Poisoning Adaptive Biometric Systems
نویسندگان
چکیده
Adaptive biometric recognition systems have been proposed to deal with natural changes of the clients’ biometric traits due to multiple factors, like aging. However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client, or to deny access to him. In this paper we show how a carefully designed attack may gradually poison the template gallery of some users, and successfully mislead a simple PCA-based face verification system that performs self-update.
منابع مشابه
A multi-modal dataset, protocol and tools for adaptive biometric systems: a benchmarking study
Adaptive biometric systems have received a recent spurt in biometric community. These systems have the additional capability to adapt themselves using biometric data available during the system’s operation. Although several studies have been proposed in this field, no conclusive evidences can be drawn about the expected performance gain on making the biometric system adaptive. This is due to th...
متن کاملAdaptive biometric systems that can improve with use
Performances of biometric recognition systems can degrade quickly when the input biometric traits exhibit substantial variations compared to the templates collected during the enrolment stage of system’s users. On the other hand, a lot of new unlabelled biometric data, which could be exploited to adapt the system to input data variations, are made available during the system operation over the ...
متن کاملCurie: A method for protecting SVM Classifier from Poisoning Attack
Machine learning is used in a number of security related applications such as biometric user authentication, speaker identification etc. A type of causative integrity attack against machine le arning called Poisoning attack works by injecting specially crafted data points in the training data so as to increase the false positive rate of the classifier. In the context of the biometric authentica...
متن کاملTowards More Secure Biometric Readers for Effective Digital Forensic Investigation
This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attack...
متن کاملAdaptive fusion of biometric and biographic information for identity de-duplication
Use of biometrics for person identification has increased tremendously over the past decade, e.g., in large scale national identification programs, for law enforcement and border control applications, and social welfare initiatives. For such large scale applications with a diverse target population, unimodal biometric systems, which use a single biometric trait (e.g., fingerprints), are inadequ...
متن کامل