Skip to main content

Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification

  • Conference paper
Biometrics and ID Management (BioID 2011)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6583))

Included in the following conference series:

Abstract

A general hill-climbing attack to biometric systems based on a modification of the downhill simplex algorithm is presented. The scores provided by the matcher are used in this approach to adapt iteratively an initial estimate of the attacked template to the specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system over both the MCYT and the BiosecurID databases (comprising 330 and 400 users, respectively). The results show a very high efficiency of the hill-climbing algorithm, which successfully bypassed the system for over 90% of the attacks with a remarkably low number of scores needed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. on Information Forensics and Security 1, 125–143 (2006)

    Article  Google Scholar 

  2. Van der Putte, T., Keuning, J.: Biometrical fingerprint recognition: don’t get your fingers burned. In: Proc. Conference on Smart Card Research and Advanced Applications (CARDIS), pp. 289–303 (2000)

    Google Scholar 

  3. Pacut, A., Czajka, A.: Aliveness detection for iris biometrics. In: Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST), vol. 1, pp. 122–129 (2006)

    Google Scholar 

  4. Soutar, C., Gilroy, R., Stoianov, A.: Biometric system performance and security. In: Proc. IEEE Automatic Identification Advanced Technologies, AIAT (1999)

    Google Scholar 

  5. Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Galbally, J., Fierrez, J., Rodriguez-Gonzalez, J., Alonso-Fernandez, F., Ortega-Garcia, J., Tapiador, M.: On the vulnerability of fingerprint verification systems to fake fingerprint attacks. In: Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST), pp. 130–136 (2006)

    Google Scholar 

  7. Adler, A.: Sample images can be independently restored from face recognition templates. In: Proc. Canadian Conference on Electrical and Computer Engineering (CCECE), vol. 2, pp. 1163–1166 (2003)

    Google Scholar 

  8. Uludag, U., Jain, A.: Attacks on biometric systems: a case study in fingerprints. In: Proc. SPIE Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633 (2004)

    Google Scholar 

  9. Martinez-Diaz, M., Fierrez, J., Alonso-Fernandez, F., Ortega-Garcia, J., Siguenza, J.A.: Hill-climbing and brute force attacks on biometric systems: a case study in match-on-card fingerprint verification. In: Proc. IEEE Int. Carnahan Conf. on Security Technology (ICCST), vol. 1, pp. 151–159 (2006)

    Google Scholar 

  10. Galbally, J., Fierrez, J., Ortega-Garcia, J.: Bayesian hill-climbing attack and its application to signature verification. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 386–395. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Nelder, J.A., Mead, R.: A simplex method for function minimization. Computer Journal 7, 313–368 (1965)

    Article  MathSciNet  MATH  Google Scholar 

  12. Ortega-Garcia, J., Fierrez-Aguilar, J., et al.: MCYT baseline corpus: a bimodal biometric database. IEE Proc. Vis. Image Signal Process. 150, 395–401 (2003)

    Article  Google Scholar 

  13. Fierrez, J., Galbally, J., Ortega-Garcia, J., Freire, M.R., Alonso-Fernandez, F., Ramos, D., Toledano, D.T., Gonzalez-Rodriguez, J., Siguenza, J.A., Garrido-Salas, J., Anguiano, E., de Rivera, G.G., Ribalda, R., Faundez-Zanuy, M., Ortega, J.A., Cardeoso-Payo, V., Viloria, A., Vivaracho, C.E., Moro, Q.I., Igarza, J.J., Sanchez, J., Hernaez, I., Orrite-Uruuela, C., Martinez-Contreras, F., Gracia-Roche, J.J.: BiosecurID: a multimodal biometric database. Pattern Analysis and Applications 13, 235–246 (2009)

    Article  MathSciNet  Google Scholar 

  14. Fierrez-Aguilar, J., Nanni, L., et al.: An On-Line Signature Verification System Based on Fusion of Local and Global Information. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 523–532. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Jain, A.K., Nandakumar, K., Ross, A.: Score normalization in multimodal biometric systems. Pattern Recognition 38, 2270–2285 (2005)

    Article  Google Scholar 

  16. Galbally, J.: Vulnerabilities and Attack Protection in Security Systems Based on Biometric Recognition. PhD thesis (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gomez-Barrero, M., Galbally, J., Fierrez, J., Ortega-Garcia, J. (2011). Hill-Climbing Attack Based on the Uphill Simplex Algorithm and Its Application to Signature Verification. In: Vielhauer, C., Dittmann, J., Drygajlo, A., Juul, N.C., Fairhurst, M.C. (eds) Biometrics and ID Management. BioID 2011. Lecture Notes in Computer Science, vol 6583. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19530-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19530-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19529-7

  • Online ISBN: 978-3-642-19530-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics