CAAP: Capture-Aware Adversarial Patch Attacks on Palmprint Recognition Models

📅 2026-04-08
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing deep palmprint recognition systems lack robustness against physical adversarial attacks and often overlook the dominance of palmprint texture patterns and acquisition-induced deformations. To address these limitations, this work proposes the CAAP framework, which introduces a capture-aware mechanism for the first time. CAAP employs a reusable cross-shaped universal adversarial patch and integrates three key components: an ASIT module for input-conditioned rendering, a RaS module to simulate random acquisition perturbations, and an MS-DIFE module to impose multi-scale feature-level identity interference—collectively disrupting the long-range continuity of palmprint textures. Evaluated on the Tongji, IITD, and AISEC datasets, CAAP achieves high success rates in both untargeted and targeted attacks and demonstrates strong cross-model and cross-dataset transferability, exposing significant vulnerabilities even in models hardened by adversarial training.
📝 Abstract
Palmprint recognition is deployed in security-critical applications, including access control and palm-based payment, due to its contactless acquisition and highly discriminative ridge-and-crease textures. However, the robustness of deep palmprint recognition systems against physically realizable attacks remains insufficiently understood. Existing studies are largely confined to the digital setting and do not adequately account for the texture-dominant nature of palmprint recognition or the distortions introduced during physical acquisition. To address this gap, we propose CAAP, a capture-aware adversarial patch framework for palmprint recognition. CAAP learns a universal patch that can be reused across inputs while remaining effective under realistic acquisition variation. To match the structural characteristics of palmprints, the framework adopts a cross-shaped patch topology, which enlarges spatial coverage under a fixed pixel budget and more effectively disrupts long-range texture continuity. CAAP further integrates three modules: ASIT for input-conditioned patch rendering, RaS for stochastic capture-aware simulation, and MS-DIFE for feature-level identity-disruptive guidance. We evaluate CAAP on the Tongji, IITD, and AISEC datasets against generic CNN backbones and palmprint-specific recognition models. Experiments show that CAAP achieves strong untargeted and targeted attack performance with favorable cross-model and cross-dataset transferability. The results further show that, although adversarial training can partially reduce the attack success rate, substantial residual vulnerability remains. These findings indicate that deep palmprint recognition systems remain vulnerable to physically realizable, capture-aware adversarial patch attacks, underscoring the need for more effective defenses in practice. Code available at https://github.com/ryliu68/CAAP.
Problem

Research questions and friction points this paper is trying to address.

palmprint recognition
adversarial patch attacks
physical robustness
capture-aware
texture-dominant
Innovation

Methods, ideas, or system contributions that make the work stand out.

adversarial patch
palmprint recognition
capture-aware attack
cross-shaped topology
physical adversarial attack
🔎 Similar Papers
No similar papers found.
Renyang Liu
Renyang Liu
National University of Singapore
AI Security & Data PrivacyMachine UnlearningComputer Vision
J
Jiale Li
Institute of Data Science, National University of Singapore, Singapore 117602, Singapore
Jie Zhang
Jie Zhang
Professor of Computer Science, Nanyang Technological University
Artificial IntelligenceMachine LearningIntelligent AgentUser Modeling
C
Cong Wu
School of Cyber Science and Engineering, Wuhan University, China, 430072
Xiaojun Jia
Xiaojun Jia
Nanyang Technological University
Explainable AIRobust AIEfficient AI
S
Shuxin Li
College of Computing and Data Science, Nanyang Technological University, Singapore, 639798
W
Wei Zhou
School of Engineering, Yunnan University, Kunming 650500, China
Kwok-Yan Lam
Kwok-Yan Lam
Nanyang Technological University
CybersecurityPrivacy-Preserving technologiesDigital TrustDistributing systemsLegalTech
S
See-kiong Ng
Institute of Data Science, National University of Singapore, Singapore 117602, Singapore