Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification (2312.00987v2)
Abstract: This study investigates the vulnerabilities of data-driven offline signature verification (DASV) systems to generative attacks and proposes robust countermeasures. Specifically, we explore the efficacy of Variational Autoencoders (VAEs) and Conditional Generative Adversarial Networks (CGANs) in creating deceptive signatures that challenge DASV systems. Using the Structural Similarity Index (SSIM) to evaluate the quality of forged signatures, we assess their impact on DASV systems built with Xception, ResNet152V2, and DenseNet201 architectures. Initial results showed False Accept Rates (FARs) ranging from 0% to 5.47% across all models and datasets. However, exposure to synthetic signatures significantly increased FARs, with rates ranging from 19.12% to 61.64%. The proposed countermeasure, i.e., retraining the models with real + synthetic datasets, was very effective, reducing FARs between 0% and 0.99%. These findings emphasize the necessity of investigating vulnerabilities in security systems like DASV and reinforce the role of generative methods in enhancing the security of data-driven systems.
- Forgery quality and its implication for behavioural biometric security. IEEE Trans Syst Man Cybern Part B. IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society 37 (11 2007), 1107–18. https://doi.org/10.1109/TSMCB.2007.903539
- Jordan J Bird. 2022. Robotic and Generative Adversarial Attacks in Offline Writer-independent Signature Verification. arXiv preprint arXiv:2204.07246 (2022).
- Deep Generative Modeling: A Comparative Review of VAEs, GANs, Normalizing Flows, Energy-Based and Autoregressive Models. IEEE Transactions on Pattern Analysis and Machine Intelligence (Nov 2022). https://doi.org/10.1109/TPAMI.2021.3116668
- Towards the design of an offline signature verifier based on a small number of genuine samples for training. Expert Systems with Applications (2018).
- Generation of Duplicated Off-Line Signature Images for Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence (2017).
- François Chollet. 2016. Xception: Deep Learning with Depthwise Separable Convolutions. CoRR abs/1610.02357 (2016). http://arxiv.org/abs/1610.02357
- SigNet: Convolutional Siamese Network for Writer Independent Offline Signature Verification. arXiv:1707.02131Â [cs.CV]
- A Perspective Analysis of Handwritten Signature Technology. ACM Comput. Surv. (Jan 2019).
- E. Allan Farnsworth. 2019. Large-scale offline signature recognition via deep neural networks and feature embedding. Neurocomputing 359 (2019), 1–14. https://doi.org/10.1016/j.neucom.2019.03.027
- iDeLog: Iterative Dual Spatial and Kinematic Extraction of Sigma-Lognormal Parameters. IEEE Transactions on Pattern Analysis &; Machine Intelligence 42, 01 (jan 2020), 114–125. https://doi.org/10.1109/TPAMI.2018.2879312
- Synthetic off-line signature image generation. In 2013 International Conference on Biometrics (ICB). https://doi.org/10.1109/ICB.2013.6612969
- Static Signature Synthesis: A Neuromotor Inspired Approach for Biometrics. IEEE Trans. Pattern Anal. Mach. Intell. (mar 2015), 667–680. https://doi.org/10.1109/TPAMI.2014.2343981
- Introduction to Presentation Attacks in Signature Biometrics and Recent Advances. arXiv:2302.08320Â [cs.CV]
- Generative Adversarial Networks. (2014). arXiv:1406.2661Â [stat.ML]
- Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition (2017).
- Offline handwritten signature verification — Literature review. In 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA).
- Characterizing and evaluating adversarial examples for offline handwritten signature verification. IEEE Transactions on Information Forensics and Security 14, 8 (2019), 2153–2166.
- Machine learning-based offline signature verification systems: A systematic review. Signal Processing: Image Communication (2021).
- Identity Mappings in Deep Residual Networks. arXiv:1603.05027Â [cs.CV]
- Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in neural information processing systems 30 (2017).
- Densely Connected Convolutional Networks. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017), 2261–2269. https://doi.org/10.1109/CVPR.2017.243
- Offline Signature Verification And Identification Using Distance Statistics. Int. J. Pattern Recognit. Artif. Intell. 18 (2004), 1339–1360.
- Diederik P Kingma and Max Welling. 2013. doi: 10.48550/ARXIV.1312.6114. Auto-Encoding Variational Bayes. CoRR (2013. doi: 10.48550/ARXIV.1312.6114).
- Black-box attack against handwritten signature verification with region-restricted adversarial perturbations. Pattern Recognition 111 (2021), 107689.
- Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation. IEEE Transactions on Information Forensics and Security (2021).
- Mehdi Mirza and Simon Osindero. 2014. Conditional Generative Adversarial Nets. http://arxiv.org/abs/1411.1784
- Mehmet Akif Özkanoğlu and Sedat Ozer. 2022. InfraGAN: A GAN Architecture to Transfer Visible Images to Infrared Domain.
- Performance of an Off-Line Signature Verification Method Based on Texture Features on a Large Indic-Script Signature Dataset. In 2016 12th IAPR Workshop on Document Analysis Systems (DAS). 72–77. https://doi.org/10.1109/DAS.2016.48
- Membership Inference Attacks against Machine Learning Models. CoRR abs/1610.05820 (2016).
- Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).
- Rethinking the Inception Architecture for Computer Vision. CoRR abs/1512.00567 (2015).
- Intriguing properties of neural networks. International Conference on Learning Representations (2014). http://arxiv.org/abs/1312.6199
- DeepWriteSYN: On-Line Handwriting Synthesis via Deep Short-Term Representations. In AAAI Conf. on Artificial Intelligence (AAAI). https://doi.org/abs/2009.06308
- Modeling the Complexity of Signature and Touch-Screen Biometrics using the Lognormality Principle. https://doi.org/10.1142/9789811226830_0003
- Zhou Wang and A.C. Bovik. 2002. A universal image quality index. IEEE Signal Processing Letters 9, 3 (2002), 81–84. https://doi.org/10.1109/97.995823
- Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing (2004). https://doi.org/10.1109/TIP.2003.819861
- Deep Learning-Based Data Augmentation Method and Signature Verification System for Offline Handwritten Signature. Pattern Anal. Appl. (2021).
- A Survey of Offline Handwritten Signature Verification Based on Deep Learning. https://doi.org/10.1109/PRML56267.2022.9882188
- On the Resilience of Biometric Authentication Systems against Random Inputs. Network and Distributed System Security Symposium (2020).
- Offline Handwritten Signature Modeling and Verification Based on Archetypal Analysis. In 2017 IEEE International Conference on Computer Vision (ICCV). 5515–5524. https://doi.org/10.1109/ICCV.2017.588
Sponsor
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.