Search papers, labs, and topics across Lattice.
This paper introduces CAAP, a novel framework for generating capture-aware adversarial patches that can fool palmprint recognition systems. CAAP uses a cross-shaped patch topology and integrates modules for input-conditioned patch rendering, stochastic capture-aware simulation, and feature-level identity-disruptive guidance to create robust, physically realizable attacks. Experiments on multiple datasets demonstrate CAAP's effectiveness in both untargeted and targeted attacks, even exhibiting cross-model and cross-dataset transferability, highlighting the vulnerability of current palmprint recognition systems.
A cleverly shaped and rendered adversarial patch can reliably spoof palmprint recognition, even across different models and datasets.
Palmprint recognition is deployed in security-critical applications, including access control and palm-based payment, due to its contactless acquisition and highly discriminative ridge-and-crease textures. However, the robustness of deep palmprint recognition systems against physically realizable attacks remains insufficiently understood. Existing studies are largely confined to the digital setting and do not adequately account for the texture-dominant nature of palmprint recognition or the distortions introduced during physical acquisition. To address this gap, we propose CAAP, a capture-aware adversarial patch framework for palmprint recognition. CAAP learns a universal patch that can be reused across inputs while remaining effective under realistic acquisition variation. To match the structural characteristics of palmprints, the framework adopts a cross-shaped patch topology, which enlarges spatial coverage under a fixed pixel budget and more effectively disrupts long-range texture continuity. CAAP further integrates three modules: ASIT for input-conditioned patch rendering, RaS for stochastic capture-aware simulation, and MS-DIFE for feature-level identity-disruptive guidance. We evaluate CAAP on the Tongji, IITD, and AISEC datasets against generic CNN backbones and palmprint-specific recognition models. Experiments show that CAAP achieves strong untargeted and targeted attack performance with favorable cross-model and cross-dataset transferability. The results further show that, although adversarial training can partially reduce the attack success rate, substantial residual vulnerability remains. These findings indicate that deep palmprint recognition systems remain vulnerable to physically realizable, capture-aware adversarial patch attacks, underscoring the need for more effective defenses in practice. Code available at https://github.com/ryliu68/CAAP.