Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/BTAS.2018.8698539guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution<sup>&#x002A;</sup>

Published: 22 October 2018 Publication History

Abstract

Recent research has demonstrated the vulnerability of fingerprint recognition systems to dictionary attacks based on MasterPrints. MasterPrints are real or synthetic fingerprints that can fortuitously match with a large number of fingerprints thereby undermining the security afforded by fingerprint systems. Previous work by Roy et al. generated synthetic MasterPrints at the feature-level. In this work we generate complete image-level MasterPrints known as DeepMasterPrints, whose attack accuracy is found to be much superior than that of previous methods. The proposed method, referred to as Latent Variable Evolution, is based on training a Generative Adversarial Network on a set of real fingerprint images. Stochastic search in the form of the Covariance Matrix Adaptation Evolution Strategy is then used to search for latent input variables to the generator network that can maximize the number of impostor matches as assessed by a fingerprint recognizer. Experiments convey the efficacy of the proposed method in generating DeepMasterPrints. The underlying method is likely to have broad applications in fingerprint security as well as fingerprint synthesis.

References

[1]
Apple. iOS Security - White Paper, 2017. 2.
[2]
M. Arjovsky, S. Chintala, and L. Bottou. Wasserstein GAN. arXiv preprint arXiv:1701.07875, 2017. 3, 4.
[3]
S. Arora and Y. Zhang. Do GANs actually learn the distribution? an empirical study. arXiv preprint arXiv:1706.08224, 2017. 4.
[4]
P. Bontrager, W. Lin, J. Togelius, and S. Risi. Deep interactive evolution. In International Conference on Evolutionary and Biologically Inspired Music and Art. Springer, 2018. 3, 8.
[5]
K. Cao and A. K. Jain. Fingerprint synthesis: Evaluating fingerprint search at scale. In Proceedings of International Conference on Biometrics, pages 1–8, 2018. 1.
[6]
J. Galbally, R. Cappelli, A. Lumini, G. Gonzalez-de Rivera, D. Maltoni, J. Fierrez, J. Ortega-Garcia, and D. Maio. An evaluation of direct attacks using fake fingers generated from ISO templates. Pattern Recognition Letters, 31(8):725–732, 2010. 2.
[7]
I. Goodfellow. NIPS 2016 tutorial: Generative adversarial networks. arXiv preprint arXiv:1701.00160, 2016. 1, 2.
[8]
I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Advances in Neural Information Processing Systems, pages 2672–2680, 2014. 1.
[9]
I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. C. Courville. Improved training of wasserstein GANs. In Advances in Neural Information Processing Systems, pages 5769–5779, 2017. 3.
[10]
B. B. Han, C. A. Marciniak, and W. C. Westerman. Fingerprint sensing and enrollment, 2014. US Patent App. 14/244,143. 1.
[11]
N. Hansen. The CMA Evolution Strategy: A Comparing Review, pages 75–102. Springer, Berlin, Heidelberg, 2006. 4.
[12]
N. Hansen and A. Ostermeier. Completely derandomized self-adaptation in evolution strategies. Evolutionary computation, 9(2):159–195, 2001. 3, 4.
[13]
X. Jia, X. Yang, Y. Zang, N. Zhang, and J. Tian. A cross-device matching fingerprint database from multi-type sensors. In 21st International Conference on Pattern Recognition (ICPR), pages 3001–3004, 2012. 6.
[14]
T. Karras, T. Aila, S. Laine, and J. Lehtinen. Progressive growing of GANs for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196, 2017. 3.
[15]
J. Lehman, J. Chen, J. Clune, and K. O. Stanley. Safe mutations for deep and recurrent neural networks through output gradients. arXiv preprint arXiv:1712.06563, 2017. 3.
[16]
M. Lui, K. Kurach, M. Michalski, S. Gelly, and O. Bousquet. Are GANs created equal? a large-scale study. arXiv, 2017. 3.
[17]
E. Marasco and A. Ross. A survey on anti-spoofing schemes for fingerprint recognition systems. ACM Computing Surveys, 47(2):1–36, 2015. 2.
[18]
A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015. 4.
[19]
N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614–634, 2001. 2.
[20]
A. Ross, A. Jain, and J. Reisman. A hybrid fingerprint matcher. Pattern Recognition, 36(7):1661–1673, 2003. 1.
[21]
A. Ross, J. Reisman, and A. K. Jain. Fingerprint matching using feature space correlation. In Proc. of International ECCV Workshop on Biometric Authentication, pages 48–57, 2004. 1.
[22]
A. Ross, J. Shah, and A. K. Jain. From Template to Image: Reconstructing Fingerprints From Minutiae Points. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):544–560, April 2007. 2.
[23]
A. Roy. Personal communication, 2017. 8.
[24]
A. Roy, N. Memon, J. Togelius, and A. Ross. Evolutionary methods for generating synthetic masterprint templates: Dictionary attack in fingerprint recognition. In International Conference on Biometrics, pages 1–8, 2018. 1.
[25]
A. Roy, N. Memon, and A. Ross. Masterprint: Exploring the vulnerability of partial fingerprint-based authentication systems. IEEE Transactions on Information Forensics and Security, 2017. 1, 2, 5, 6, 8.
[26]
F. P. Such, V. Madhavan, E. Conti, J. Lehman, K. O. Stanley, and J. Clune. Deep neuroevolution: Genetic algorithms are a competitive alternative for training deep neural networks for reinforcement learning. arXiv preprint arXiv:1712.06567, 2017. 3.
[27]
M. Une, A. Otsuka, and H. Imai. Wolf attack probability: A new security measure in biometric authentication systems. In International Conference on Biometrics, pages 396–406. Springer, 2007. 2.
[28]
C. I. Watson. NIST special database 9, mated fingerprint card pairs. National Institute of Standards and Technology, February 1993. 6.
[29]
X. Yao. Evolving artificial neural networks. Proceedings of the IEEE, 87(9):1423–1447, 1999. 3.

Cited By

View all
  • (2024)Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language ModelsProceedings of the 2024 Workshop on Artificial Intelligence and Security10.1145/3689932.3694770(184-195)Online publication date: 6-Nov-2024
  • (2024)Empirical comparison of evolutionary approaches for searching the latent space of Generative Adversarial Networks for the human face generation problemProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3638530.3664147(1631-1639)Online publication date: 14-Jul-2024
  • (2024)LVNS-RAVE: Diversified audio generation with RAVE and Latent Vector Novelty SearchProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3638530.3654432(667-670)Online publication date: 14-Jul-2024
  • Show More Cited By

Index Terms

  1. DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)
        Oct 2018
        529 pages

        Publisher

        IEEE Press

        Publication History

        Published: 22 October 2018

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 01 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language ModelsProceedings of the 2024 Workshop on Artificial Intelligence and Security10.1145/3689932.3694770(184-195)Online publication date: 6-Nov-2024
        • (2024)Empirical comparison of evolutionary approaches for searching the latent space of Generative Adversarial Networks for the human face generation problemProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3638530.3664147(1631-1639)Online publication date: 14-Jul-2024
        • (2024)LVNS-RAVE: Diversified audio generation with RAVE and Latent Vector Novelty SearchProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3638530.3654432(667-670)Online publication date: 14-Jul-2024
        • (2024)Evolutionary Art and Design in the Machine Learning EraProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3638530.3648408(1460-1501)Online publication date: 14-Jul-2024
        • (2024)Iterative Visual Interaction with Latent Diffusion ModelsArtificial Intelligence in HCI10.1007/978-3-031-60606-9_24(411-421)Online publication date: 29-Jun-2024
        • (2023)InfinityGauntletProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620351(2027-2041)Online publication date: 9-Aug-2023
        • (2023)FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's KnowledgeProceedings of the 21st ACM Conference on Embedded Networked Sensor Systems10.1145/3625687.3625783(167-180)Online publication date: 12-Nov-2023
        • (2023)Characterizing the MasterPrint threat on Android devices with capacitive sensorsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600177(1-11)Online publication date: 29-Aug-2023
        • (2023)Generating Adversarial Examples through Latent Space Exploration of Generative Adversarial NetworksProceedings of the Companion Conference on Genetic and Evolutionary Computation10.1145/3583133.3596392(1760-1767)Online publication date: 15-Jul-2023
        • (2023)Multiobjective evolutionary search of the latent space of Generative Adversarial Networks for human face generationProceedings of the Companion Conference on Genetic and Evolutionary Computation10.1145/3583133.3596391(1768-1776)Online publication date: 15-Jul-2023
        • Show More Cited By

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media