A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems

被引:0
|
作者
Maaref, Zineb [1 ,2 ]
Belhadj, Foudil [1 ,2 ]
Attia, Abdelouahab [1 ,2 ]
Akhtar, Zahid [3 ]
Jasser, Muhammed Basheer [4 ]
Ramly, Athirah Mohd [5 ]
Mohamed, Ali Wagdy [6 ,7 ]
机构
[1] Univ Mohamed El Bachir El Ibrahimi Bordj Bou Arrer, Dept Comp Sci, Bordj Bou Arreridj 34000, Algeria
[2] Univ Mohamed El Bachir El Ibrahimi Bordj Bou Arrer, LMSE Lab, Lab Mat & Elect Syst, Bordj Bou Arreridj 34000, Algeria
[3] State Univ New York SUNY Polytech Inst, Dept Network & Comp Secur, Utica, NY 13502 USA
[4] Sunway Univ, Sch Engn & Technol, Dept Comp & Informat Syst, 5,Jalan Univ, Bandar Sunway 47500, Selangor Darul, Malaysia
[5] Univ East London, Sch Architecture Comp & Engn, Univ Way,Docklands Campus, London E16 2RD, England
[6] Cairo Univ, Operat Res Dept, Fac Grad Studies Stat Res, Giza 12613, Egypt
[7] Appl Sci Private Univ, Appl Sci Res Ctr, Amman 11931, Jordan
关键词
Cancelable biometrics; Biometric attacks; Vulnerability; Security; Privacy; Risk; SECURITY; CHALLENGES; TEMPLATES; FILTERS;
D O I
10.1016/j.eij.2024.100511
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cancelable biometrics (CB) has been principally proposed to solve some issues related to the security, privacy, and revocability of users' stored templates in traditional biometric systems. Its basic idea is to design a transformation function that creates a pseudo identity starting from the original biometric template while respecting mainly two properties irreversibility and revocability. The first property seeks the protection of the user data by ensuring the impossibility of recovering the original template from the transformed one. The second property permits to issue multiple pseudo identities related to one biometric trait originated from the same user. Although great efforts have been made in the literature to ensure these two properties, most of the proposed transform functions are vulnerable to several attacks and their effectiveness is still under study. Thus, the purpose of this paper is to boost the security analysis of CB by reviewing existing attacks against cancelable biometric systems. We discuss the vulnerabilities of some protection schemes that attract multiple security issues and enable the attacker to penetrate the protection system. The robustness evaluation of such schemes against some known attacks has been outlined. Also, some taxonomies related to attack approaches are presented. Furthermore, we provide comparisons between multiple attacks on cancelable biometric systems in terms of many valuable factors, after which we build a rigorous framework to evaluate a protection scheme and mitigate these attacks. As a result, our study serves as a wake-up call for the research community focused on cancelable biometric template protection, drawing attention to the vulnerabilities in these protection systems and raising awareness in this area to mitigate serious attacks. By identifying weaknesses and assessing their impacts, we hope to stimulate further research and development to enhance the security of CB systems.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems
    Kojima, Yoshihiro
    Shigetomi, Rie
    Inuma, Manabu
    Otsuka, Akira
    Imai, Hideki
    BIOMETRIC ID MANAGEMENT AND MULTIMODAL COMMUNICATION, PROCEEDINGS, 2009, 5707 : 293 - 300
  • [32] Wolf attack probability: A new security measure in biometric authentication systems
    Une, Masashi
    Otsuka, Akira
    Imai, Hideki
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 396 - +
  • [33] On robustness of speech based biometric systems against voice conversion attack
    Pal, Monisankha
    Saha, Goutam
    APPLIED SOFT COMPUTING, 2015, 30 : 214 - 228
  • [34] A Comprehensive Review On Detection Of Wormhole Attack In MANET
    Jangir, Sunil Kumar
    Hemrajani, Naveen
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [35] Wolf attack probability: A theoretical security measure in biometric authentication systems
    Une, Masashi
    Otsuka, Akira
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1380 - 1389
  • [36] A comprehensive review on iris image-based biometric system
    Winston, J. Jenkin
    Hemanth, D. Jude
    SOFT COMPUTING, 2019, 23 (19) : 9361 - 9384
  • [37] A comprehensive review on iris image-based biometric system
    J. Jenkin Winston
    D. Jude Hemanth
    Soft Computing, 2019, 23 : 9361 - 9384
  • [38] A comprehensive survey on the biometric systems based on physiological and behavioural characteristics
    Abdulrahman S.A.
    Alhayani B.
    Materials Today: Proceedings, 2023, 80 : 2642 - 2646
  • [39] Vein Biometric Recognition Methods and Systems: A Review
    Al-Khafaji, Ruaa S. S.
    Al-Tamimi, Mohammed S. H.
    ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2022, 16 (01) : 36 - 46
  • [40] Assessing cyber attack vulnerabilities of distributed generation in grid-connected systems
    Maghami, Mohammad Reza
    Mutambara, Arthur Guseni Oliver
    Gomes, Chandima
    ENVIRONMENT DEVELOPMENT AND SUSTAINABILITY, 2025,