A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems

被引:0
|
作者
Maaref, Zineb [1 ,2 ]
Belhadj, Foudil [1 ,2 ]
Attia, Abdelouahab [1 ,2 ]
Akhtar, Zahid [3 ]
Jasser, Muhammed Basheer [4 ]
Ramly, Athirah Mohd [5 ]
Mohamed, Ali Wagdy [6 ,7 ]
机构
[1] Univ Mohamed El Bachir El Ibrahimi Bordj Bou Arrer, Dept Comp Sci, Bordj Bou Arreridj 34000, Algeria
[2] Univ Mohamed El Bachir El Ibrahimi Bordj Bou Arrer, LMSE Lab, Lab Mat & Elect Syst, Bordj Bou Arreridj 34000, Algeria
[3] State Univ New York SUNY Polytech Inst, Dept Network & Comp Secur, Utica, NY 13502 USA
[4] Sunway Univ, Sch Engn & Technol, Dept Comp & Informat Syst, 5,Jalan Univ, Bandar Sunway 47500, Selangor Darul, Malaysia
[5] Univ East London, Sch Architecture Comp & Engn, Univ Way,Docklands Campus, London E16 2RD, England
[6] Cairo Univ, Operat Res Dept, Fac Grad Studies Stat Res, Giza 12613, Egypt
[7] Appl Sci Private Univ, Appl Sci Res Ctr, Amman 11931, Jordan
关键词
Cancelable biometrics; Biometric attacks; Vulnerability; Security; Privacy; Risk; SECURITY; CHALLENGES; TEMPLATES; FILTERS;
D O I
10.1016/j.eij.2024.100511
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cancelable biometrics (CB) has been principally proposed to solve some issues related to the security, privacy, and revocability of users' stored templates in traditional biometric systems. Its basic idea is to design a transformation function that creates a pseudo identity starting from the original biometric template while respecting mainly two properties irreversibility and revocability. The first property seeks the protection of the user data by ensuring the impossibility of recovering the original template from the transformed one. The second property permits to issue multiple pseudo identities related to one biometric trait originated from the same user. Although great efforts have been made in the literature to ensure these two properties, most of the proposed transform functions are vulnerable to several attacks and their effectiveness is still under study. Thus, the purpose of this paper is to boost the security analysis of CB by reviewing existing attacks against cancelable biometric systems. We discuss the vulnerabilities of some protection schemes that attract multiple security issues and enable the attacker to penetrate the protection system. The robustness evaluation of such schemes against some known attacks has been outlined. Also, some taxonomies related to attack approaches are presented. Furthermore, we provide comparisons between multiple attacks on cancelable biometric systems in terms of many valuable factors, after which we build a rigorous framework to evaluate a protection scheme and mitigate these attacks. As a result, our study serves as a wake-up call for the research community focused on cancelable biometric template protection, drawing attention to the vulnerabilities in these protection systems and raising awareness in this area to mitigate serious attacks. By identifying weaknesses and assessing their impacts, we hope to stimulate further research and development to enhance the security of CB systems.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey
    Mandalapu, Hareesh
    Reddy, Aravinda P. N.
    Ramachandra, Raghavendra
    Rao, Krothapalli Sreenivasa
    Mitra, Pabitra
    Prasanna, S. R. Mahadeva
    Busch, Christoph
    IEEE ACCESS, 2021, 9 : 37431 - 37455
  • [22] A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection
    Sumalatha, U.
    Prakasha, K. Krishna
    Prabhu, Srikanth
    Nayak, Vinod C.
    IEEE ACCESS, 2024, 12 : 64300 - 64334
  • [23] A Comparative Review of Biometric Security Systems
    Paderes, Ryan Ercel O.
    2015 8TH INTERNATIONAL CONFERENCE ON BIO-SCIENCE AND BIO-TECHNOLOGY (BSBT), 2015, : 8 - 11
  • [24] Adaptive Biometric Systems: Review and Perspectives
    Pisani, Paulo Henrique
    Mhenni, Abir
    Giot, Romain
    Cherrier, Estelle
    Poh, Norman
    De Leon Ferreira De Carvalho, Andre Carlos Ponce
    Rosenberger, Christophe
    Ben Amara, Najoua Essoukri
    ACM COMPUTING SURVEYS, 2019, 52 (05)
  • [25] Multimodal Biometric Systems: a systematic review
    Ouch, Roger
    Garcia-Zapirain, Begonya
    Yampolskiy, Roman
    2017 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2017, : 439 - 444
  • [26] Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
    Nasr, Elie
    Shahrour, Issam
    2017 SENSORS NETWORKS SMART AND EMERGING TECHNOLOGIES (SENSET), 2017,
  • [27] Vulnerabilities and Strategies of Cybersecurity in Smart Grid - Evaluation and Review
    Mohammed, Amira
    George, Gibin
    3RD INTERNATIONAL CONFERENCE ON SMART GRID AND RENEWABLE ENERGY (SGRE), 2022,
  • [28] Renewable and sustainable energy saving strategies for greenhouse systems: A comprehensive review
    Cuce, Erdem
    Harjunowibowo, Dewanto
    Cuce, Pinar Mert
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2016, 64 : 34 - 59
  • [29] Comprehensive strategies for performance improvement of adsorption air conditioning systems: A review
    Alahmer, Ali
    Ajib, Salman
    Wang, Xiaolin
    RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2019, 99 : 138 - 158
  • [30] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    ELECTRONICS, 2023, 12 (06)