The present invention relates to an information processing device, an information processing method, and a storage medium.
A model learned by deep learning involves vulnerability. For example, there is a problem that when an adversarial example (hereinafter referred to as AX) that is an artificial sample precisely created so as to deceive a learned model is used, the AX induces malfunction that is not expected by the designer during training.
As a document describing a method of generating an AX, Non-Patent Literature 1 is known. Non-Patent Literature 1 describes a method of generating an AX in which a similarity degree between target data xt and the AX becomes maximum, on the basis of the similarity degree with the target data xt.
Non-Patent Literature 1: Sara Sabour, Yanshuai Cao, Fartash Faghri, David J. Fleetl, “ADVERSARIAL MANIPULATION OF DEEP REPRESENTATIONS”, International Conference on Learning Representations (ICLR) 2016
In the art described in Non-Patent Literature 1, an AX is generated based on the similarity degree with the target data xt, and no class other than the class to which the target data belongs is taken into consideration. Therefore, by the method described in Non-Patent Literature 1, it is not always the case where the similarity degree with respect to the class to which the target data, calculated by the generated AX, belongs (target class) has the maximum value among the similarities with respect to the classes in the template that is data registered in advance. As a result, in the case of an AX generated by the method described in Non-Patent Literature 1, there is a possibility that it is authorized as a class other than the target class.
As described above, in the case of the art described in Non-Patent Literature 1, since similarities with respect to data belonging to classes other than the class to which the target data belongs are not taken into consideration at all, there is a problem that an appropriate AX may not be able to be generated. Therefore, an object to the present invention is to provide an information processing device, an information processing method, and a storage medium that can solve the problem that an appropriate AX may not be generated.
In order to achieve the object, an information processing device according to one aspect of the present invention is configured to include
a sample candidate generation unit that generates a sample candidate to be authenticated to belong to a target class that is a class inducing erroneous authentication, from source data belonging to a class other than the target class, on the basis of a similarity degree with data belonging to the target class in a template that is data registered in advance and a similarity degree with data not belonging to the target class in the template.
Further, an information processing method according to another aspect of the present invention is configured to include,
by an information processing device, generating a sample candidate to be authenticated to belong to a target class that is a class inducing erroneous authentication, from source data belonging to a class other than the target class, on the basis of a similarity degree with data belonging to the target class in a template that is data registered in advance and a similarity degree with data not belonging to the target class in the template.
Further, a storage medium according to another aspect of the present invention is a computer-readable storage medium storing a program for realizing, on an information processing device,
a sample candidate generation unit that generates a sample candidate to be authenticated to belong to a target class that is a class inducing erroneous authentication, from source data belonging to a class other than the target class, on the basis of a similarity degree with data belonging to the target class in a template that is data registered in advance and a similarity degree with data not belonging to the target class in the template.
With the configurations described above, the present invention is able to provide an information processing device, an information processing method, and a storage medium that can solve the problem that a suitable AX may not be generated.
Hereinafter, exemplary embodiments of the present invention will be described with reference to the drawings.
Note that each drawing describes an exemplary embodiment of the present invention. However, the present invention is not limited to those described in the drawings. Further, the same components in the drawings are denoted by the same reference numerals, and the repetitive description may be omitted. Furthermore, in the drawings used in the below description, the configurations of parts not related to the description of the present invention may be omitted, and may not be shown on the drawings.
A first exemplary embodiment of the present invention will be described with reference to
The first exemplary embodiment of the present invention describes the AX generation device 100 that generates an adversarial example (AX) that is a sample created so as to deceive a learned model. As described below, the AX generation device 100 described in the present embodiment generates a plurality of AX candidates on the basis of the similarity degree with data belonging to the target class in the template, and the similarity degree with data not belonging to the target class. In other words, the AX generation device 100 generates AX candidates while considering not only data belonging to the target class but also data not belonging to the target class. With this configuration, the AX generation device 100 can generate an appropriate AX while considering data not belonging to the target class.
For example, in Non-Patent Literature 1, by solving an optimization problem like Expression 1 provided below, an AX xadv in which the difference between source data xs and the AX xadv has a value smaller than δ and the similarity degree between the feature amounts of target data xt and the AX xadv is maximum is generated.
Here, xs represents source data, xt represents target data, and f represents a deep learning model that outputs a feature amount. Further, δ represents a parameter that determines the allowable degree of the difference between the source data xs and the AX xadv, and δ>0 is satisfied. Furthermore, sim( ) is a function that computes the similarity degree between the target data xt and the AX xadv, and diff( ) is a function that computes the magnitude of the difference between the source data xs and the AX xadv.
In the art described in Non-Patent Literature 1, there is a possibility that the case illustrated in
sim(x, x′)=∥x−x′∥2 [Expression 2]
In
In the example of
A solution (a point having the closest distance) obtained by solving the optimization problem of Non-Patent Literature 1 is shown as a triangle mark in
For example, as described above, in the case of the art of Non-Patent Literature 1, although there is an AX in which erroneous authentication to the target class succeeds, there is a possibility that an AX in which erroneous authentication succeeds cannot be generated. The AX generation device 100 described in the present embodiment generates an AX while considering data not belonging to the target class, as described above. Therefore, it is possible to realize a method of generating an AX in which the problem involved in Non-Patent Literature 1 has been solved. That is, according to the AX generation device 100 described in the present embodiment, since data not belonging to the target class is also considered, for example, it is possible to generate an AX indicated as the square mark rather than the triangle mark of
The AX generation device 100 is an information processing device that receives inputs such as the deep learning model f, a template X, a threshold τ, the source data xs, the target class t, and the like, and performs predetermined processing to thereby generate an AX from the source data xs. For example, the AX generation device 100 receives the deep learning model f, the template X, the threshold τ, the source data xs, the target class t, and the like from an external device or a network. Then, the AX generation device 100 performs processing corresponding to the received inputs to generate an AX.
Here, the deep learning model f is a model that has been learned in advance using deep learning and outputs a feature amount with respect to an input image. The feature amount is, for example, a d-dimensional vector having an actual value as an element. Note that d takes any value. The template X is a set X={x1, . . . , xn} having n pieces of data registered for authentication when the deep learning model f is operated. Here, the n pieces of data x1, . . . , xn have different classes respectively, and xi represent data belonging to a class i. For example, when the authentication task is face authentication, the template X is configured of face images of n persons, one for each. Note that n takes any value. For example, as described above, the template X includes one or more pieces of data registered in advance. The threshold τ is a value used for comparison with the feature similarity degree for authentication. As described below, the threshold τ is used for identifying an AX in which erroneous authentication with respect to the target class t has succeeded, among the generated AX candidates. This means that the threshold τ is used to select an AX in which erroneous authentication with respect to the target class t succeeds, from among the generated AX candidates. The source data xs is data used as a source of generating an AX. The source data xs belongs to a class among the classes to which the pieces of data included in the template X belong. The target class t is an erroneous authentication destination class for generating an AX. As the target class t, a class different from the class to which the source data xs belongs is selected (that is, it can be said that the source data xs belongs to a class other than the target class t). Further, as the target class t, a class that is the same as the class to which any piece of the data x1, . . . , xn in the template X belongs is designated. As described above, the target class t is a class to which erroneous authentication may be caused, among the classes to which the pieces of data included in the template belong.
Note that the AX generation device 100 may store some of the information illustrated above in advance. That is, the AX generation device 100 may be configured to receive at least one of the deep learning model f, the template X, the threshold τ, the source data xs and the target class t as an input.
For example, the AX generation device 100 includes an arithmetic unit such as a central processing unit (CPU) and a storage unit. For example, in the AX generation device 100, the arithmetic unit executes a program stored in the storage unit, whereby the various processing units described above are implemented.
The AX candidate generation unit 102 uses the deep learning model f, the template X, the source data xs, and the target class t, input thereto, to generate AX candidates (sample candidates) in which erroneous authentication is induced as the target class t, in the process of solving the optimization problem expressed by Expression 3 provided below.
Here, xs represents source data, t represents a target class, and f represents a deep learning model that outputs a feature amount. Further, δ represents a parameter that determines the allowable degree of the difference between the source data xs and the AX xadv. Further, sim is a function used to compute the similarity degree for two feature amounts extracted at the time of authentication, and Diff is a function used to compute the magnitude of the difference.
A solution of the optimization problem expressed by Expression 3 is a point that has a large similarity degree with data belonging to the target class in the template and has a small similarity degree with data not belonging to the target class. Therefore, in other words, it can be said that the AX candidate generation unit 102 generates AX candidates in the process of solving the optimization problem of obtaining a value having a large similarity degree with data belonging to the target class in the template and having a small similarity degree with data not belonging to the target class. Further, in the case of Expression 3, when there is an AX that induces erroneous authentication to the target class t, it is ensured that the AX is the solution of the optimization problem expressed in Expression 3.
In the optimization problem with restriction as expressed by Expression 3, for example, the solution is searched by transforming it to a minimization problem of an objective function with use of Lagrange multiplier method. For example, the AX candidate generation unit 102 searches for the solution by using the objective function expressed by Expression 4 that is computed by the objective function value calculation unit 104 to solve the optimization problem expressed by Expression 3.
J(f, X, xs, xadv, t)=Diff(xs, xadv)+cError(f, X, t, xadv) [Expression 4]
Here, the difference Diff(xs,xadv) is a value representing the magnitude of the difference between the source data xs and the AX candidate xadv, which means as the value is smaller, the AX candidate xadv has a smaller difference with the source image. Further, an erroneous authentication degree Error(f,X,t,xadv) is a value of a function of minimization in the optimization problem expressed by Expression 3.
The AX candidate generation unit 102 generates AX candidates using the optimization method so as to make both the difference Diff(xs,xadv) and the erroneous authentication degree Error(f,X,t,xadv) smaller, that is, make the objective function value J(f,X,x_s,xadv,t) smaller. Note that c in Expression 4 represents a parameter corresponding to δ in the optimization problem expressed by Expression 3. In the optimization problem expressed by Expression 3, the search range of AX is determined by δ. In order to generate an AX having a smaller difference from the source data after erroneous authentication to the target class is induced, it is necessary to solve the optimization problem expressed by Expression 3 a plurality of times by changing the value of δ. In other words, the AX candidate generation unit 102 needs to search for the solution using a plurality of objective functions having different c values.
The AX candidate generation unit 102 searches for the solution using objective functions with respect to a plurality of c values. Specifically, the AX candidate generation unit 102 determines an initial point expressed by Expression 5 for each c value (in the present embodiment, the method of determining the initial point is not limited particularly). Then, the AX candidate generation unit 102 generates AX candidates by sequentially changing the initial point such that the value of the objective function becomes smaller. Note that the parameter c may be one unique to the AX generation device 100, or may be received as an input from the outside. Further, the parameter c may be determined efficiently by using a method such as binary search.
xadv0 [Expression 5]
As described above, the AX candidate generation unit 102 searches for AX candidates by using a gradient-based optimization method. The gradient-based optimization method is a method in which an input initial point is determined, the input is gradually changed so as to make the value of the objective function smaller on the basis of gradient information of the objective function, whereby an input that makes the value of the objective function sufficiently small is searched. In the AX candidate generation unit 102, Expression 6 is sequentially solved by changing m times at maximum from each of the initial points (Expression 5) with respect to the objective functions determined by a plurality of parameters c, and the solutions are used as AX candidates. Here, m may be a variable unique to the AX generation device 100, or may be received as an input from the outside. Examples of gradient-based optimization method include Adagrad, Adam, and the like. The AX candidate generation unit 102 may use any optimization method if it is a gradient-based method.
xadvi(0<i<m) [Expression 6]
Assuming that |c| is the number of the parameters c used in the AX candidate generation unit 102, the AX candidate generation unit 102 finally generates |c|×m pieces of AX candidates. As described below, in the case of the present embodiment, by the AX identifying unit 110, an AX set to be output is finally determined from the AX candidates generated by the AX candidate generation unit 102.
In order to solve the optimization problem expressed by Expression 3, the objective function value calculation unit 104 calculates an objective function value expressed by Expression 10 in the AX candidate as expressed by Expression 9, using the difference degree expressed by Expression 7 obtained by the difference degree calculation unit 106 and the erroneous authentication degree expressed by Expression 8 calculated by the erroneous authentication degree calculation unit 108.
Diff(xs, xadvi) [Expression 7]
Error(f, X, t, xadvi) [Expression 8]
xadvi [Expression 9]
J(f, X, xs, xadvi, t) [Expression 10]
The difference degree calculation unit 106 calculates the difference degree (refer to Expression 7) between the source data xs and the AX candidate expressed by Expression 9. As described above, the difference degree is a value indicating the magnitude of the difference between the source data xs and the AX candidate expressed by Expression 9. For example, the difference degree indicates that as the value is smaller, the difference is smaller. An example of a difference degree used by the difference degree calculation unit 106 is L2 distance. When L2 distance is used as a difference, the difference degree calculation unit 106 calculates the difference degree expressed by Expression 7 by solving the equation expressed by Expression 11 provided below, for example.
Diff(xs, xadvi)=∥xs, −xadvi∥2 [Expression 11]
Note that the difference degree calculation unit 106 may be configured to calculate the difference degree using a method other than that described above. For example, the difference degree calculation unit 106 may be configured to calculate the difference degree by multiplying cos similarity degree by −1.
The erroneous authentication degree calculation unit 108 calculates the erroneous authentication degree expressed by Expression 8 in the AX candidate expressed by Expression 9. As described above, the erroneous authentication degree expressed by Expression 8 is a function for minimization in the optimization problem expressed by Expression 3. For example, the erroneous authentication degree calculation unit 108 calculates the erroneous authentication degree expressed by Expression 8, by solving the equation expressed by Expression 12 provided below.
Here, Sim represents a function used for calculating the similarity degree with respect to two feature amounts extracted at the time of authentication. As Sim, cos similarity degree or one obtained by multiplying L2 distance by −1 may be used, for example.
The AX identifying unit 110 identifying an AX in which erroneous authentication to the target class t has succeeded, among the AX candidates generated by the AX candidate generation unit 102. As described above, the AX candidate generation unit 102 generates AX candidates of the number corresponding to the parameters c. The AX candidate generation unit 102 selects an AX in which erroneous authentication to the target class t has succeeded, from among the generated AX candidates. This means that the AX identifying unit 110 selects an AX that is authenticated to belong to the target class t, from among the generated AX candidates.
For example, the AX identifying unit 110 checks whether or not the value of Expression 13, shown below, is Sim(f(xadv),f(xt)) by using the threshold τ to thereby check whether or not the AX candidate xadv has succeeded in erroneous authentication to the target t. For example, when the value of Expression 13 is Sim(f(xadv),f(xt)), the AX identifying unit 110 determines that the AX candidate xadv has succeeded in erroneous authentication to the target t. Then, the AX identifying unit 110 selects the AX candidate xadv determined to have succeeded in erroneous authentication to the target t, as an AX that has succeeded in erroneous authentication.
For example, by performing the processing as described above, the AX identifying unit 110 selects an AX set including one or more AXs from among the AX candidates. Thereafter, the AX identifying unit 110 can transmit the selected AX set to the outside.
An exemplary configuration of the AX generation device 100 has been described. As described above, the AX generation device 100 receives the deep learning model f, the template X, the threshold τ, the source data xs, the target class t, and the like as inputs. Then, the AX generation device 100 generates a plurality of AX candidates, on the basis of the similarity degree with data belonging to the target class in the template and the similarity degree degree of data not belonging to the target class. Next, an exemplary operation of the AX generation device 100 will be described with reference to
In order to determine the objective function, the AX candidate generation unit 102 determines the value of the parameter c. Then, the AX candidate generation unit 102 inputs the determined parameter c to the objective function value calculation unit 104 to search for AX candidates. That is, the AX candidate generation unit 102 enters a search loop (step S102). Note that the parameter c may be a predetermined one.
For the parameter c, the AX candidate generation unit 102 determines an initial point expressed by Expression 14. Then, the AX candidate generation unit 102 inputs the determined initial point to the objective function value calculation unit 104 to search for an AX by the optimization method. That is, the AX candidate generation unit 102 enters an optimization loop with respect to the parameter c (step S103).
xadv0 [Expression 14]
The objective function value calculation unit 104 uses an input at the ith step (refer to Expression 15) to issue an instruction to calculate the difference degree to the difference degree calculation unit 106, and an instruction to calculate the erroneous authentication degree to the erroneous authentication degree calculation unit 108. Upon receipt of the instructions, the difference degree calculation unit 106 and the erroneous authentication degree calculation unit 108 calculate the difference degree and the erroneous authentication degree with use of the input expressed by Expression 15 (step S104). Then, the difference degree calculation unit 106 and the erroneous authentication degree calculation unit 108 input the calculated values to the objective function value calculation unit 104.
xadvi [Expression 15]
The objective function value calculation unit 104 receives the difference degree from the difference degree calculation unit 106 and receives the erroneous authentication degree from the erroneous authentication degree calculation unit 108. Then, the objective function value calculation unit 104 calculates the objective function value using the difference degree, the erroneous authentication degree, and the parameter c (step S105). Thereafter, the objective function value calculation unit 104 inputs the calculated value to the AX candidate generation unit 102.
The AX candidate generation unit 102 determines a change in Expression 16 on the basis of the received value of the objective function. Then, the AX candidate generation unit 102 inputs the AX candidate expressed by Expression 16 to the AX identifying unit 110 (step S106).
xadvi+1 [Expression 16]
The AX generation device 100 repeats the loop processing from step S104 to step S106 m times determined in advance. Then, when changes have been made m times in total from the initial point, the AX generation device 100 leaves the optimization loop for the parameter c (step S107).
The AX generation device 100 repeats the optimization loop to the parameter c as described above the number of times corresponding to the number of parameters c. Then, when the optimization loop related to all of the given parameters c ends, the AX generation device 100 ends the search loop for AX candidates (step S108).
The AX identifying unit 110 identifies an AX in which erroneous authentication has succeeded, among the AX candidates generated by the AX candidate generation unit 102 (step S109). That is, the AX identifying unit 110 selects an AX set including one or more AXs from among the AX candidates. Then, the AX identifying unit 110 can output the selected AX set, to a display device or to an external device or an external network (step S110).
An exemplary operation of the AX generation device 100 has been described.
As described above, the AX generation device 100 includes the AX candidate generation unit 102. With this configuration, the AX candidate generation unit 102 can generate a plurality of AX candidates, on the basis of the similarity degree with data belonging to the target class tin the template X and the similarity degree of data not belonging to the target class t. Consequently, the AX candidate generation unit 102 can generate AX candidates while considering not only data belonging to the target class t but also data not belonging to the target class t. That is, it is possible to generate more appropriate AX candidates by which erroneous authentication can succeed.
Note that the AX generated as described above can be used for performing adversarial training and additional learning for acquiring resistance to attack, for example. Further, the AX can be used for performing risk assessment to be explained in a second exemplary embodiment described below. The generated AX may be used for a purpose other than that described above as an example.
Further, the AX generation device 100 described in the present embodiment can be used for performing biometric authentication on a person on the basis of information such as a face and a fingerprint using a model learned by deep learning, for example. Note that the AX generation device 100 may be utilized in a scene other than that described above as an example.
Next, a second exemplary embodiment of the present invention will be described with reference to
In the second exemplary embodiment of the present invention, the risk assessment device 200 that assesses a learned model will be described. In the present embodiment, as a criterion for assessing a risk to the AX of a learned model, a difference degree that is magnitude of the difference between the input (source data) that is the source of generating the AX and the AX will be used. This is because since an AX having a small difference is less likely to be noticed when it is input at the time of operation, compared with the case of an AX having a large difference. Therefore, the risk of operating the learned model increases when there is an AX having a smaller difference.
As described below, the risk assessment device 200 described in the present embodiment has almost similar functions to those held by the AX generation device 100 described in the first exemplary embodiment. Further, the risk assessment device 200 selects an AX on the basis of the difference degree from among the selected AX set. Then, the risk assessment device 200 outputs the selected AX and the difference degree serving as a criterion for assessing the risk.
As described above, the risk assessment device 200 is an information processing device that performs risk assessment of a learned model.
For example, the risk assessment device 200 includes an arithmetic unit such as a CPU and a storage unit. For example, in the risk assessment device 200, the arithmetic unit executes a program stored in the storage unit, whereby the various processing units described above are implemented.
Similar to the AX identifying unit 110 included in the AX generation device 100 described in the first exemplary embodiment, the difference minimum AX identifying unit 210 identifies an AX in which erroneous authentication to the target class t has succeeded, among the AX candidates generated by the AX candidate generation unit 102. That is, the difference minimum AX identifying unit 210 selects an AX set including one or more AXs from among the AX candidates.
Further, the difference minimum AX identifying unit 210 compares the difference degrees Diff(xs,xadv) between the AXs in the identified AX set. Then, the difference minimum AX identifying unit 210 selects an AX having the minimum difference degrees Diff(xs,xadv) from the identified AX set. Then, the difference minimum AX identifying unit 210 can output the selected AX and the minimum difference degree to a display device or to an external device or an external network.
As described above, the difference minimum AX identifying unit 210 is configured to select an AX in which the difference degree becomes the minimum, in addition to the process of identifying the AX set performed by the AX identifying unit 110. Further, the difference minimum AX identifying unit 210 is configured to output the selected AX and the difference degree of the selected AX. Note that the difference minimum AX identifying unit 210 may be configured to output the AX set before selection, along with the above-described information, for example.
Next, an exemplary operation of the risk assessment device 200 will be described with reference to
After identifying the AX in which erroneous authentication has succeeded from the AX candidates generated by the AX candidate generation unit 102 (step S109), the difference minimum AX identifying unit 210 selects the AX in which the difference degree Diff(xs,xadv) becomes minimum from the identified AX set (step S201). Then, the difference minimum AX identifying unit 210 can output the selected AX and the minimum difference degree to the outside (step S110).
As described above, the risk assessment device 200 described in the present embodiment includes the AX candidate generation unit 102 and the difference minimum AX identifying unit 210. With this configuration, the AX candidate generation unit 102 can generate more appropriate AX candidates enabling erroneous authentication to be succeeded. Further, by selecting the AX of the minimum difference degree Diff(xs,xadv) from the identified AX set from which the AX candidates generated by the AX candidate generation unit 102 are selected, the difference minimum AX identifying unit 210 can select an AX that is more appropriate for risk assessment. Thereby, more appropriate risk assessment can be made. In other words, the risk assessment device 200 described in the present embodiment has a function of generating an appropriate AX. Therefore, it is possible to perform risk assessment of a model more appropriately. Thereby, it is possible to more appropriate realize a system for finding vulnerability such as fuzzing in software and performing risk assessment with respect to a learned model, for example.
In the present embodiment, as a criterion for assessing a risk of a learned model, it has been described that the risk assessment device 200 uses a difference degree that is magnitude of a difference between an input (source data) that is the source of generating an AX and the AX. However, the risk assessment device 200 may be configured to calculate comparison results between a difference degree and a plurality of predetermined thresholds as information indicating the risk, and output the calculated result, for example. As described above, the risk assessment device 200 may be configured to output a value based on the difference degree.
The constituent elements of the AX generation device 100 and the risk assessment device 200, described in the first and second exemplary embodiments, show blocks in function units. Part or whole of the constituent elements held by the AX generation device 100 and the risk assessment device 200 can be realized by any combinations of an information processing device 300 as illustrated in
The constituent elements of the AX generation device 100 and the risk assessment device 200 in the embodiments described above can be realized by acquisition and execution, by the CPU 301, of the program group 304 for implementing those functions. The program group 304 for implementing the functions of the constituent elements of the AX generation device 100 and the risk assessment device 200 is, for example, stored on the storage device 305 or the ROM 302 in advance, and is downloaded to the RAM 303 by the CPU 301 as required. Note that the program group 304 may be provided to the CPU 301 via the communication network 311, or may be stored on a storage medium 310 in advance and read out by the drive 306 and supplied to the CPU 301.
Note that
Next, a third exemplary embodiment of the present invention will be described with reference to
For example, the information processing device 40 includes an arithmetic unit such as a CPU and a storage unit. For example, in the information processing device 40, the arithmetic unit executes a program stored in the storage unit, whereby the various processing units described above are implemented.
The sample candidate generation unit 41 generates sample candidates that induce erroneous authentication as a target class that is a class inducing erroneous authentication, on the basis of the similarity degree with the data belonging to the target class in the template that is data registered in advance and the similarity degree with the data not belonging to the target class in the template.
As described above, the information processing device 40 includes the sample candidate generation unit 41. With this configuration, the sample candidate generation unit 41 can generate a plurality of sample candidates, on the basis of the similarity degree with the data belonging to the target class and the similarity degree with the data not belonging to the target class in the template. Consequently, the sample candidate generation unit 41 can generate sample candidates while considering not only the data belonging to the target class but also the data not belonging to the target class. That is, it is possible to generate more appropriate sample candidates in which erroneous authentication can be succeeded.
Further, the information processing device 40 described above can be realized by incorporating a predetermined program in the information processing device 40. Specifically, a storage medium on which a program that is another embodiment of the present invention is stored is a computer-readable storage device storing a program for realizing, on an information processing device, the sample candidate generation unit 41 that generates sample candidates that induce erroneous authentication as a target class, on the basis of the similarity degree with the data belonging to a target class that is a class inducing erroneous authentication in the template that is data registered in advance, and the similarity degree with the data not belonging to the target class in the template.
Further, an information processing method performed by the information processing device 40 described above is a method including, by the information processing device, generating sample candidates that induce erroneous authentication as a target class, on the basis of the similarity degree with the data belonging to a target class that is a class inducing erroneous authentication in the template that is data registered in advance, and the similarity degree with the data not belonging to the target class in the template.
The invention of a storage medium or an information processing method, having the above-described configuration, exhibits the same actions and effects as those of the information processing device 40. Therefore, the above-described objection of the present invention can be achieved by such an invention.
The whole or part of the exemplary embodiments disclosed above can be described as the following supplementary notes. Hereinafter, the outlines of an information processing device and the like of the present invention will be described. However, the present invention is not limited to the configurations described below.
An information processing device comprising
a sample candidate generation unit that generates a sample candidate to be authenticated to belong to a target class that is a class inducing erroneous authentication, from source data belonging to a class other than the target class, on a basis of a similarity degree with data belonging to the target class in a template that is data registered in advance and a similarity degree with data not belonging to the target class in the template.
The information processing device according to supplementary note 1, wherein
the sample candidate generation unit generates the sample candidate by solving an optimization problem of obtaining a value having a larger similarity degree with the data belonging to the target class and a smaller similarity degree with the data not belonging to the target class.
The information processing device according to supplementary note 2, wherein
the sample candidate generation unit generates the sample candidate by transforming the optimization problem to a minimization problem of an objective function and searching for a solution.
The information processing device according to supplementary note 3, further comprising:
a difference degree calculation unit that calculates a difference degree indicating magnitude of a difference between the source data and the sample candidate, the source data being data serving as a source of generating the sample candidate; and
an erroneous authentication degree calculation unit that calculates an erroneous authentication degree that is a function of minimization in the optimization problem, wherein
the sample candidate generation unit generates the sample candidate by solving the objective function represented with use of a calculation result by the difference degree calculation unit, a calculation result by the erroneous authentication degree calculation unit, and a given parameter.
The information processing device according to supplementary note 4, wherein
a plurality of the parameters are included, and
the sample candidate generation unit generates the sample candidate corresponding to each of the parameters.
The information processing device according to supplementary note 4 or 5, wherein
the sample candidate generation unit determines an initial point, and generates a plurality of the sample candidates by changing the initial point.
The information processing device according to any one of supplementary notes 1 to 6, further comprising
a sample identifying unit that identifies a sample in which erroneous authentication to the target class succeeds, among a plurality of the sample candidates generated by the sample candidate generation unit.
The information processing device according to supplementary note 7, wherein
the sample identifying unit selects, from among the identified samples, a sample having a minimum difference degree, the difference degree being a difference from the source data that is data serving as a source of generating the sample.
The information processing device according to supplementary note 8, wherein
the sample identifying unit outputs the selected sample and the difference degree between the selected sample and the source data.
An information processing method comprising,
by an information processing device, generating a sample candidate to be authenticated to belong to a target class that is a class inducing erroneous authentication, from source data belonging to a class other than the target class, on a basis of a similarity degree with data belonging to the target class in a template that is data registered in advance and a similarity degree with data not belonging to the target class in the template.
The information processing method according to supplementary note 10, wherein
the generating the sample candidate includes generating the sample candidate by solving an optimization problem of obtaining a value having a larger similarity degree with the data belonging to the target class and a smaller similarity degree with the data not belonging to the target class.
The information processing method according to supplementary note 11, wherein
the generating the sample candidate includes generating the sample candidate by transforming the optimization problem to a minimization problem of an objective function and searching for a solution.
A computer-readable storage medium storing a program for realizing, on an information processing device,
a sample candidate generation unit that generates a sample candidate to be authenticated to belong to a target class that is a class inducing erroneous authentication, from source data belonging to a class other than the target class, on a basis of a similarity degree with data belonging to the target class in a template that is data registered in advance and a similarity degree with data not belonging to the target class in the template.
It should be noted that the program described in the respective exemplary embodiments and the supplementary notes may be stored in a storage device or stored on a computer-readable storage medium. The storage medium is a portable medium such as a flexible disk, an optical disk, a magneto-optical disk, or a semiconductor memory, for example.
While the present invention has been described with reference to the respective exemplary embodiments described above, the present invention is not limited to the above-described embodiments. The form and details of the present invention can be changed within the scope of the present invention in various manners that can be understood by those skilled in the art.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2018/045738 | 12/12/2018 | WO | 00 |