Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Analysis on Secure Triplet Lossopen access

Authors
Jeong, BoraKim, SunpillPaik, SeunghunSeo, Jae Hong
Issue Date
Nov-2022
Publisher
Institute of Electrical and Electronics Engineers Inc.
Keywords
Deep learning; Measurement; Privacy; Face recognition; Biological system modeling; Closed box; Impersonation attacks; Authentication; biometrics; face recognition; impersonation attack
Citation
IEEE Access, v.10, pp.124355 - 124362
Indexed
SCIE
SCOPUS
Journal Title
IEEE Access
Volume
10
Start Page
124355
End Page
124362
URI
https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/185116
DOI
10.1109/ACCESS.2022.3225430
ISSN
2169-3536
Abstract
Major improvements in biometric authentication have been made in recent years due to the advancements in deep learning. Through the use of a deep learning-based facial recognition model with metric learning, more discriminative facial features can be extracted from faces. A large threat to user privacy could result from the disclosure of more discriminatory feature vectors related to biometric information. Among many biometric template protection (BTP) schemes, there have been studies that have attempted to protect feature vectors from the learning process of facial recognition models, while considering security requirements. One of them is secure triplet loss (STL) based BTP, which is an end-to-end BTP scheme using deep learning model that merges an additional layer on a pre-trained facial recognition model. STL-based BTP takes a pre-defined key and an image as inputs, and it is designed to become closer only when both the identity and the key are matched simultaneously. In this paper, we propose an efficient impersonation attack algorithm on STL-based BTP and our impersonation attack algorithm is conducted in a black-box setting using only the similarity scores between a target template and the template from the queried image and key pair. We have succeed in the impersonation attack using approximately 329.59 and 256.57 queries for the two types of black-box target systems. Furthermore, we conduct an analysis of our impersonation attack algorithm along with the implementation code.
Files in This Item
Appears in
Collections
서울 자연과학대학 > 서울 수학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Seo, Jae Hong photo

Seo, Jae Hong
COLLEGE OF NATURAL SCIENCES (DEPARTMENT OF MATHEMATICS)
Read more

Altmetrics

Total Views & Downloads

BROWSE