Abstract
Palmprint has been widely used for personal authentication in many applications, such that the assessment of recognition system security is important. Online attacks of palmprint recognition are much more difficult than offline attacks due to the fewer permissible login and authentication attempts, the unusability of the matching scores, and less training data. A cross-database attack is another challenging problem, where the images reconstructed from a template can still be effective in attacking the systems with other templates. To achieve online cross-database attacks and ensure that the reconstructed images are high-quality, two novel style-transfer methods are proposed to attack coding-based palmprint recognition systems. The two methods are both based on a convolutional neural network, but their optimization objects are different. In the first method, the optimization object is the input image, where a high-quality image can be reconstructed from the binary template. In the second method, the style-transfer neural network is trained with a template dataset and only one style image to reduce the style loss between the source and target domains. The trained style-transfer network can reconstruct approximately 270 images per second. The two methods have highly impressive attack success rates and satisfactorily meet the requirements of the evaluation system.



















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Shao H, Zhong D, Du X (2021) Deep distillation hashing for unconstrained palmprint recognition. IEEE Trans Instrum Meas 70:1–13
Dwivedi R, Dey S (2019) A tokenless cancellable scheme for multimodal biometric systems. Appl Intell 49:1016–1035
Asthana R, Walia G S, Gupta A (2021) Random area-perimeter method for generation of unimodal and multimodal cancelable biometric templates. Appl Intell 51:7281–7297
Galbally J, McCool C, Fierrez J, Marcel S, Ortega-Garcia J (2010) On the vulnerability of face verification systems to hill-climbing attacks. Pattern Recogn 43(3):1027–1038
Dong X, Jin Z, Jin A T B (2019) A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: 2019 IEEE 10th international conference on biometrics theory, applications and systems (BTAS). IEEE, pp 1–8
Tarek M, Hamouda E, Abohamama AS (2022) Multi-instance cancellable biometrics schemes based on generative adversarial network. Appl Intell 52:501–513
Fei L, Zhang B, Zhang L, Jia W, Wen J, Wu J (2020) Learning compact multifeature codes for palmprint recognition from a single training image per palm. IEEE Trans Multimed 23:2930–2942
Fei L, Zhang B, Tian C, Teng S, Wen J (2021) Jointly learning multi-instance hand-based biometric descriptor. Inf Sci 562:1–12
Wan M, Yao Y, Zhan T, Yang G (2021) Supervised low-rank embedded regression (slrer) for robust subspace learning. IEEE Transactions on Circuits and Systems for Video Technology
Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Applic 76(1):333–354
Fei L, Wen J, Zhang Z, Yan K, Zhong Z (2016) Local multiple directional pattern of palmprint image. In: 2016 23rd International conference on pattern recognition (ICPR). IEEE, pp 3013–3018
Liu Y, Kumar A (2020) Contactless palmprint identification using deeply learned residual features. IEEE Trans Biometr Behav Identity Sci 2(2):172–181
Liang X, Yang J, Lu G, Zhang D (2021) Compnet: competitive neural network for palmprint recognition using learnable Gabor kernels. IEEE Signal Process Lett 28:1739–1743
Leng L, Yang Z, Min W (2020) Democratic voting downsampling for coding-based palmprint recognition. IET Biometr 9(6):290–296
Yang Z, Leng L, Min W (2020) Extreme downsampling and joint feature for coding-based palmprint recognition. IEEE Trans Instrum Meas 70:1–12
Fei L, Lu G, Jia W, Teng S, Zhang D (2018) Feature extraction methods for palmprint recognition: a survey and evaluation. IEEE Trans Syst Man Cybern: Syst 49(2):346–363
Zhang D, Kong W-K, You J, Wong M (2003) Online palmprint identification. IEEE Trans Pattern Anal Mach Intell 25(9):1041–1050
Guo Z, Zhang D, Zhang L, Zuo W (2009) Palmprint verification using binary orientation co-occurrence vector. Pattern Recogn Lett 30(13):1219–1227
Sun Z, Tan T, Wang Y, Li S Z (2005) Ordinal palmprint represention for personal identification [represention read representation]. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR’05), vol 1. IEEE, pp 279–284
Kong A, Zhang D, Kamel M (2006) Palmprint identification using feature-level fusion. Pattern Recogn 39(3):478–487
Kong AW-K, Zhang D (2004) Competitive coding scheme for palmprint verification. In: Proceedings of the 17th international conference on pattern recognition, 2004. ICPR 2004., vol 1. IEEE, pp 520–523
Jia W, Huang D-S, Zhang D (2008) Palmprint verification based on robust line orientation code. Pattern Recogn 41(5):1504–1513
Fei L, Xu Y, Tang W, Zhang D (2016) Double-orientation code and nonlinear matching scheme for palmprint recognition. Pattern Recogn 49:89–101
Fei L, Xu Y, Zhang D (2016) Half-orientation extraction of palmprint features. Pattern Recogn Lett 69:35–41
Xu Y, Fei L, Wen J, Zhang D (2016) Discriminative and robust competitive code for palmprint recognition. IEEE Trans Syst Man Cybern: Syst 48(2):232–241
Feng Y C, Lim M-H, Yuen P C (2014) Masquerade attack on transform-based binary-template protection based on perceptron learning. Pattern Recogn 47(9):3019–3033
Wang F, Leng L, Teoh A B J, Chu J (2020) Palmprint false acceptance attack with a generative adversarial network (gan). Appl Sci 10(23):8547
Mai G, Cao K, Yuen P C, Jain A K (2019) On the reconstruction of face images from deep face templates. IEEE Trans Pattern Anal Mach Intell 41(5):1188–1202
Qin L, Peng F, Venkatesh S, Ramachandra R, Long M, Busch C (2020) Low visual distortion and robust morphing attacks based on partial face image manipulation. IEEE Trans Biometr Behav Ident Sci 3(1):72–88
Wang G, Han H, Shan S, Chen X (2019) Improving cross-database face presentation attack detection via adversarial domain adaptation. In: 2019 International conference on biometrics (ICB). IEEE, pp 1–8
Shin S J, You S C, Jeon H, Jung J W, An M H, Park R W, Roh J (2021) Style transfer strategy for developing a generalizable deep learning application in digital pathology. Comput Methods Prog Biomed 198:105815
Gatys L A, Ecker A S, Bethge M (2016) Image style transfer using convolutional neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2414–2423
Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556
Johnson J, Alahi A, Fei-Fei L (2016) Perceptual losses for real-time style transfer and super-resolution. In: European conference on computer vision. Springer, pp 694–711
Ulyanov D, Vedaldi A, Lempitsky V (2016) Instance normalization: The missing ingredient for fast stylization. arXiv:1607.08022
Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE Conference on computer vision and pattern recognition. Ieee, pp 248–255
Zhang L, Li L, Yang A, Shen Y, Yang M (2017) Towards contactless palmprint recognition: a novel device, a new benchmark, and a collaborative representation based identification approach. Pattern Recogn 69:199–212
Acknowledgments
This work is funded in part by the National Natural Science Foundation of China by the National Natural Science Foundation of China under Grants 61866028, 61866025, and 62162045, the Technology Innovation Guidance Program Project (Special Project of Technology Cooperation, Science and Technology Department of Jiangxi Province) under Grant 20212BDH81003.
Author information
Authors and Affiliations
Contributions
Ziyuan Yang: Writing-Original draft preparation; Conceptualization; Methodology; Validation; Software.
Lu Leng: Methodology, Validation; Supervision; Project administration.
Bob Zhang: Reviewing; Investigation; Formal analysis; Visualization.
Ming Li: Reviewing; Data curation; Resources.
Jun Chu: Reviewing; Editing; Resources.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yang, Z., Leng, L., Zhang, B. et al. Two novel style-transfer palmprint reconstruction attacks. Appl Intell 53, 6354–6371 (2023). https://doi.org/10.1007/s10489-022-03862-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-022-03862-0