Masquerade attack on biometric hashing via BiohashGAN.
Uložené v:
| Názov: | Masquerade attack on biometric hashing via BiohashGAN. |
|---|---|
| Autori: | Wu, Zhangyong, Meng, Ke, Wo, Yan, Zhong, Xudong |
| Zdroj: | Visual Computer; Mar2022, Vol. 38 Issue 3, p821-835, 15p |
| Predmety: | GENERATIVE adversarial networks, BIOMETRY, MASQUERADES, HUMAN facial recognition software |
| Abstrakt: | Masquerade attack on biometric hashing, which reconstructs the original biometric image from the given hashcode, has been given much attention recently. It is mainly used to validate the security of biometric recognition system or expand existing biometric databases like face or iris. However, an existing state-of-the-art method tends to ignore the perceptual quality of synthesized biometric images in the attack, and consequently, the synthetic images can be easily differentiated from real images. To obtain the high-perceptual-quality image which can simultaneously pass the validation of recognition system, we introduce a new target combining semantic invariability in hashing space and perceptual similarity in biometric space. In order to simulate the mapping from images to hashcodes and tackle the derivative problem related to discrete hashcodes in hashing space, we propose a DNN-based network named SimHashNet. Then we incorporate the SimHashNet into a generative adversarial network as our model named BiohashGAN to generate synthetic images form hashcodes. Experiment result on dataset CASIA-IrisV4.0-Interval and CMU PIE demonstrates that the synthetic images obtained from our model can pass the validation of recognition system and simultaneously maintain high perceptual quality. [ABSTRACT FROM AUTHOR] |
| Copyright of Visual Computer is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Databáza: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=01782789&ISBN=&volume=38&issue=3&date=20220301&spage=821&pages=821-835&title=Visual Computer&atitle=Masquerade%20attack%20on%20biometric%20hashing%20via%20BiohashGAN.&aulast=Wu%2C%20Zhangyong&id=DOI:10.1007/s00371-020-02053-7 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Wu%20Z Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 155691395 RelevancyScore: 922 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 921.822387695313 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Masquerade attack on biometric hashing via BiohashGAN. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Wu%2C+Zhangyong%22">Wu, Zhangyong</searchLink><br /><searchLink fieldCode="AR" term="%22Meng%2C+Ke%22">Meng, Ke</searchLink><br /><searchLink fieldCode="AR" term="%22Wo%2C+Yan%22">Wo, Yan</searchLink><br /><searchLink fieldCode="AR" term="%22Zhong%2C+Xudong%22">Zhong, Xudong</searchLink> – Name: TitleSource Label: Source Group: Src Data: Visual Computer; Mar2022, Vol. 38 Issue 3, p821-835, 15p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22GENERATIVE+adversarial+networks%22">GENERATIVE adversarial networks</searchLink><br /><searchLink fieldCode="DE" term="%22BIOMETRY%22">BIOMETRY</searchLink><br /><searchLink fieldCode="DE" term="%22MASQUERADES%22">MASQUERADES</searchLink><br /><searchLink fieldCode="DE" term="%22HUMAN+facial+recognition+software%22">HUMAN facial recognition software</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: Masquerade attack on biometric hashing, which reconstructs the original biometric image from the given hashcode, has been given much attention recently. It is mainly used to validate the security of biometric recognition system or expand existing biometric databases like face or iris. However, an existing state-of-the-art method tends to ignore the perceptual quality of synthesized biometric images in the attack, and consequently, the synthetic images can be easily differentiated from real images. To obtain the high-perceptual-quality image which can simultaneously pass the validation of recognition system, we introduce a new target combining semantic invariability in hashing space and perceptual similarity in biometric space. In order to simulate the mapping from images to hashcodes and tackle the derivative problem related to discrete hashcodes in hashing space, we propose a DNN-based network named SimHashNet. Then we incorporate the SimHashNet into a generative adversarial network as our model named BiohashGAN to generate synthetic images form hashcodes. Experiment result on dataset CASIA-IrisV4.0-Interval and CMU PIE demonstrates that the synthetic images obtained from our model can pass the validation of recognition system and simultaneously maintain high perceptual quality. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of Visual Computer is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=155691395 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1007/s00371-020-02053-7 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 15 StartPage: 821 Subjects: – SubjectFull: GENERATIVE adversarial networks Type: general – SubjectFull: BIOMETRY Type: general – SubjectFull: MASQUERADES Type: general – SubjectFull: HUMAN facial recognition software Type: general Titles: – TitleFull: Masquerade attack on biometric hashing via BiohashGAN. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Wu, Zhangyong – PersonEntity: Name: NameFull: Meng, Ke – PersonEntity: Name: NameFull: Wo, Yan – PersonEntity: Name: NameFull: Zhong, Xudong IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 03 Text: Mar2022 Type: published Y: 2022 Identifiers: – Type: issn-print Value: 01782789 Numbering: – Type: volume Value: 38 – Type: issue Value: 3 Titles: – TitleFull: Visual Computer Type: main |
| ResultId | 1 |
Full Text Finder
Nájsť tento článok vo Web of Science