Synthetic EMG Based on Adversarial Style Transfer can Effectively Attack Biometric-based Personal Identification Models

Author:

Kang Peiqi,Jiang Shuo,Shull Peter B.

Abstract

AbstractBiometric-based personal identification models are generally considered to be accurate and secure because biological signals are too complex and person-specific to be fabricated, and EMG signals, in particular, have been used as biological identification tokens due to their high dimension and non-linearity. We investigate the possibility of effectively attacking EMG-based identification models with biological adversarial input via a novel EMG signal individual style transformer based on a generative adversarial network. EMG hand gesture data from eighteen subjects and three well-recognized deep EMG classifiers were used to demonstrate the effectiveness of the proposed attack methods. The proposed methods achieved an average of 99.41% success rate on confusing identification models and an average of 91.51% success rate on manipulating identification models. These results demonstrate that EMG classifiers based on deep neural networks can be vulnerable to synthetic data attacks. The proof-of-concept results reveal that synthetic EMG biological signals must be considered in biological identification system design across a vast array of relevant biometric systems to ensure personal identification security for individuals and institutions.

Publisher

Cold Spring Harbor Laboratory

Reference33 articles.

1. S. Jiang , P. Kang , X. Song , B. Lo , and P. B. Shull , “Emerging wearable interfaces and algorithms for hand gesture recognition: A survey,” IEEE Reviews in Biomedical Engineering, 2021.

2. Feasibility of wrist-worn, real-time hand, and surface gesture recognition via semg and imu sensing;IEEE Transactions on Industrial Informatics,2017

3. Biometric from surface electromyogram (semg): Feasibility of user verification and identification based on gesture recognition;Frontiers in Bioengineering and Biotechnology,2020

4. Neuromuscular password-based user authentication;IEEE Transactions on Industrial Informatics,2020

5. N. Papernot , P. McDaniel , and I. Goodfellow , “Transferability in machine learning: from phenomena to black-box attacks using adversarial samples,” arXiv preprint arXiv:1605.07277, 2016.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3