{"title":"基于图像的生物识别认证系统安全评估方法研究","authors":"Yasuhiro Tanabe, Kazuki Yoshizoe, H. Imai","doi":"10.1109/BTAS.2009.5339016","DOIUrl":null,"url":null,"abstract":"We propose here a security evaluation methodology of image-based biometrics authentication systems against wolf attacks. A wolf attack is an attempt to impersonate a victim by feeding wolves into the system to be attacked. The wolf is input data that can be falsely accepted as a match with multiple templates. To create a secure system, we must evaluate the possibility of wolf attacks. Existing studies have relied on theoretical analysis of algorithms carried out by human beings, which is only effective if theoretical analysis is possible. Therefore, we propose a more generic approach based on a search to assist the developers of matching algorithms. We searched for wolves by using a recently developed algorithm called Monte-Carlo Tree Search (MCTS). We succeeded in detecting wolves in a matching algorithm, which appears promising considering that this is the first trial for this kind of approach.","PeriodicalId":325900,"journal":{"name":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"A study on security evaluation methodology for image-based biometrics authentication systems\",\"authors\":\"Yasuhiro Tanabe, Kazuki Yoshizoe, H. Imai\",\"doi\":\"10.1109/BTAS.2009.5339016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose here a security evaluation methodology of image-based biometrics authentication systems against wolf attacks. A wolf attack is an attempt to impersonate a victim by feeding wolves into the system to be attacked. The wolf is input data that can be falsely accepted as a match with multiple templates. To create a secure system, we must evaluate the possibility of wolf attacks. Existing studies have relied on theoretical analysis of algorithms carried out by human beings, which is only effective if theoretical analysis is possible. Therefore, we propose a more generic approach based on a search to assist the developers of matching algorithms. We searched for wolves by using a recently developed algorithm called Monte-Carlo Tree Search (MCTS). We succeeded in detecting wolves in a matching algorithm, which appears promising considering that this is the first trial for this kind of approach.\",\"PeriodicalId\":325900,\"journal\":{\"name\":\"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BTAS.2009.5339016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BTAS.2009.5339016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A study on security evaluation methodology for image-based biometrics authentication systems
We propose here a security evaluation methodology of image-based biometrics authentication systems against wolf attacks. A wolf attack is an attempt to impersonate a victim by feeding wolves into the system to be attacked. The wolf is input data that can be falsely accepted as a match with multiple templates. To create a secure system, we must evaluate the possibility of wolf attacks. Existing studies have relied on theoretical analysis of algorithms carried out by human beings, which is only effective if theoretical analysis is possible. Therefore, we propose a more generic approach based on a search to assist the developers of matching algorithms. We searched for wolves by using a recently developed algorithm called Monte-Carlo Tree Search (MCTS). We succeeded in detecting wolves in a matching algorithm, which appears promising considering that this is the first trial for this kind of approach.