Skip to main content

Evasion Attack for Fingerprint Biometric System and Countermeasure

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1059))

Abstract

Currently, biometrics is being widely used for authentication and identification of an individual. The biometric systems itself needs to be more secured and reliable so it they can provide secure authentication in various applications. To optimize the security, it is vital that biometric authentication frameworks are intended to withstand various sources of attack. In security sensitive applications, there is a shrewd adversary component which intends to deceive the detection system. In a well-motivated attack scenario, in which there exists an attacker who may try to evade a well-established system at test time by cautiously altering attack samples, i.e., Evasion Attack. The aim of this work is to demonstrate that machine learning can be utilized to enhance system security, if one utilizes an adversary-aware approach that proactively intercept the attacker. Also, we present a basic but credible gradient based approach of evasion attack that can be exploited to methodically acquire the security of a Fingerprint Biometric Database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhattacharyya D et al (2009) Biometric authentication: a review. Int J u- e-Serv Sci Technol 2(3):13–28

    Google Scholar 

  2. Khorshidpour Z, Hashemi S, Hamzeh A (2016) Learning a secure classifier against evasion attack. In: 2016 IEEE 16th international conference on data mining workshops (ICDMW). IEEE

    Google Scholar 

  3. Biggio B, Fumera G, Roli F (2014) Security evaluation of pattern classifiers under attack. IEEE Trans Knowl Data Eng 26(4):984–996

    Article  Google Scholar 

  4. Biggio B et al (2015) Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process Mag 32(5):31–41

    Article  Google Scholar 

  5. Biggio B, Corona I, Maiorca D, Nelson B, Šrndić N, Laskov P, Giacinto G, Roli F (2013) Evasion attacks against machine learning at test time. In: Machine learning and knowledge discovery in databases. Springer, pp 387–402

    Google Scholar 

  6. Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2010) Can machine learning be secure? In: ASIACCS’06: Proceedings of the 2006 ACM symposium on information, computer and communication security, Cagliari, Cagliari (Italy), 2010 (cited at p xiv, 4) 111. ACM, New York, pp 16–25 (2006)

    Google Scholar 

  7. Biggio B, Fumera G, Roli F (2014) Pattern recognition systems under attack: design issues and research challenges. Int J Pattern Recognit Artif Intell 28(07):1460002

    Article  Google Scholar 

  8. Huang L et al (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence. ACM

    Google Scholar 

  9. Biggio B, Fumera G, Roli F (2010) Multiple classifier systems for robust classifier design in adversarial environments. Int J Mach Learn Cybern 1(1):27–41

    Article  Google Scholar 

  10. Biggio B, Fumera G, Roli F (2011) Design of robust classifiers for adversarial environments. In: IEEE international conference on systems, man, and cybernetics (SMC), pp 977–982

    Google Scholar 

  11. Zhang F, Chan PP, Biggio B, Yeung DS, Roli F (2016) Adversarial feature selection against evasion attacks. IEEE Trans Cybern 46(3):766–777

    Article  Google Scholar 

  12. Demontis A et al (2017) Yes, machine learning can be more secure! A case study on android malware detection. IEEE Trans Dependable Secur Comput

    Google Scholar 

  13. Biggio B, Adversarial pattern classification. Diss. Ph.D. thesis, University of Cagliari, Piazza d’Armi, 09123 Cagliari, Italy

    Google Scholar 

  14. Sadeghi K et al (2016) Toward parametric security analysis of machine learning based cyber forensic biometric systems. In: 2016 15th IEEE international conference on machine learning and applications (ICMLA). IEEE

    Google Scholar 

  15. Roberts C (2007) Biometric attack vectors and defences. Comput Secur 26(1):14–25

    Article  MathSciNet  Google Scholar 

  16. Ratha NK, Connell JH, Bolle RM (2003) Biometrics break-ins and band-aids. Pattern Recogn Lett 24(13):2105–2113

    Article  Google Scholar 

Download references

Acknowledgements

We would like to express our deep and sincere gratitude to Dr. Manvjeet Kaur for her invaluable encouragement, suggestions, and support in this study and research. We would also like to acknowledge all the cited authors in this study. We would like to express our thanks to all those who contributed in many ways to the success of this study. With the best of our knowledge, all the information provided is authentic and revised.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sripada Manasa Lakshmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lakshmi, S.M., Kaur, M., Shukla, A.K., Pathania, N. (2020). Evasion Attack for Fingerprint Biometric System and Countermeasure. In: Khanna, A., Gupta, D., Bhattacharyya, S., Snasel, V., Platos, J., Hassanien, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1059. Springer, Singapore. https://doi.org/10.1007/978-981-15-0324-5_7

Download citation

Publish with us

Policies and ethics