Faking it, Making it: Fooling and Improving Brain-Based Authentication with Generative Adversarial Networks

In this paper, we empirically demonstrate the vulnerability of a passthought authentication system to fake signals generated by Generative Adversarial Networks (GANs), and use these same signals to make authenticators more robust. We first train a classifier that is able to authenticate a subject based on their EEG signals. The classifier performs a binary classification task: either the user is who they claim to be, or not. To test the robustness of the authenticator against attacks we train a GAN to generate signals that mimic the EEG signals of the “positive” subject. We find that a well-trained GAN is able to generate signals that the classifier consistently accepts. To alleviate this vulnerability, we re-train the classifier with this GAN-generated data. We find that the classifier re-trained against synthetic data is both more robust against this attack, and more accurate in accepting real data than the initial classifier. We conclude with recommendations for the design of passthought authentication systems.

[1]  W. M. Gentleman,et al.  Fast Fourier Transforms: for fun and profit , 1966, AFIPS '66 (Fall).

[2]  John C.-I. Chuang,et al.  Passthoughts authentication with low cost EarEEG , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[3]  Vishal M. Patel,et al.  Generative adversarial network-based synthesis of visible faces from polarimetrie thermal faces , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[4]  Julie Thorpe,et al.  Pass-thoughts: authenticating with our minds , 2005, NSPW '05.

[5]  Mubarak Shah,et al.  Generative Adversarial Networks Conditioned by Brain Signals , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[6]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[7]  Richard Matovu,et al.  Your substance abuse disorder is an open secret! Gleaning sensitive personal information from templates in an EEG-based authentication system , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[8]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[9]  Yoshua Bengio,et al.  Generative Adversarial Networks , 2014, ArXiv.

[10]  Sepp Hochreiter,et al.  The Vanishing Gradient Problem During Learning Recurrent Neural Nets and Problem Solutions , 1998, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[11]  Andrew B. Schwartz,et al.  Brain-Controlled Interfaces: Movement Restoration with Neural Prosthetics , 2006, Neuron.

[12]  Bernard Widrow,et al.  The basic ideas in neural networks , 1994, CACM.

[13]  John C.-I. Chuang,et al.  Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World , 2017, NSPW.

[14]  Charles Wang,et al.  I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves , 2013, Financial Cryptography Workshops.

[15]  Benjamin Johnson,et al.  My thoughts are not your thoughts , 2014, UbiComp Adjunct.

[16]  Zhigang Li,et al.  Generate Identity-Preserving Faces by Generative Adversarial Networks , 2017, ArXiv.

[17]  Tianqi Chen,et al.  Empirical Evaluation of Rectified Activations in Convolutional Network , 2015, ArXiv.