Bayesian Hill-Climbing Attack and Its Application to Signature Verification

A general hill-climbing attack algorithm based on Bayesian adaption is presented. The approach uses the scores provided by the matcher to adapt a global distribution computed from a development set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on a competitive feature-based signature verification system over the 330 users of the MCYT database. The results show a very high efficiency of the hill-climbing algorithm, which successfully bypassed the system for over 95% of the attacks.

[1]  Loris Nanni,et al.  An On-Line Signature Verification System Based on Fusion of Local and Global Information , 2005, AVBPA.

[2]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[3]  Ton van der Putte,et al.  Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.

[4]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[5]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[6]  Andy Adler,et al.  Biometric System Security , 2008 .

[7]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[8]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[9]  A. Pacut,et al.  Aliveness Detection for IRIS Biometrics , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[10]  Juan J. Igarza,et al.  MCYT baseline corpus: a bimodal biometric database , 2003 .

[11]  J. Fierrez-Aguilar,et al.  On the Vulnerability of Fingerprint Verification Systems to Fake Fingerprints Attacks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[12]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[13]  Josef Kittler,et al.  Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings , 2005, AVBPA.

[14]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[15]  David G. Stork,et al.  Pattern Classification , 1973 .