DeepIris: An ensemble approach to defending Iris recognition classifiers against Adversarial Attacks

被引:3
|
作者
Tamizhiniyan, S. R. [1 ]
Ojha, Aman [1 ]
Meenakshi, K. [2 ]
Maragatham, G. [2 ]
机构
[1] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Kattankulathur, India
[2] SRM Inst Sci & Technol, Dept Informat Technol, Kattankulathur, India
关键词
biometrics; Deep convolutional Neural Networks; adversarial attack; Defense method; encoder; security; iris classification;
D O I
10.1109/ICCCI50826.2021.9402404
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Despite being known for their robust performance in the biometrics domain, Deep Convolutional Neural Networks always face a high risk of being fooled by precisely engineered input samples. These samples are called adversarial examples and such attacks are called adversarial attacks. These attacks pose great threat to any biometric security system. In this paper, to guard against adversarial iris images, we propose defensive schemes. The first strategy we propose relies on our adversarial denoising encoder architecture. The second strategy relies on wavelet transformation to divide them into wavelet sub-bands following an U-net architecture wavelet domain denoising on processing each sub-band to remove the adversarial noise. We measure the efficiency against numerous attack scenarios of the suggested adversarial defence mechanism and equate the findings with state-of-the-art defence strategies.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Defending Adversarial Attacks Against ASV Systems Using Spectral Masking
    Sreekanth, Sankala
    Murty, Kodukula Sri Rama
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2024, 43 (7) : 4487 - 4507
  • [42] HeteroGuard: Defending Heterogeneous Graph Neural Networks against Adversarial Attacks
    Kumarasinghe, Udesh
    Nabeel, Mohamed
    De Zoysa, Kasun
    Gunawardana, Kasun
    Elvitigala, Charitha
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW, 2022, : 698 - 705
  • [43] PatchZero: Defending against Adversarial Patch Attacks by Detecting and Zeroing the Patch
    Xu, Ke
    Xiao, Yao
    Zheng, Zhaoheng
    Cai, Kaijie
    Nevatia, Ram
    2023 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV), 2023, : 4621 - 4630
  • [44] Defending malware detection models against evasion based adversarial attacks
    Rathore, Hemant
    Sasan, Animesh
    Sahay, Sanjay K.
    Sewak, Mohit
    PATTERN RECOGNITION LETTERS, 2022, 164 : 119 - 125
  • [45] ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions
    Lin, Ying-Dar
    Pratama, Jehoshua-Hanky
    Sudyana, Didik
    Lai, Yuan-Cheng
    Hwang, Ren-Hung
    Lin, Po-Ching
    Lin, Hsuan-Yu
    Lee, Wei-Bin
    Chiang, Chen-Kuo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [46] PatchBreaker: defending against adversarial attacks by cutting-inpainting patches and joint adversarial training
    Huang, Shiyu
    Ye, Feng
    Huang, Zuchao
    Li, Wei
    Huang, Tianqiang
    Huang, Liqing
    APPLIED INTELLIGENCE, 2024, 54 (21) : 10819 - 10832
  • [47] Classification of Adversarial Attacks Using Ensemble Clustering Approach
    Tatongjai, Pongsakorn
    Boongoen, Tossapon
    Iam-On, Natthakan
    Naik, Nitin
    Yang, Longzhi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 2479 - 2498
  • [48] It is double pleasure to deceive the deceiver: disturbing classifiers against adversarial attacks
    Zago, Joao G.
    Antonelo, Eric A.
    Baldissera, Fabio L.
    Saad, Rodrigo T.
    2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 160 - 165
  • [49] Sparsity-based Defense against Adversarial Attacks on Linear Classifiers
    Marzi, Zhinus
    Gopalakrishnan, Soorya
    Madhow, Upamanyu
    Pedarsani, Ramtin
    2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 31 - 35
  • [50] Securing Iris Recognition Systems Against Masquerade Attacks
    Galbally, Javier
    Gomez-Barrero, Marta
    Ross, Arun
    Fierrez, Julian
    Ortega-Garcia, Javier
    BIOMETRIC AND SURVEILLANCE TECHNOLOGY FOR HUMAN AND ACTIVITY IDENTIFICATION X, 2013, 8712