Protection against adversarial attacks with randomization of recognition algorithm

被引:0
|
作者
Marshalko, Grigory [1 ,2 ]
Koreshkova, Svetlana [3 ]
机构
[1] Tech Comm Standardisat Cryptog & Secur Mech TC 02, Moscow, Russia
[2] Higher Sch Econ, Moscow, Russia
[3] JSC Kryptonite, Moscow, Russia
关键词
Biometric recognition; Statistical distance; Local binary patterns; Password based authentication;
D O I
10.1007/s11416-023-00503-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a randomized variant of one type of biometric recognition algorithms, which is intended to mitigate adversarial attacks. We show that the problem of an estimation of the security of the proposed algorithm can be formulated in the form of an estimation of statistical distance between the probability distributions, induced by the initial and the randomized algorithm. A variant of practical password-based implementation is discussed. The results of experimental evaluation are given. The preliminary verison of this research was presented at CTCrypt 2020 workshop.
引用
收藏
页码:127 / 133
页数:7
相关论文
共 50 条
  • [21] It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
    Crane, Stephen
    Volckaert, Stijn
    Schuster, Felix
    Liebchen, Christopher
    Larsen, Per
    Davi, Lucas
    Sadeghi, Ahmad-Reza
    Holz, Thorsten
    De Sutter, Bjorn
    Franz, Michael
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 243 - 255
  • [22] Protection against buffer overflow attacks through runtime memory layout randomization
    Kumar, K. Shiva
    Kisore, N. Raghu
    2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, : 184 - 189
  • [23] Discretization Inspired Defence Algorithm Against Adversarial Attacks on Tabular Data
    Zhou, Jiahui
    Zaidi, Nayyar
    Zhang, Yishuo
    Li, Gang
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT II, 2022, 13281 : 367 - 379
  • [24] Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
    Marshev, I. I.
    Zhukovskii, E., V
    Aleksandrova, E. B.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1025 - 1028
  • [25] Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
    I. I. Marshev
    E. V. Zhukovskii
    E. B. Aleksandrova
    Automatic Control and Computer Sciences, 2021, 55 : 1025 - 1028
  • [26] Countermeasure for the Protection of Face Recognition Systems Against Mask Attacks
    Kose, Neslihan
    Dugelay, Jean-Luc
    2013 10TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG), 2013,
  • [27] Adversarial attacks by attaching noise markers on the face against deep face recognition
    Ryu, Gwonsang
    Park, Hosung
    Choi, Daeseon
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [28] Unravelling Robustness of Deep Learning Based Face Recognition against Adversarial Attacks
    Goswami, Gaurav
    Ratha, Nalini
    Agarwal, Akshay
    Singh, Richa
    Vatsa, Mayank
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 6829 - 6836
  • [29] DeepIris: An ensemble approach to defending Iris recognition classifiers against Adversarial Attacks
    Tamizhiniyan, S. R.
    Ojha, Aman
    Meenakshi, K.
    Maragatham, G.
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [30] Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
    Schoenherr, Lea
    Kohls, Katharina
    Zeiler, Steffen
    Holz, Thorsten
    Kolossa, Dorothea
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,