A study on security evaluation methodology for image-based biometrics authentication systems

Yasuhiro Tanabe, Kazuki Yoshizoe, Hideki Imai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

We propose here a security evaluation methodology of image-based biometrics authentication systems against wolf attacks. A wolf attack is an attempt to impersonate a victim by feeding wolves into the system to be attacked. The wolf is input data that can be falsely accepted as a match with multiple templates. To create a secure system, we must evaluate the possibility of wolf attacks. Existing studies have relied on theoretical analysis of algorithms carried out by human beings, which is only effective if theoretical analysis is possible. Therefore, we propose a more generic approach based on a search to assist the developers of matching algorithms. We searched for wolves by using a recently developed algorithm called Monte-Carlo Tree Search (MCTS). We succeeded in detecting wolves in a matching algorithm, which appears promising considering that this is the first trial for this kind of approach.

Original languageEnglish
Title of host publicationIEEE 3rd International Conference on Biometrics
Subtitle of host publicationTheory, Applications and Systems, BTAS 2009
DOIs
Publication statusPublished - 2009
Externally publishedYes
EventIEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009 - Washington, DC, United States
Duration: Sep 28 2009Sep 30 2009

Publication series

NameIEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009

Conference

ConferenceIEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009
Country/TerritoryUnited States
CityWashington, DC
Period9/28/099/30/09

All Science Journal Classification (ASJC) codes

  • Biotechnology
  • Computational Theory and Mathematics
  • Computer Vision and Pattern Recognition

Fingerprint

Dive into the research topics of 'A study on security evaluation methodology for image-based biometrics authentication systems'. Together they form a unique fingerprint.

Cite this