论文标题
对手指静脉识别系统的静脉攻击分析
Analysis of Master Vein Attacks on Finger Vein Recognition Systems
论文作者
论文摘要
Finger静脉识别(FVR)系统已商业使用,尤其是在ATM中进行客户验证。因此,必须衡量其针对各种攻击方法的鲁棒性,尤其是当使用手工制作的FVR系统而没有任何对策方法时。在本文中,我们是文献中第一个引入大师静脉攻击的人,在该攻击中我们可以制作出静脉外观的图像,以便它可以错误地与FVR系统的尽可能多的身份匹配。我们提出了两种用于生成主静脉用于攻击这些系统的方法。第一个使用建议的生成模型(β-VAE和WGAN-GP模型的多阶段组合),使用潜在变量演化算法的适应。第二种使用对抗机器学习攻击方法来攻击强大的基于CNN的识别系统。这两种方法可以轻松合并以提高其攻击能力。实验结果表明,针对Miura的手工制作的FVR系统,单独提出的方法和共同达到了高达73.29%和88.79%的错误接受率。我们还指出,Miura的系统很容易被WGAN-GP模型产生的非静态样本损害,该模型具有高达94.21%的错误接受率。结果引起了有关此类系统鲁棒性的警报,并建议将主静脉攻击视为重要的安全措施。
Finger vein recognition (FVR) systems have been commercially used, especially in ATMs, for customer verification. Thus, it is essential to measure their robustness against various attack methods, especially when a hand-crafted FVR system is used without any countermeasure methods. In this paper, we are the first in the literature to introduce master vein attacks in which we craft a vein-looking image so that it can falsely match with as many identities as possible by the FVR systems. We present two methods for generating master veins for use in attacking these systems. The first uses an adaptation of the latent variable evolution algorithm with a proposed generative model (a multi-stage combination of beta-VAE and WGAN-GP models). The second uses an adversarial machine learning attack method to attack a strong surrogate CNN-based recognition system. The two methods can be easily combined to boost their attack ability. Experimental results demonstrated that the proposed methods alone and together achieved false acceptance rates up to 73.29% and 88.79%, respectively, against Miura's hand-crafted FVR system. We also point out that Miura's system is easily compromised by non-vein-looking samples generated by a WGAN-GP model with false acceptance rates up to 94.21%. The results raise the alarm about the robustness of such systems and suggest that master vein attacks should be considered an important security measure.