Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective

@article{Biggio2015AdversarialBR,
  title={Adversarial Biometric Recognition : A review on biometric system security from the adversarial machine-learning perspective},
  author={B. Biggio and G. Fumera and P. Russu and Luca Didaci and F. Roli},
  journal={IEEE Signal Processing Magazine},
  year={2015},
  volume={32},
  pages={31-41}
}
  • B. Biggio, G. Fumera, +2 authors F. Roli
  • Published 2015
  • Computer Science
  • IEEE Signal Processing Magazine
  • In this article, we review previous work on biometric security under a recent framework proposed in the field of adversarial machine learning. This allows us to highlight novel insights on the security of biometric systems when operating in the presence of intelligent and adaptive attackers that manipulate data to compromise normal system operation. We show how this framework enables the categorization of known and novel vulnerabilities of biometric recognition systems, along with the… CONTINUE READING
    48 Citations
    Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating
    • 6
    • Highly Influenced
    • PDF
    Characterizing and Evaluating Adversarial Examples for Offline Handwritten Signature Verification
    • 11
    • Highly Influenced
    • PDF
    A taxonomy and survey of attacks against machine learning
    • 14
    • PDF
    Protection of Privacy in Biometric Data
    • 39
    • PDF
    Adaptive Biometric Systems: Review and Perspectives
    • 5
    On the guessability of binary biometric templates: A practical guessing entropy based approach
    • 3
    • PDF
    Secure Detection of Image Manipulation by Means of Random Feature Selection
    • 12
    • PDF

    References

    SHOWING 1-10 OF 34 REFERENCES
    Poisoning attacks to compromise face templates
    • 60
    • PDF
    Biometric Template Security
    • 723
    • PDF
    Poisoning Adaptive Biometric Systems
    • 41
    • PDF
    Security Evaluation of Pattern Classifiers under Attack
    • 298
    • PDF
    Vulnerabilities in Biometric Encryption Systems
    • 156
    • PDF
    Multimodal fusion vulnerability to non-zero effort (spoof) imposters
    • 82
    • PDF
    Robustness of multimodal biometric fusion methods against spoof attacks
    • 169
    • PDF
    An evaluation of indirect attacks and countermeasures in fingerprint verification systems
    • 41
    • PDF