A residual feature-based replay attack detection approach for brainprint biometric systems

Brainprint biometrics, as an emerging biometric technology, have recently gained increasing attention based on the assumption that each individual has unique memory and knowledge that are capable of providing distinctness from others. Like all other biometric methods, adversaries can also circumvent and compromise brainprint biometric systems, for example, by incorporating small-scale noises into the brainprint template to synthesize a faked input. To address this security vulnerability, we propose a novel replay detection approach by taking advantage of noise residual features to detect if the input is adversely modified and generated by adding noises onto a legitimate brainprint template. Specifically, the proposed approach consists of two separate stages: the identity recognition stage, which uses the convolutional neural network (CNN) to classify the input brainwaves and thus verify the identity of the user; and the replay detection stage, which uses the ensemble classifier to detect if the brainwave signals have been compromised and manipulated by using noise residual features. Experimental results show that the proposed approach can effectively detect the replay attacks to the brainprint biometric systems, while maintaining a rather high level of user identification accuracy.

[1]  Zhanpeng Jin,et al.  Brainprint: Assessing the uniqueness, collectability, and permanence of a novel method for ERP biometrics , 2015, Neurocomputing.

[2]  Danilo P. Mandic,et al.  Biometrics from Brain Electrical Activity: A Machine Learning Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[3]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[4]  Patrizio Campisi,et al.  On the vulnerability of an EEG-based biometric system to hill-climbing attacks algorithms' comparison and possible countermeasures , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[5]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[6]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[7]  Zhanpeng Jin,et al.  CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Patrizio Campisi,et al.  Cognitive biometric cryptosystems a case study on EEG , 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP).

[9]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Patrizio Campisi,et al.  On the Permanence of EEG Signals for Biometric Recognition , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[12]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[13]  Patrizio Campisi,et al.  Brain waves for automatic biometric-based user recognition , 2014, IEEE Transactions on Information Forensics and Security.

[14]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[15]  Jessica J. Fridrich,et al.  Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.