...
首页> 外文期刊>IEICE transactions on information and systems >A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
【24h】

A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack

机译:A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack

获取原文
获取原文并翻译 | 示例
           

摘要

The security of bioraetric authentication systems against impersonation attack is usually evaluated by the false accept rate, FAR. The false accept rate FAR is a metric for zero-effort impersonation attack assuming that the attacker attempts to impersonate a user by presenting his own biometric sample to the system. However, when the attacker has some information about algorithms in the biometric authentication system, he might be able to find a "strange" sample (called a wolf) which shows high similarity to many templates and attempt to impersonate a user by presenting a wolf. Une, Otsuka, Imai 22, 23 formulated such a stronger impersonation attack (called it wolf attack), defined a new security metric (called wolf attack probability, WAP), and showed that WAP is extremely higher than FAR in a fingerprint-minutiae matching algorithm proposed by Ratha et al. 19 and in a finger-vein-patterns matching algorithm proposed by Miura et al. 15. Previously, we constructed secure matching algorithms based on a feature-dependent threshold approach 8 and showed that if the score distribution is perfectly estimated for each input feature data, then the proposed algorithms can lower WAP to a small value almost the same as FAR. In this paper, in addition to reintroducing the results of our previous work 8, we show that the proposed matching algorithm can keep the false reject rate (FRR) low enough without degrading security, if the score distribution is normal for each feature data.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号