Papers
Topics
Authors
Recent
2000 character limit reached

Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification (2312.00987v2)

Published 2 Dec 2023 in cs.CV and cs.CY

Abstract: This study investigates the vulnerabilities of data-driven offline signature verification (DASV) systems to generative attacks and proposes robust countermeasures. Specifically, we explore the efficacy of Variational Autoencoders (VAEs) and Conditional Generative Adversarial Networks (CGANs) in creating deceptive signatures that challenge DASV systems. Using the Structural Similarity Index (SSIM) to evaluate the quality of forged signatures, we assess their impact on DASV systems built with Xception, ResNet152V2, and DenseNet201 architectures. Initial results showed False Accept Rates (FARs) ranging from 0% to 5.47% across all models and datasets. However, exposure to synthetic signatures significantly increased FARs, with rates ranging from 19.12% to 61.64%. The proposed countermeasure, i.e., retraining the models with real + synthetic datasets, was very effective, reducing FARs between 0% and 0.99%. These findings emphasize the necessity of investigating vulnerabilities in security systems like DASV and reinforce the role of generative methods in enhancing the security of data-driven systems.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (40)
  1. Forgery quality and its implication for behavioural biometric security. IEEE Trans Syst Man Cybern Part B. IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society 37 (11 2007), 1107–18. https://doi.org/10.1109/TSMCB.2007.903539
  2. Jordan J Bird. 2022. Robotic and Generative Adversarial Attacks in Offline Writer-independent Signature Verification. arXiv preprint arXiv:2204.07246 (2022).
  3. Deep Generative Modeling: A Comparative Review of VAEs, GANs, Normalizing Flows, Energy-Based and Autoregressive Models. IEEE Transactions on Pattern Analysis and Machine Intelligence (Nov 2022). https://doi.org/10.1109/TPAMI.2021.3116668
  4. Towards the design of an offline signature verifier based on a small number of genuine samples for training. Expert Systems with Applications (2018).
  5. Generation of Duplicated Off-Line Signature Images for Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence (2017).
  6. François Chollet. 2016. Xception: Deep Learning with Depthwise Separable Convolutions. CoRR abs/1610.02357 (2016). http://arxiv.org/abs/1610.02357
  7. SigNet: Convolutional Siamese Network for Writer Independent Offline Signature Verification. arXiv:1707.02131 [cs.CV]
  8. A Perspective Analysis of Handwritten Signature Technology. ACM Comput. Surv. (Jan 2019).
  9. E. Allan Farnsworth. 2019. Large-scale offline signature recognition via deep neural networks and feature embedding. Neurocomputing 359 (2019), 1–14. https://doi.org/10.1016/j.neucom.2019.03.027
  10. iDeLog: Iterative Dual Spatial and Kinematic Extraction of Sigma-Lognormal Parameters. IEEE Transactions on Pattern Analysis &; Machine Intelligence 42, 01 (jan 2020), 114–125. https://doi.org/10.1109/TPAMI.2018.2879312
  11. Synthetic off-line signature image generation. In 2013 International Conference on Biometrics (ICB). https://doi.org/10.1109/ICB.2013.6612969
  12. Static Signature Synthesis: A Neuromotor Inspired Approach for Biometrics. IEEE Trans. Pattern Anal. Mach. Intell. (mar 2015), 667–680. https://doi.org/10.1109/TPAMI.2014.2343981
  13. Introduction to Presentation Attacks in Signature Biometrics and Recent Advances. arXiv:2302.08320 [cs.CV]
  14. Generative Adversarial Networks. (2014). arXiv:1406.2661 [stat.ML]
  15. Learning features for offline handwritten signature verification using deep convolutional neural networks. Pattern Recognition (2017).
  16. Offline handwritten signature verification — Literature review. In 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA).
  17. Characterizing and evaluating adversarial examples for offline handwritten signature verification. IEEE Transactions on Information Forensics and Security 14, 8 (2019), 2153–2166.
  18. Machine learning-based offline signature verification systems: A systematic review. Signal Processing: Image Communication (2021).
  19. Identity Mappings in Deep Residual Networks. arXiv:1603.05027 [cs.CV]
  20. Gans trained by a two time-scale update rule converge to a local nash equilibrium. Advances in neural information processing systems 30 (2017).
  21. Densely Connected Convolutional Networks. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017), 2261–2269. https://doi.org/10.1109/CVPR.2017.243
  22. Offline Signature Verification And Identification Using Distance Statistics. Int. J. Pattern Recognit. Artif. Intell. 18 (2004), 1339–1360.
  23. Diederik P Kingma and Max Welling. 2013. doi: 10.48550/ARXIV.1312.6114. Auto-Encoding Variational Bayes. CoRR (2013. doi: 10.48550/ARXIV.1312.6114).
  24. Black-box attack against handwritten signature verification with region-restricted adversarial perturbations. Pattern Recognition 111 (2021), 107689.
  25. Intrapersonal Parameter Optimization for Offline Handwritten Signature Augmentation. IEEE Transactions on Information Forensics and Security (2021).
  26. Mehdi Mirza and Simon Osindero. 2014. Conditional Generative Adversarial Nets. http://arxiv.org/abs/1411.1784
  27. Mehmet Akif Özkanoğlu and Sedat Ozer. 2022. InfraGAN: A GAN Architecture to Transfer Visible Images to Infrared Domain.
  28. Performance of an Off-Line Signature Verification Method Based on Texture Features on a Large Indic-Script Signature Dataset. In 2016 12th IAPR Workshop on Document Analysis Systems (DAS). 72–77. https://doi.org/10.1109/DAS.2016.48
  29. Membership Inference Attacks against Machine Learning Models. CoRR abs/1610.05820 (2016).
  30. Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).
  31. Rethinking the Inception Architecture for Computer Vision. CoRR abs/1512.00567 (2015).
  32. Intriguing properties of neural networks. International Conference on Learning Representations (2014). http://arxiv.org/abs/1312.6199
  33. DeepWriteSYN: On-Line Handwriting Synthesis via Deep Short-Term Representations. In AAAI Conf. on Artificial Intelligence (AAAI). https://doi.org/abs/2009.06308
  34. Modeling the Complexity of Signature and Touch-Screen Biometrics using the Lognormality Principle. https://doi.org/10.1142/9789811226830_0003
  35. Zhou Wang and A.C. Bovik. 2002. A universal image quality index. IEEE Signal Processing Letters 9, 3 (2002), 81–84. https://doi.org/10.1109/97.995823
  36. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing (2004). https://doi.org/10.1109/TIP.2003.819861
  37. Deep Learning-Based Data Augmentation Method and Signature Verification System for Offline Handwritten Signature. Pattern Anal. Appl. (2021).
  38. A Survey of Offline Handwritten Signature Verification Based on Deep Learning. https://doi.org/10.1109/PRML56267.2022.9882188
  39. On the Resilience of Biometric Authentication Systems against Random Inputs. Network and Distributed System Security Symposium (2020).
  40. Offline Handwritten Signature Modeling and Verification Based on Archetypal Analysis. In 2017 IEEE International Conference on Computer Vision (ICCV). 5515–5524. https://doi.org/10.1109/ICCV.2017.588

Summary

We haven't generated a summary for this paper yet.

Slide Deck Streamline Icon: https://streamlinehq.com

Whiteboard

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.