On the vulnerability of face verification systems to hill-climbing attacks

نویسندگان

  • Javier Galbally
  • Chris McCool
  • Julian Fiérrez
  • Sébastien Marcel
  • Javier Ortega-Garcia
چکیده

In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking technique uses the scores provided by the matcher to adapt a global distribution computed from an independent set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on an eigenfacebased and a parts-based face verification system using the XM2VTS database. Experimental results demonstrate that the hill-climbing algorithm is very efficient and is able to bypass over 85% of the attacked accounts (for both face recognition systems). The security flaws of the analyzed systems are pointed out and possible countermeasures to avoid them are also proposed. & 2009 Elsevier Ltd. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security evaluation of i-vector based speaker verification systems against hill-climbing attacks

This work studies the vulnerabilities of i-vector based speaker verification systems against indirect attacks. Particularly, we exploit the one-to-one representation of speakers via their corresponding i-vectors to perform Hill-Climbing based attacks; under the hypothesis that the inherent low-dimensionality of ivectors might represent a potential security breach to fraudulently access the syst...

متن کامل

An evaluation of indirect attacks and countermeasures in fingerprint verification systems

Biometric recognition systems are vulnerable to numerous security threats. These include direct attacks to the sensor or indirect attacks, which represent the ones aimed towards internal system modules. In this work, indirect attacks against fingerprint verification systems are analyzed in order to better understand how harmful they can be. Software attacks via hill climbing algorithms are impl...

متن کامل

Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification

A general hill-climbing attack to biometric systems based on a modification of the downhill simplex algorithm is presented. The scores provided by the matcher are used in this approach to adapt iteratively an initial estimate of the attacked template to the specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system o...

متن کامل

A Proposed Improved Hybrid Hill Climbing Algorithm with the Capability of Local Search for Solving the Nonlinear Economic Load Dispatch Problem

This paper introduces a new hybrid hill-climbing algorithm (HHC) for solving the Economic Dispatch (ED) problem. This algorithm solves the ED problems with a systematic search structure with a global search. It improves the results obtained from an evolutionary algorithm with local search and converges to the best possible solution that grabs the accuracy of the problem. The most important goal...

متن کامل

Detection of PARD Attack on Secure Authentication System Based on Fingerprint Impression

The trustworthy information security mechanisms are required to contend with the rising atrociousness of identity theft in the cyber and electronic society, the biometric like fingerprint authentication can be used to ensure that only the legitimate user can access to intended system. Although the biometric authentication systems are very secured but the biometric systems are also exposed to a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Pattern Recognition

دوره 43  شماره 

صفحات  -

تاریخ انتشار 2010