A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems

被引:0
|
作者
Maaref, Zineb [1 ,2 ]
Belhadj, Foudil [1 ,2 ]
Attia, Abdelouahab [1 ,2 ]
Akhtar, Zahid [3 ]
Jasser, Muhammed Basheer [4 ]
Ramly, Athirah Mohd [5 ]
Mohamed, Ali Wagdy [6 ,7 ]
机构
[1] Univ Mohamed El Bachir El Ibrahimi Bordj Bou Arrer, Dept Comp Sci, Bordj Bou Arreridj 34000, Algeria
[2] Univ Mohamed El Bachir El Ibrahimi Bordj Bou Arrer, LMSE Lab, Lab Mat & Elect Syst, Bordj Bou Arreridj 34000, Algeria
[3] State Univ New York SUNY Polytech Inst, Dept Network & Comp Secur, Utica, NY 13502 USA
[4] Sunway Univ, Sch Engn & Technol, Dept Comp & Informat Syst, 5,Jalan Univ, Bandar Sunway 47500, Selangor Darul, Malaysia
[5] Univ East London, Sch Architecture Comp & Engn, Univ Way,Docklands Campus, London E16 2RD, England
[6] Cairo Univ, Operat Res Dept, Fac Grad Studies Stat Res, Giza 12613, Egypt
[7] Appl Sci Private Univ, Appl Sci Res Ctr, Amman 11931, Jordan
关键词
Cancelable biometrics; Biometric attacks; Vulnerability; Security; Privacy; Risk; SECURITY; CHALLENGES; TEMPLATES; FILTERS;
D O I
10.1016/j.eij.2024.100511
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cancelable biometrics (CB) has been principally proposed to solve some issues related to the security, privacy, and revocability of users' stored templates in traditional biometric systems. Its basic idea is to design a transformation function that creates a pseudo identity starting from the original biometric template while respecting mainly two properties irreversibility and revocability. The first property seeks the protection of the user data by ensuring the impossibility of recovering the original template from the transformed one. The second property permits to issue multiple pseudo identities related to one biometric trait originated from the same user. Although great efforts have been made in the literature to ensure these two properties, most of the proposed transform functions are vulnerable to several attacks and their effectiveness is still under study. Thus, the purpose of this paper is to boost the security analysis of CB by reviewing existing attacks against cancelable biometric systems. We discuss the vulnerabilities of some protection schemes that attract multiple security issues and enable the attacker to penetrate the protection system. The robustness evaluation of such schemes against some known attacks has been outlined. Also, some taxonomies related to attack approaches are presented. Furthermore, we provide comparisons between multiple attacks on cancelable biometric systems in terms of many valuable factors, after which we build a rigorous framework to evaluate a protection scheme and mitigate these attacks. As a result, our study serves as a wake-up call for the research community focused on cancelable biometric template protection, drawing attention to the vulnerabilities in these protection systems and raising awareness in this area to mitigate serious attacks. By identifying weaknesses and assessing their impacts, we hope to stimulate further research and development to enhance the security of CB systems.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] A Review on Protection and Cancelable Techniques in Biometric Systems
    Bernal-Romero, Juan Carlos
    Ramirez-Cortes, Juan Manuel
    Rangel-Magdaleno, Jose De Jesus
    Gomez-Gil, Pilar
    Peregrina-Barreto, Hayde
    Cruz-Vega, Israel
    IEEE ACCESS, 2023, 11 : 8531 - 8568
  • [2] A Spoofing Attack against a Cancelable Biometric Authentication Scheme
    Izu, Tetsuya
    Sakemi, Yumi
    Takenaka, Masahiko
    Torii, Naoya
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 234 - 239
  • [3] Vulnerabilities in biometric encryption systems
    Adler, A
    AUDIO AND VIDEO BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3546 : 1100 - 1109
  • [4] Cancelable Biometrics for Better Security and Privacy in Biometric Systems
    Kanade, Sanjay Ganesh
    Petrovska-Delacretaz, Dijana
    Dorizzi, Bernadette
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 20 - 34
  • [5] Neural Cryptography: Vulnerabilities and Attack Strategies
    Beshaj, Lubjana
    Tyagi, Gaurav
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VIII, 2024, 13058
  • [6] A Practical Attack to AINA2014's Countermeasure for Cancelable Biometric Authentication Protocols
    Hirano, Takato
    Ito, Takashi
    Kawai, Yutaka
    Matsuda, Nori
    Yamamoto, Takumi
    Munaka, Tatsuji
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 315 - 319
  • [7] Can Cancelable Biometrics Contribute to the Security Improvement of Biometric Authentication Systems?
    Shin, Sanggyu
    Seto, Yoichi
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT II, 2015, 9156 : 223 - 232
  • [8] Vulnerabilities of Biometric Systems integrated in Mobile Devices: an evaluation
    Goicoechea-Telleria, Ines
    Liu-Jimenez, Judith
    Sanchez-Reillo, Raul
    Ponce-Hernandez, Wendy
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 15 - 22
  • [9] A Comprehensive Analysis of Robustness in Interdependent Mechatronic Systems under Attack Strategies
    Xu, Gang
    Wang, Yanhui
    Hao, Yucheng
    Jia, Limin
    Yang, Zeyun
    He, Zhichao
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2021, 2021
  • [10] Control strategies for crane systems: A comprehensive review
    Ramli, Liyana
    Mohamed, Z.
    Abdullahi, Auwalu M.
    Jaafar, H. I.
    Lazim, Izzuddin M.
    MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 2017, 95 : 1 - 23