Evasion Attack for Fingerprint Biometric System and Countermeasure

  • Sripada Manasa LakshmiEmail author
  • Manvjeet Kaur
  • Awadhesh Kumar Shukla
  • Nahita Pathania
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1059)


Currently, biometrics is being widely used for authentication and identification of an individual. The biometric systems itself needs to be more secured and reliable so it they can provide secure authentication in various applications. To optimize the security, it is vital that biometric authentication frameworks are intended to withstand various sources of attack. In security sensitive applications, there is a shrewd adversary component which intends to deceive the detection system. In a well-motivated attack scenario, in which there exists an attacker who may try to evade a well-established system at test time by cautiously altering attack samples, i.e., Evasion Attack. The aim of this work is to demonstrate that machine learning can be utilized to enhance system security, if one utilizes an adversary-aware approach that proactively intercept the attacker. Also, we present a basic but credible gradient based approach of evasion attack that can be exploited to methodically acquire the security of a Fingerprint Biometric Database.


Adversarial machine learning Evasion attacks Convolution neural networks Biometrics Biometrics security Fingerprint Classifier 



We would like to express our deep and sincere gratitude to Dr. Manvjeet Kaur for her invaluable encouragement, suggestions, and support in this study and research. We would also like to acknowledge all the cited authors in this study. We would like to express our thanks to all those who contributed in many ways to the success of this study. With the best of our knowledge, all the information provided is authentic and revised.


  1. 1.
    Bhattacharyya D et al (2009) Biometric authentication: a review. Int J u- e-Serv Sci Technol 2(3):13–28Google Scholar
  2. 2.
    Khorshidpour Z, Hashemi S, Hamzeh A (2016) Learning a secure classifier against evasion attack. In: 2016 IEEE 16th international conference on data mining workshops (ICDMW). IEEEGoogle Scholar
  3. 3.
    Biggio B, Fumera G, Roli F (2014) Security evaluation of pattern classifiers under attack. IEEE Trans Knowl Data Eng 26(4):984–996CrossRefGoogle Scholar
  4. 4.
    Biggio B et al (2015) Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process Mag 32(5):31–41CrossRefGoogle Scholar
  5. 5.
    Biggio B, Corona I, Maiorca D, Nelson B, Šrndić N, Laskov P, Giacinto G, Roli F (2013) Evasion attacks against machine learning at test time. In: Machine learning and knowledge discovery in databases. Springer, pp 387–402Google Scholar
  6. 6.
    Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2010) Can machine learning be secure? In: ASIACCS’06: Proceedings of the 2006 ACM symposium on information, computer and communication security, Cagliari, Cagliari (Italy), 2010 (cited at p xiv, 4) 111. ACM, New York, pp 16–25 (2006)Google Scholar
  7. 7.
    Biggio B, Fumera G, Roli F (2014) Pattern recognition systems under attack: design issues and research challenges. Int J Pattern Recognit Artif Intell 28(07):1460002CrossRefGoogle Scholar
  8. 8.
    Huang L et al (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence. ACMGoogle Scholar
  9. 9.
    Biggio B, Fumera G, Roli F (2010) Multiple classifier systems for robust classifier design in adversarial environments. Int J Mach Learn Cybern 1(1):27–41CrossRefGoogle Scholar
  10. 10.
    Biggio B, Fumera G, Roli F (2011) Design of robust classifiers for adversarial environments. In: IEEE international conference on systems, man, and cybernetics (SMC), pp 977–982Google Scholar
  11. 11.
    Zhang F, Chan PP, Biggio B, Yeung DS, Roli F (2016) Adversarial feature selection against evasion attacks. IEEE Trans Cybern 46(3):766–777CrossRefGoogle Scholar
  12. 12.
    Demontis A et al (2017) Yes, machine learning can be more secure! A case study on android malware detection. IEEE Trans Dependable Secur ComputGoogle Scholar
  13. 13.
    Biggio B, Adversarial pattern classification. Diss. Ph.D. thesis, University of Cagliari, Piazza d’Armi, 09123 Cagliari, ItalyGoogle Scholar
  14. 14.
    Sadeghi K et al (2016) Toward parametric security analysis of machine learning based cyber forensic biometric systems. In: 2016 15th IEEE international conference on machine learning and applications (ICMLA). IEEEGoogle Scholar
  15. 15.
    Roberts C (2007) Biometric attack vectors and defences. Comput Secur 26(1):14–25MathSciNetCrossRefGoogle Scholar
  16. 16.
    Ratha NK, Connell JH, Bolle RM (2003) Biometrics break-ins and band-aids. Pattern Recogn Lett 24(13):2105–2113CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Sripada Manasa Lakshmi
    • 1
    Email author
  • Manvjeet Kaur
    • 2
  • Awadhesh Kumar Shukla
    • 1
  • Nahita Pathania
    • 1
  1. 1.Lovely Professional UniversityPhagwaraIndia
  2. 2.Punjab Engineering College (Deemed to be University)ChandigarhIndia

Personalised recommendations