DeepMasterPrint: Fingerprint Spoofing via Latent Variable Evolution

Biometric authentication is important for a large range of systems, including but not limited to consumer electronic devices such as phones. Understanding the limits of and attacks on such systems is therefore crucial. This paper presents an attack on fingerprint recognition system using MasterPrints, synthetic fingerprints that are capable of spoofing multiple people’s fingerprints. The method described is the first to generate complete image-level Masterprints, and further exceeds the attack accuracy of previous methods that could not produce complete images. The method, Latent Variable Evolution, is based on training a Generative Adversarial Network on a set of real fingerprint images. Stochastic search in the form of the Covariance Matrix Adaptation Evolution Strategy is then used to search for latent variable (inputs) to the generator network that optimize the number of matches from a fingerprint recognizer. We find MasterPrints that a commercial fingerprint system matches to 23% of all users in a strict security setting, and 77% of all users at a looser security setting. The underlying method is likely to have broad usefulness for security research as well as in aesthetic domains.

[1]  Julian Togelius,et al.  Deep Interactive Evolution , 2018, EvoMUSART.

[2]  Kenneth O. Stanley,et al.  Safe mutations for deep and recurrent neural networks through output gradients , 2017, GECCO.

[3]  Mario Lucic,et al.  Are GANs Created Equal? A Large-Scale Study , 2017, NeurIPS.

[4]  Jaakko Lehtinen,et al.  Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.

[5]  Yi Zhang,et al.  Do GANs actually learn the distribution? An empirical study , 2017, ArXiv.

[6]  Arun Ross,et al.  MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Aaron C. Courville,et al.  Improved Training of Wasserstein GANs , 2017, NIPS.

[8]  Ian J. Goodfellow,et al.  NIPS 2016 Tutorial: Generative Adversarial Networks , 2016, ArXiv.

[9]  Anil K. Jain,et al.  Fingerprint image analysis: role of orientation patch and ridge structure dictionaries , 2015 .

[10]  Soumith Chintala,et al.  Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.

[11]  Christoph Busch,et al.  Presentation attack detection methods for fingerprint recognition systems: a survey , 2014, IET Biom..

[12]  Aaron C. Courville,et al.  Generative Adversarial Nets , 2014, NIPS.

[13]  Anil K. Jain,et al.  Segmentation and Enhancement of Latent Fingerprints: A Coarse to Fine RidgeStructure Dictionary , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  Xin Yang,et al.  A cross-device matching fingerprint database from multi-type sensors , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).

[15]  Anil K. Jain,et al.  Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[16]  Hideki Imai,et al.  Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems , 2007, ICB.

[17]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[18]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[19]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[20]  Nikolaus Hansen,et al.  Completely Derandomized Self-Adaptation in Evolution Strategies , 2001, Evolutionary Computation.

[21]  Anil K. Jain,et al.  Learning Fingerprint Reconstruction: From Minutiae to Image , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Nikolaus Hansen,et al.  The CMA Evolution Strategy: A Comparing Review , 2006, Towards a New Evolutionary Computation.

[23]  X. Yao Evolving Artificial Neural Networks , 1999 .