The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Les attaques utilisant des méthodes d'escalade ont été signalées comme une vulnérabilité des systèmes d'authentification biométrique. Dans cet article, nous proposons un algorithme robuste de vérification de signature en ligne contre de telles attaques. Plus précisément, l’attaque envisagée dans cet article est une attaque de données falsifiées en montée. Les contrefaçons artificielles sont générées hors ligne à l'aide de la méthode d'escalade, et les contrefaçons sont entrées dans un système cible pour être attaquées. Dans cet article, nous analysons la menace des attaques de données falsifiées en utilisant six types de données falsifiées et proposons un algorithme robuste en incorporant la méthode d'escalade dans un algorithme de vérification de signature en ligne. Des expériences visant à évaluer le système proposé ont été réalisées à l'aide d'une base de données publique de signatures en ligne. L’algorithme proposé a montré des performances améliorées contre ce type d’attaque.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Daigo MURAMATSU, "Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks" in IEICE TRANSACTIONS on Information,
vol. E93-D, no. 3, pp. 448-457, March 2010, doi: 10.1587/transinf.E93.D.448.
Abstract: Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E93.D.448/_p
Copier
@ARTICLE{e93-d_3_448,
author={Daigo MURAMATSU, },
journal={IEICE TRANSACTIONS on Information},
title={Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks},
year={2010},
volume={E93-D},
number={3},
pages={448-457},
abstract={Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.},
keywords={},
doi={10.1587/transinf.E93.D.448},
ISSN={1745-1361},
month={March},}
Copier
TY - JOUR
TI - Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks
T2 - IEICE TRANSACTIONS on Information
SP - 448
EP - 457
AU - Daigo MURAMATSU
PY - 2010
DO - 10.1587/transinf.E93.D.448
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E93-D
IS - 3
JA - IEICE TRANSACTIONS on Information
Y1 - March 2010
AB - Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.
ER -