A general framework for secure biometric hashing against reconstruction attacks

被引:1
|
作者
Yu, Lianyi [1 ]
Wo, Yan [1 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510641, Guangdong, Peoples R China
关键词
Privacy-preserving; Biometrics; Image hashing; Similarity attacks; Reconstruction attacks; TEMPLATE; QUANTIZATION;
D O I
10.1007/s10489-022-04153-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Binary representation is a popular privacy-preserving biometric recognition approach. However, it is vulnerable to similarity-based reconstruction attacks (i.e., similarity attacks) due to its similarity-preserving property. In this paper, the cause of this security threat is studied, a sufficient condition for secure anti-similarity-attack hashing (ASAH) is derived, and the definition of the ASAH manifold is provided. Moreover, a general framework is proposed for employing a statistical manifold to locate a secure hash function in a given hash function family. Specifically, a secure hash function can be obtained by finding the point that is closest to the ASAH manifold in the hash function family manifold. A generalized expectation-maximization-based algorithm is then developed to optimize this process. In addition, a case study is presented to clarify the implementation details of the aforementioned algorithm. In particular, an ideal ASAH submanifold is constructed through random generation to enhance the feasibility of the proposed framework, enabling ideal hash code generation. In addition, the generative adversarial network framework is adopted to generate high-quality hash codes; the distribution of these hash codes is close to that of the ideal hash codes. We perform experiments on public biometric datasets to verify that our approach can achieve both superior recognition performance and higher security under reconstruction attacks.
引用
收藏
页码:12811 / 12830
页数:20
相关论文
共 50 条
  • [41] Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks
    Habib, Sohail
    Khan, Hassan
    Hamilton-Wright, Andrew
    Hengartner, Urs
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (02)
  • [42] Reconstruction of attacks against cryptographic protocols
    Allamigeon, X
    Blanchet, B
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 140 - 154
  • [43] Robust biometric scheme against replay attacks using one-time biometric templates
    Gernot, Tanguy
    Rosenberger, Christophe
    COMPUTERS & SECURITY, 2024, 137
  • [44] Assessment of information impacts in power system security against malicious attacks in a general framework
    Bompard, E.
    Napoli, R.
    Xue, F.
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2009, 94 (06) : 1087 - 1094
  • [45] Reconstruction Attacks in Template-Based ECG Biometric Recognition Systems
    Lee, Song-Hong
    Nien, Cing-Ping
    Wu, Shun-Chi
    Swindlehurst, A. Lee
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14971 - 14984
  • [46] BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
    Hu, Shengshan
    Zhou, Ziqi
    Zhang, Yechao
    Zhang, Leo Yu
    Zheng, Yifeng
    He, Yuanyuan
    Jin, Hai
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022,
  • [47] Ensuring Secure Platooning of Constrained Intelligent and Connected Vehicles Against Byzantine Attacks: A Distributed MPC Framework
    Wei, Henglai
    Zhang, Hui
    AI-Haddad, Kamal
    Shi, Yang
    ENGINEERING, 2024, 33 : 35 - 46
  • [48] Resistance against general iterated attacks
    Vaudenay, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 255 - 271
  • [49] SECURE ESTIMATION AGAINST COMPLEX-VALUED ATTACKS
    Mohammadi, Arash
    Plataniotis, Konstantinos N.
    2016 IEEE STATISTICAL SIGNAL PROCESSING WORKSHOP (SSP), 2016,
  • [50] A Secure Network Coding System Against Wiretap Attacks
    Wang Xuebing
    Qin Na
    Liu Yantao
    2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67