Abstract
Currently, biometrics is being widely used for authentication and identification of an individual. The biometric systems itself needs to be more secured and reliable so it they can provide secure authentication in various applications. To optimize the security, it is vital that biometric authentication frameworks are intended to withstand various sources of attack. In security sensitive applications, there is a shrewd adversary component which intends to deceive the detection system. In a well-motivated attack scenario, in which there exists an attacker who may try to evade a well-established system at test time by cautiously altering attack samples, i.e., Evasion Attack. The aim of this work is to demonstrate that machine learning can be utilized to enhance system security, if one utilizes an adversary-aware approach that proactively intercept the attacker. Also, we present a basic but credible gradient based approach of evasion attack that can be exploited to methodically acquire the security of a Fingerprint Biometric Database.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bhattacharyya D et al (2009) Biometric authentication: a review. Int J u- e-Serv Sci Technol 2(3):13–28
Khorshidpour Z, Hashemi S, Hamzeh A (2016) Learning a secure classifier against evasion attack. In: 2016 IEEE 16th international conference on data mining workshops (ICDMW). IEEE
Biggio B, Fumera G, Roli F (2014) Security evaluation of pattern classifiers under attack. IEEE Trans Knowl Data Eng 26(4):984–996
Biggio B et al (2015) Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process Mag 32(5):31–41
Biggio B, Corona I, Maiorca D, Nelson B, Šrndić N, Laskov P, Giacinto G, Roli F (2013) Evasion attacks against machine learning at test time. In: Machine learning and knowledge discovery in databases. Springer, pp 387–402
Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2010) Can machine learning be secure? In: ASIACCS’06: Proceedings of the 2006 ACM symposium on information, computer and communication security, Cagliari, Cagliari (Italy), 2010 (cited at p xiv, 4) 111. ACM, New York, pp 16–25 (2006)
Biggio B, Fumera G, Roli F (2014) Pattern recognition systems under attack: design issues and research challenges. Int J Pattern Recognit Artif Intell 28(07):1460002
Huang L et al (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence. ACM
Biggio B, Fumera G, Roli F (2010) Multiple classifier systems for robust classifier design in adversarial environments. Int J Mach Learn Cybern 1(1):27–41
Biggio B, Fumera G, Roli F (2011) Design of robust classifiers for adversarial environments. In: IEEE international conference on systems, man, and cybernetics (SMC), pp 977–982
Zhang F, Chan PP, Biggio B, Yeung DS, Roli F (2016) Adversarial feature selection against evasion attacks. IEEE Trans Cybern 46(3):766–777
Demontis A et al (2017) Yes, machine learning can be more secure! A case study on android malware detection. IEEE Trans Dependable Secur Comput
Biggio B, Adversarial pattern classification. Diss. Ph.D. thesis, University of Cagliari, Piazza d’Armi, 09123 Cagliari, Italy
Sadeghi K et al (2016) Toward parametric security analysis of machine learning based cyber forensic biometric systems. In: 2016 15th IEEE international conference on machine learning and applications (ICMLA). IEEE
Roberts C (2007) Biometric attack vectors and defences. Comput Secur 26(1):14–25
Ratha NK, Connell JH, Bolle RM (2003) Biometrics break-ins and band-aids. Pattern Recogn Lett 24(13):2105–2113
Acknowledgements
We would like to express our deep and sincere gratitude to Dr. Manvjeet Kaur for her invaluable encouragement, suggestions, and support in this study and research. We would also like to acknowledge all the cited authors in this study. We would like to express our thanks to all those who contributed in many ways to the success of this study. With the best of our knowledge, all the information provided is authentic and revised.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lakshmi, S.M., Kaur, M., Shukla, A.K., Pathania, N. (2020). Evasion Attack for Fingerprint Biometric System and Countermeasure. In: Khanna, A., Gupta, D., Bhattacharyya, S., Snasel, V., Platos, J., Hassanien, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1059. Springer, Singapore. https://doi.org/10.1007/978-981-15-0324-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-15-0324-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0323-8
Online ISBN: 978-981-15-0324-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)