Defending against Adversarial Fingerprint Attacks based on Deep Image Prior
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yoo, Hwajung | - |
dc.contributor.author | Hong, Pyo Min | - |
dc.contributor.author | Kim, Taeyong | - |
dc.contributor.author | Yoon, Jung Won | - |
dc.contributor.author | Lee, Youn Kyu | - |
dc.date.accessioned | 2023-12-11T07:31:04Z | - |
dc.date.available | 2023-12-11T07:31:04Z | - |
dc.date.issued | 2023 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/32109 | - |
dc.description.abstract | Recently, deep learning-based biometric authentication systems, especially fingerprint authentication, have been used widely in real-world. However, these systems are vulnerable to adversarial attack which prevents deep learning model from distinguishing input data properly. To solve these problems, various defense methods have been proposed, especially utilizing denoising mechanism, but they provided limited defense performance. In this study, we proposed a newdefense method against adversarial fingerprint attacks. To ensure defense performance, we have introduced Deep Image Prior mechanism which has superior performance in image reconstruction without prior training and a large amount of dataset. The proposed method aims to remove adversarial perturbations of input fingerprint image and reconstruct it close to original fingerprint image by adapting Deep Image Prior. Our method has achieved robust defense performance against various types of adversarial fingerprint attacks across different datasets, encompassing variations in sensors, shapes, and materials of fingerprint images. Furthermore, our method has demonstrated that it is superior to other image reconstruction methods. Author | - |
dc.format.extent | 1 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Defending against Adversarial Fingerprint Attacks based on Deep Image Prior | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/ACCESS.2023.3299862 | - |
dc.identifier.scopusid | 2-s2.0-85166287153 | - |
dc.identifier.wosid | 001041931800001 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.11, pp 1 - 1 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 11 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 1 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Adversarial Attack Defense | - |
dc.subject.keywordAuthor | Deep Image Prior | - |
dc.subject.keywordAuthor | Deep Learning | - |
dc.subject.keywordAuthor | Denoising | - |
dc.subject.keywordAuthor | Electronics packaging | - |
dc.subject.keywordAuthor | Fingerprint Authentication System | - |
dc.subject.keywordAuthor | Fingerprint recognition | - |
dc.subject.keywordAuthor | Image matching | - |
dc.subject.keywordAuthor | Image Reconstruction | - |
dc.subject.keywordAuthor | Image reconstruction | - |
dc.subject.keywordAuthor | Noise reduction | - |
dc.subject.keywordAuthor | Perturbation methods | - |
dc.subject.keywordAuthor | Training | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.