Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reconstruction attack method for biological template protection based on generative adversarial network

A biological template and network technology, applied in the field of biometrics, can solve the problem that the reconstructed image cannot meet the visual authenticity

Active Publication Date: 2020-10-02
SOUTH CHINA UNIV OF TECH
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art, and propose a reconstruction attack method based on generative confrontation network for biological template protection, so as to solve the problem that the reconstructed image cannot meet the visual authenticity in the traditional reconstruction attack method , the reconstructed real biological image using a given hash code can not only pass the verification of the biometric identification system but also maintain a high visual similarity with the real biological image. At the same time, it inspires researchers to introduce necessary mechanisms to prevent possible security risks in the design process of related biological hash algorithms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reconstruction attack method for biological template protection based on generative adversarial network
  • Reconstruction attack method for biological template protection based on generative adversarial network
  • Reconstruction attack method for biological template protection based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The present invention will be further described below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.

[0084] see Figure 1 to Figure 7 As shown, the reconstruction attack method for biological template protection based on generative confrontation network provided in this embodiment includes the following steps:

[0085] 1) Basic data processing, including image cropping, feature extraction, hash code generation, and training set and test set division.

[0086] Table 1 training set and test set

[0087]

[0088] The data set selected in this example is CMU PIE, which is 40,000 face images of 68 different individuals collected by researchers from the Computer Department of Carnegie Mellon University under different postures, expressions and lighting conditions. The different face images of 68 individuals below are used as the data set of this paper. Each individual contains 24 face images under different li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a reconstruction attack method for biological template protection based on a generative adversarial network. The method comprises the steps: 1) basic data processing which comprises image cutting, feature extraction, hash code generation and training set and test set division; 2) constructing a biological hash reconstruction attack network which comprises a hash network anda generative adversarial network, the generative adversarial network comprising two stages, the first stage generating a low-resolution image through a given hash code, and the second stage generating a high-resolution image in combination with the low-resolution image and the given hash code; 3) updating the hash network weight; according to the method, semantic preservation and visual similarity are combined, the biological image is reconstructed from the given hash code through the hash network and the generative adversarial network, verification can be conducted through a biological recognition system, and high visual similarity can be kept between the biological image and a real biological image.

Description

technical field [0001] The invention relates to the technical field of biometric identification, in particular to a reconstruction attack method for biometric template protection based on a generative adversarial network. Background technique [0002] With the wide application of biometric systems including iris, face, fingerprint, voice, etc. a field. In order to avoid the irreparable loss caused by the leakage of biological template information, researchers have proposed many different biological template protection schemes. The difference between the biometric system based on template protection and the original biometric system lies in the feature extraction unit and the matcher. A template protection unit has been added. Generally speaking, an ideal biological template protection scheme needs to meet the following four characteristics: 1. Irreversibility: it is difficult to infer the original template information from the protected template information; 2. Revocabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06N3/04G06N3/08
CPCG06N3/08G06V40/10G06N3/045
Inventor 沃焱吴章勇韩国强
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products