.835 | 0.995 | 0.010 |
| MCwN (EER) | 8865.1 | 2484.256 | 1 | 29.3 | 1.708 | 0.880 | 0.037 |
| MCwN (FMR = 0) | 13,549.7 | 3292.596 | 0 | 27.5 | 1.400 | 0.822 | 0.050 |
| BMS (FNMR = 0) | 23.5 | 42.123 | 389 | 54.9 | 7.598 | 0.999 | 0 |
| BMS (EER) | 1188.3 | 546.249 | 0 | 34.7 | 1.999 | 0.977 | 0.010 |
| BMS (FMR = 0) | 2261.9 | 903.541 | 0 | 32.5 | 1.058 | 0.964 | 0.010 |
Attack performance of OrdinalCode [38].
| OrdinalCode [ | Matching Number | Matching Number | PSNR (Inf) ↑ | PSNR (Mean) ↑ | PSNR (Std) ↓ | SSIM (Mean) ↑ | SSIM (Std) ↓ |
|---|---|---|---|---|---|---|---|
| Galbally (FNMR = 0) | 0 | 0 | 998 | / | / | 1 | 0 |
| Galbally (EER = 0) | 783.5 | 617.210 | 47 | 23.8 | 2.535 | 0.785 | 0.100 |
| Galbally (FMR = 0) | 5656.8 | 4221.575 | 0 | 20.6 | 1.392 | 0.579 | 0.094 |
| MCwN (FNMR = 0) | 67.7 | 360.238 | 944 | 36.5 | 4.875 | 0.998 | 0.010 |
| MCwN (EER) | 9577.8 | 3352.793 | 3 | 26.8 | 1.813 | 0.797 | 0.076 |
| MCwN (FMR = 0) | 20,139.2 | 6879.100 | 0 | 23.8 | 1.646 | 0.626 | 0.114 |
| BMS (FNMR = 0) | 6.8 | 15.533 | 944 | 41.8 | 4.020 | 1.000 | 0 |
| BMS (EER) | 742.8 | 1051.393 | 3 | 30.2 | 2.075 | 0.943 | 0.022 |
| BMS (FMR = 0) | 1956.0 | 2222.085 | 0 | 26.9 | 1.135 | 0.895 | 0.026 |
Attack performance of FusionCode [39].
| FusionCode [ | Matching Number | Matching Number | PSNR (Inf) ↑ | PSNR (Mean) ↑ | PSNR (Std) ↓ | SSIM (Mean) ↑ | SSIM (Std) ↓ |
|---|---|---|---|---|---|---|---|
| Galbally (FNMR = 0) | 0 | 0 | 997 | 15.2 | 0 | 1.000 | 0.010 |
| Galbally (EER = 0) | 789.0 | 912.764 | 30 | 23.7 | 2.539 | 0.776 | 0.096 |
| Galbally (FMR = 0) | 4544.6 | 3667.629 | 0 | 21.2 | 1.554 | 0.617 | 0.093 |
| MCwN (FNMR = 0) | 320.6 | 693.742 | 729 | 36.6 | 4.719 | 0.992 | 0.017 |
| MCwN (EER) | 6968.7 | 2152.851 | 4 | 28.4 | 1.788 | 0.856 | 0.050 |
| MCwN (FMR = 0) | 11660.5 | 2540.917 | 0 | 26.2 | 1.260 | 0.774 | 0.064 |
| BMS (FNMR = 0) | 25.4 | 48.533 | 647 | 52.8 | 6.235 | 1.000 | 0 |
| BMS (EER) | 952.4 | 692.114 | 3 | 39.5 | 2.185 | 0.991 | 0 |
| BMS (FMR = 0) | 2972.4 | 2503.948 | 0 | 36.6 | 1.162 | 0.984 | 0 |
Attack performance of CompCode [40].
| CompCode [ | Matching Number | Matching Number | PSNR (Inf) ↑ | PSNR (Mean) ↑ | PSNR (Std) ↓ | SSIM (Mean) ↑ | SSIM (Std) ↓ |
|---|---|---|---|---|---|---|---|
| Gabally (FNMR = 0) | 0 | 0 | 998 | / | / | 1 | 0 |
| Gabally (EER = 0) | 1535.4 | 1323.859 | 7 | 23.1 | 2.717 | 0.736 | 0.114 |
| Gabally (FMR = 0) | 7630.8 | 6221.137 | 0 | 20.7 | 1.492 | 0.586 | 0.100 |
| MCwN (FNMR = 0) | 5.2 | 41.978 | 976 | 45.8 | 6.306 | 1.000 | 0 |
| MCwN (EER) | 6600.8 | 1782.556 | 0 | 27.9 | 1.618 | 0.839 | 0.052 |
| MCwN (FMR = 0) | 11,016.4 | 2224.044 | 0 | 25.6 | 1.179 | 0.749 | 0.070 |
| BMS (FNMR = 0) | 4.4 | 3.255 | 787 | 54.6 | 3.308 | 1.000 | 0 |
| BMS (EER) | 394.6 | 173.592 | 0 | 34.4 | 1.613 | 0.978 | 0.010 |
| BMS (FMR = 0) | 1081.9 | 711.593 | 0 | 31.4 | 0.941 | 0.960 | 0.010 |
Attack performance of RLOC [41].
| RLOC [ | Matching Number | Matching Number | PSNR (Inf) ↑ | PSNR (Mean) ↑ | PSNR (Std) ↓ | SSIM (Mean) ↑ | SSIM (Std) ↓ |
|---|---|---|---|---|---|---|---|
| Galbally (FNMR = 0) | 0 | 0 | 998 | / | / | 1.000 | 0 |
| Galbally (EER = 0) | 1094.7 | 845.827 | 9 | 23.6 | 2.587 | 0.763 | 0.098 |
| Galbally (FMR = 0) | 2809.6 | 1691.399 | 0 | 22.0 | 1.861 | 0.676 | 0.093 |
| MCwN (FNMR = 0) | 16.0 | 99.884 | 959 | 41.4 | 4.549 | 1.000 | 0 |
| MCwN (EER) | 4514.2 | 1282.262 | 0 | 29.2 | 1.592 | 0.887 | 0.036 |
| MCwN (FMR = 0) | 6416.3 | 1386.419 | 0 | 27.6 | 1.156 | 0.843 | 0.041 |
| BMS (FNMR = 0) | 6.2 | 12.336 | 814 | 60.4 | 4.705 | 1.000 | 0 |
| BMS (EER) | 1628.5 | 605.921 | 0 | 39.1 | 1.735 | 0.988 | 0 |
| BMS (FMR = 0) | 2561.4 | 692.470 | 0 | 37.3 | 1.065 | 0.982 | 0 |
Attack performance of DOC [42].
| DOC [ | Matching Number | Matching Number | PSNR (Inf) ↑ | PSNR (Mean) ↑ | PSNR (Std) ↓ | SSIM (Mean) ↑ | SSIM (Std) ↓ |
|---|---|---|---|---|---|---|---|
| Galbally (FNMR = 0) | 0 | 0 | 998 | / | / | 1.000 | 0 |
| Galbally (EER = 0) | 973.0 | 831.115 | 12 | 23.7 | 2.628 | 0.767 | 0.097 |
| Galbally (FMR = 0) | 3595.0 | 2740.069 | 0 | 21.6 | 1.610 | 0.647 | 0.091 |
| MCwN (FNMR = 0) | 159.7 | 396.768 | 741 | 40.9 | 5.285 | 0.996 | 0.010 |
| MCwN (EER) | 6569.4 | 1802.938 | 0 | 30 | 1.850 | 0.896 | 0.033 |
| MCwN (FMR = 0) | 10,054.7 | 1934.229 | 0 | 28.2 | 1.316 | 0.851 | 0.040 |
| BMS (FNMR = 0) | 17.3 | 28.167 | 448 | 56.7 | 6.767 | 1.000 | 0 |
| BMS (EER) | 813.6 | 809.699 | 0 | 38.8 | 1.890 | 0.990 | 0 |
| BMS (FMR = 0) | 1839.0 | 1896.114 | 0 | 36.4 | 1.078 | 0.984 | 0 |
Attack performance of DRCC [43].
| DRCC [ | Matching Number | Matching Number | PSNR (Inf) ↑ | PSNR (Mean) ↑ | PSNR (Std) ↓ | SSIM (Mean) ↑ | SSIM (Std) ↓ |
|---|---|---|---|---|---|---|---|
| Galbally (FNMR = 0) | 0 | 0 | 998 | / | / | 1.000 | 0 |
| Galbally (EER = 0) | 815.2 | 892.207 | 21 | 23.4 | 2.608 | 0.766 | 0.097 |
| Galbally (FMR = 0) | 6313.7 | 4771.276 | 0 | 20.7 | 1.402 | 0.590 | 0.084 |
| MCwN (FNMR = 0) | 45.5 | 213.826 | 924 | 41.3 | 6.267 | 0.999 | 0 |
| MCwN (EER) | 6841.4 | 1982.581 | 1 | 29.5 | 1.691 | 0.884 | 0.038 |
| MCwN (FMR = 0) | 12,168.2 | 2467.356 | 0 | 27.2 | 1.221 | 0.810 | 0.050 |
| BMS (FNMR = 0) | 7.3 | 14.359 | 585 | 60.5 | 5.091 | 1.000 | 0 |
| BMS (EER) | 693.3 | 373.336 | 1 | 39.3 | 1.905 | 0.991 | 0 |
| BMS (FMR = 0) | 2164.1 | 1533.112 | 0 | 36.1 | 1.008 | 0.983 | 0 |
Figure 4Reconstructed ROI and complete fake palmprint image: (a) the reconstructed ROI; and (b) the complete palmprint images with the embedding of the reconstructed ROI.
Figure 5Two modification modes when distance is not changed.
Figure 6The effects of the threshold for BMS: (a) Matching number; (b) PSNR; (c) SSIM.
Figure 7The effects of a traversal gap on batch modification: (a) Matching number; (b) PSNR; (c) SSIM.