A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems

被引:0
|
作者
Maaref, Zineb [1 ,2 ]
Belhadj, Foudil [1 ,2 ]
Attia, Abdelouahab [1 ,2 ]
Akhtar, Zahid [3 ]
Jasser, Muhammed Basheer [4 ]
Ramly, Athirah Mohd [5 ]
Mohamed, Ali Wagdy [6 ,7 ]
机构
[1] Univ Mohamed El Bachir El Ibrahimi Bordj Bou Arrer, Dept Comp Sci, Bordj Bou Arreridj 34000, Algeria
[2] Univ Mohamed El Bachir El Ibrahimi Bordj Bou Arrer, LMSE Lab, Lab Mat & Elect Syst, Bordj Bou Arreridj 34000, Algeria
[3] State Univ New York SUNY Polytech Inst, Dept Network & Comp Secur, Utica, NY 13502 USA
[4] Sunway Univ, Sch Engn & Technol, Dept Comp & Informat Syst, 5,Jalan Univ, Bandar Sunway 47500, Selangor Darul, Malaysia
[5] Univ East London, Sch Architecture Comp & Engn, Univ Way,Docklands Campus, London E16 2RD, England
[6] Cairo Univ, Operat Res Dept, Fac Grad Studies Stat Res, Giza 12613, Egypt
[7] Appl Sci Private Univ, Appl Sci Res Ctr, Amman 11931, Jordan
关键词
Cancelable biometrics; Biometric attacks; Vulnerability; Security; Privacy; Risk; SECURITY; CHALLENGES; TEMPLATES; FILTERS;
D O I
10.1016/j.eij.2024.100511
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cancelable biometrics (CB) has been principally proposed to solve some issues related to the security, privacy, and revocability of users' stored templates in traditional biometric systems. Its basic idea is to design a transformation function that creates a pseudo identity starting from the original biometric template while respecting mainly two properties irreversibility and revocability. The first property seeks the protection of the user data by ensuring the impossibility of recovering the original template from the transformed one. The second property permits to issue multiple pseudo identities related to one biometric trait originated from the same user. Although great efforts have been made in the literature to ensure these two properties, most of the proposed transform functions are vulnerable to several attacks and their effectiveness is still under study. Thus, the purpose of this paper is to boost the security analysis of CB by reviewing existing attacks against cancelable biometric systems. We discuss the vulnerabilities of some protection schemes that attract multiple security issues and enable the attacker to penetrate the protection system. The robustness evaluation of such schemes against some known attacks has been outlined. Also, some taxonomies related to attack approaches are presented. Furthermore, we provide comparisons between multiple attacks on cancelable biometric systems in terms of many valuable factors, after which we build a rigorous framework to evaluate a protection scheme and mitigate these attacks. As a result, our study serves as a wake-up call for the research community focused on cancelable biometric template protection, drawing attention to the vulnerabilities in these protection systems and raising awareness in this area to mitigate serious attacks. By identifying weaknesses and assessing their impacts, we hope to stimulate further research and development to enhance the security of CB systems.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] A Review on Biometric Systems Used in Mobile Devices
    Arslan, Bilgehan
    Sagiroglu, Seref
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2016, 19 (02): : 101 - 114
  • [42] ECG databases for biometric systems: A systematic review
    Merone, Mario
    Soda, Paolo
    Sansone, Mario
    Sansone, Carlo
    EXPERT SYSTEMS WITH APPLICATIONS, 2017, 67 : 189 - 202
  • [43] Unimodal and Multimodal Biometric Sensing Systems: A Review
    Oloyede, Muhtahir O.
    Hancke, Gerhard P.
    IEEE ACCESS, 2016, 4 : 7532 - 7555
  • [44] A Comprehensive Review of Control Strategies to Overcome Challenges During LVRT in PV Systems
    Joshi, Jyoti
    Swami, Anurag Kumar
    Jately, Vibhu
    Azzopardi, Brian
    IEEE ACCESS, 2021, 9 : 121804 - 121834
  • [45] Strategies To Improve the Performance of Hydrogen Storage Systems by Liquefaction Methods: A Comprehensive Review
    Ghorbani, Bahram
    Zendehboudi, Sohrab
    Saady, Noori M. Cata
    Duan, Xili
    Albayati, Talib M.
    ACS OMEGA, 2023, 8 (21): : 18358 - 18399
  • [46] A comprehensive review of salt rejection and mitigation strategies in solar interfacial evaporation systems
    Liu, Shang
    Yang, Qijun
    Li, Shiteng
    Lin, Meng
    DESALINATION, 2025, 600
  • [47] Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems
    Raja, Kiran B.
    Raghavendra, R.
    Busch, Christoph
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 9 - 15
  • [48] Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric Systems
    Pan, Shi
    Deravi, Farzin
    2019 EIGHTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2019,
  • [49] Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems
    Haemmerle-Uhl, Jutta
    Raab, Karl
    Uhl, Andreas
    BIOMETRICS AND ID MANAGEMENT, 2011, 6583 : 25 - 36
  • [50] A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks
    Ariffin, Noor Afiza Mohd
    Sani, Noor Fazlida Mohd
    2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS 2018), 2018, : 43 - 48