Documente Academic
Documente Profesional
Documente Cultură
Abstract Since, their are numerous advantages of biometrics-based authentication systems over traditional security systems based on
knowledge, they are susceptible to attacks that can decrease their security significantly. We analyze these attacks in the multibiometric system.
We propose an attack system that uses a hill climbing procedure to synthesize the targeted templates and evaluate its achievability with
experimental results conducted on large databases. Hill climbing attack is nothing but security attack based on generating artificial data, after
analyzing the output; updating such data, so as to improve the output. This is done repeatedly till output is desire output. So that, several actions
can be utilized to decrease the probability of such attacks and their result are also presented. Some of the measures are uni form quantization
techniques, non-uniform quantization techniques and many more. We are using uniform quantization, as quantization is the process of mapping
a set of continuous pixel values into a finite numbers of possible values. The template division can be done on the basis of uniform quantized
method which replicates the principle of uniform or linear quantizer has all the quantization levels uniformly distributed in the interval.
Keywords- Hill climbig attack, Nelder-Mead method, Uniform quantization, Multibiometrics, Authentication
__________________________________________________*****_________________________________________________
197
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 8 196 - 200
______________________________________________________________________________________
possible values. The template division can be done on the This method doesnt require any derivative
basis of uniform quantized Method which replicates the information, which is suitable for problems with non-smooth
principle of a uniform or linear quantizer has all the functions. It is generally used to solve parameter estimation
quantization levels uniformly distributed in the and similar statistical problems, where the function values are
interval (except possibly the two intervals at the boundaries tentative or subject to noise. It can also be used for problems
when the range of possible amplitudes is innite). with discontinuous functions, which occur frequently in
With the obtained score at each level, we will make statistics and experimental mathematics.
further movement and if find sample size is mismatching 2/n
size of total samples then will say error bound in finding B. Uniform quantization
matching template else the process will continue till last When a solution is introduced in a biometric system
samples and if all samples are obtained as requisite then to minimize the risk of attack, it should be evaluated while
authentication will be provided. This will be the case for considering two main parameters:
fingerprint and iris template which will provide better Effect of the countermeasure in the system
authentication terminology with respect to synthetic template performance. The inclusion of a particular protection
generation which can be definitely prevented. scheme might change the false acceptance rate (FAR)
Fig.2. shows flow of execution of attack and their and false rejection rate (FRR) of a system, and these
countermeasure. In this project, we are considering the image changes should be evaluated and reported
which will be registered by the user at first time. After this Performance of the countermeasure, i.e. impact of the
when user comes for authentication, the image meant for countermeasure in the Security rate (SR) and Eff
authentication will be evaluated for Enhanced Nelder-Mead
(efficiency) of the attack.
Algorithm. Among the biometric-based approaches to reduce the
With this image will be the Nelder-Mead algorithm is effects of hill-climbing attack, score quantization technique
normally initialized by arbitrarily picking samples from the has been proposed as an effective countermeasure.
estimated distribution of the N considered features, assumed to Quantization is the process of mapping a set of continuous
be independent and with Gaussian behaviors. To prevent hill pixel values into a nite number of possible values. The
climbing attack, we will be implementing uniform score template division can be done on the basis of Uniform
quantization. It is used for increasing the system security
Quantized Method which replicates the principle of a uniform
against the hill-climbing attack, although not achieving proper
or linear quantizer has all the quantization levels uniformly
robustness against the studied attack.
distributed in the interval.
198
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 8 196 - 200
______________________________________________________________________________________
F. Uniform plane database. It calculated the percentage of invalid
Here, uniform plane is created while dividing the inputs that are incorrectly accepted. In case of
biometric samples in to n number of parts, compare extracted similarity range, if the person is an imposter in
score of each part with image in the database if match found reality, but the matching score is higher than the
score counter is increased and continues if it doesnt matches threshold, then person is treated as genuine.
then continues to match next plane if up to last plane, counter
is below the threshold value, then hill climbing attack is FAR= Number of false acceptance/ Number client
detected. accesses (3)
199
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 8 196 - 200
______________________________________________________________________________________
countermeasures, in Proc. IEEE BTAS, Sep./Oct. 2013,
pp. 16.
[6] E. Maiorana, G. E. Hine, D. La Rocca, and P. Campisi, On
the vulnerability of an EEG-based biometric system to hill-
climbing attacks algorithms comparison and possible
countermeasures, in Proc. IEEE BTAS, Sep./Oct. 2013, pp.
16.
[7] J. A. Nelder and R. Mead, A simplex method for function
minimization, Comput. J., vol. 7, no. 4, pp. 308313,
1965.
[8] Hooke R & Jeeves T A., Hooke-Jeeves Revisited,I
Moser, Member, IEEE, 2009
[9] Hooke R & Jeeves T A., Hooke-Jeeves Revisited,I
Moser, Member, IEEE, 2009
[10] P. Gilmore and C. T. Kelley, An implicit filtering
algorithm for optimization of functions with many local
minima, SIAM J. Optim., vol. 5, no. 2, pp. 269285, 1995.
[11] Emanuele Maiorana, Gabriel Emile Hine and Patrizio
Campisi, Hill-Climbing Attacks on Multibiometrics
Recognition Systems, IEEE Trans. Inf. Theory, VOL. 10,
NO. 5, MAY 2015.
200
IJRITCC | August 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________