Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

作者: Daigo MURAMATSU

DOI: 10.1587/TRANSINF.E93.D.448

关键词:

摘要: Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose robust online signature verification algorithm against such attacks. Specifically, the attack considered in paper is forged data attack. Artificial forgeries are generated offline by method, and input to target system be attacked. analyze menace attacks six types incorporating method into an algorithm. Experiments evaluate proposed were performed public database. The showed improved performance kind

参考文章(22)
Andy Adler, Biometric System Security Springer, Boston, MA. pp. 381- 402 ,(2008) , 10.1007/978-0-387-71041-9_19
Anil K Jain, Friederike D Griess, Scott D Connell, On-Line Signature Verification Springer, Boston, MA. pp. 189- 209 ,(2008) , 10.1007/978-0-387-71041-9_10
Dit-Yan Yeung, Hong Chang, Yimin Xiong, Susan George, Ramanujan Kashi, Takashi Matsumoto, Gerhard Rigoll, SVC2004: First International Signature Verification Competition Biometric Authentication. ,vol. 3072, pp. 16- 22 ,(2004) , 10.1007/978-3-540-25948-0_3
Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferrara, Dario Maio, Davide Maltoni, Nesma Houmani, Sonia Garcia-Salicetti, Aurélien Mayoue, Fingerprint and On-Line Signature Verification Competitions at ICB 2009 international conference on biometrics. ,vol. 5558, pp. 725- 732 ,(2009) , 10.1007/978-3-642-01793-3_74
Lawrence Rabiner, Biing-Hwang Juang, Fundamentals of speech recognition ,(1993)
J. M. Pascual-Gaspar, V. Cardeñoso-Payo, C. E. Vivaracho-Pascual, Practical On-Line Signature Verification international conference on biometrics. pp. 1180- 1189 ,(2009) , 10.1007/978-3-642-01793-3_119
Javier Galbally, Julian Fierrez, Javier Ortega-Garcia, Bayesian hill-climbing attack and its application to signature verification international conference on biometrics. pp. 386- 395 ,(2007) , 10.1007/978-3-540-74549-5_41
Andy Adler, Vulnerabilities in biometric encryption systems Lecture Notes in Computer Science. pp. 1100- 1109 ,(2005) , 10.1007/11527923_114
Umut Uludag, Anil K. Jain, Attacks on biometric systems: a case study in fingerprints conference on security steganography and watermarking of multimedia contents. ,vol. 5306, pp. 622- 633 ,(2004) , 10.1117/12.530907
FRANCK LECLERC, RÉJEAN PLAMONDON, AUTOMATIC SIGNATURE VERIFICATION: THE STATE OF THE ART—1989–1993 International Journal of Pattern Recognition and Artificial Intelligence. ,vol. 8, pp. 643- 660 ,(1994) , 10.1142/S0218001494000346