Analysis of Master Vein Attacks on Finger Vein Recognition Systems

10/18/2022
by   Huy H. Nguyen, et al.
4

Finger vein recognition (FVR) systems have been commercially used, especially in ATMs, for customer verification. Thus, it is essential to measure their robustness against various attack methods, especially when a hand-crafted FVR system is used without any countermeasure methods. In this paper, we are the first in the literature to introduce master vein attacks in which we craft a vein-looking image so that it can falsely match with as many identities as possible by the FVR systems. We present two methods for generating master veins for use in attacking these systems. The first uses an adaptation of the latent variable evolution algorithm with a proposed generative model (a multi-stage combination of beta-VAE and WGAN-GP models). The second uses an adversarial machine learning attack method to attack a strong surrogate CNN-based recognition system. The two methods can be easily combined to boost their attack ability. Experimental results demonstrated that the proposed methods alone and together achieved false acceptance rates up to 73.29 respectively, against Miura's hand-crafted FVR system. We also point out that Miura's system is easily compromised by non-vein-looking samples generated by a WGAN-GP model with false acceptance rates up to 94.21 alarm about the robustness of such systems and suggest that master vein attacks should be considered an important security measure.

READ FULL TEXT
research
09/08/2021

Master Face Attacks on Face Recognition Systems

Face authentication is now widely used, especially on mobile devices, ra...
research
09/12/2023

Generalized Attacks on Face Verification Systems

Face verification (FV) using deep neural network models has made tremend...
research
06/15/2020

Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems

Due to its convenience, biometric authentication, especial face authenti...
research
01/10/2023

Diffusion Models For Stronger Face Morphing Attacks

Face morphing attacks seek to deceive a Face Recognition (FR) system by ...
research
04/24/2022

Dictionary Attacks on Speaker Verification

In this paper, we propose dictionary attacks against speaker verificatio...
research
03/16/2015

Skilled Impostor Attacks Against Fingerprint Verification Systems And Its Remedy

Fingerprint verification systems are becoming ubiquitous in everyday lif...
research
03/20/2022

Strategic Analysis to defend against Griefing Attack in Lightning Network

Payments routed in Lightning Network are susceptible to a griefing attac...

Please sign up or login with your details

Forgot password? Click here to reset