Multi-Factor Biometrics for Authentication: A False Sense of Security

被引:0
|
作者
Al-Assam, Hisham [1 ]
Sellahewa, Harin [1 ]
Jassim, Sabah [1 ]
机构
[1] Univ Buckingham, Dept Appl Comp, Buckingham MK18 1EG, England
关键词
Multi-factor biometrics; authentication; cancellable biometrics; security analysis; face recognition; fingerprint recognition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-factor biometric recently to strengthen systems in addition to authentications have been proposed security and/or privacy of biometric enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply User-Based Transformations (UBTs) on biometric features. Typically, UBTs rely on generating user-based transformation keys from a password/PIN or retrieved from a token. One significant advantage of employing UBTs is its ability to achieve zero or near zero Equal Error Rate (EER) i.e. a clear separation of genuine and imposter distributions. However, the effect of compromised transforrmation keys on authentication accuracy has not been tested rigorously. In this paper, we challenge the myth that has been repotted in the literature that in the case of stolen transformation key(s), accuracy drops but remains close to the accuracy of biometric only system. Moreover, we shall show that a multi-factor authentication system setup to operate at a zero EER has a serious security lapse in the event of stolen or compromised keys. In such a scenario, the False Acceptance Rate (FAR) of the system reaches unacceptable levels. We shall demonstrate this by experiments conducted on face and fingerprint biometrics, and show that an imposter with a stolen key needs no more than two attempts on average to be falsely accepted by the biometric system.
引用
收藏
页码:81 / 87
页数:7
相关论文
共 50 条
  • [31] Dynamic Multi-factor Authentication for Smartphone
    Yohan, Alexander
    Lo, Nai-Wei
    Lie, Henry Roes
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2448 - 2453
  • [32] Ubiquitous Desktops with Multi-factor Authentication
    Doyle, Paul
    Deegan, Mark
    O'Driscoll, Ciaran
    Gleeson, Michael
    Gillespie, Brian
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 201 - 206
  • [33] Enhanced Multi-factor Authentication on the Cloud
    Alyounis, Essa
    Dinah, Quanq
    INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 69 - 77
  • [34] Practical Threshold Multi-Factor Authentication
    Li, Wenting
    Cheng, Haibo
    Wang, Ping
    Liang, Kaitai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3573 - 3588
  • [35] Commentary: Multi-factor identification and authentication
    Morrison, Rodger
    INFORMATION SYSTEMS MANAGEMENT, 2007, 24 (04) : 331 - 332
  • [36] Multi-Factor Authentication to Systems Login
    ALSaleem, Bandar Omar
    Alshoshan, Abdullah, I
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1092 - 1095
  • [37] At-Home Healthcare Through Smart-Environmental Sensing, Including Biometrics for Multi-Factor Authentication
    Anderson, Wes
    Simske, Steven J.
    2020 8TH IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2020), 2020, : 447 - 452
  • [38] Enhanced Cryptocurrency Security by Time-Based Token Multi-Factor Authentication Algorithm
    Abu Taher, Kazi
    Nahar, Tahmin
    Hossain, Syed Akhter
    2019 1ST INTERNATIONAL CONFERENCE ON ROBOTICS, ELECTRICAL AND SIGNAL PROCESSING TECHNIQUES (ICREST), 2019, : 308 - 312
  • [39] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [40] Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
    Ogbanufe, Obi M.
    Baham, Corey
    INFORMATION SYSTEMS FRONTIERS, 2023, 25 (02) : 897 - 916