Practical security and privacy attacks against biometric hashing using sparse recovery

被引:17
|
作者
Topcu, Berkay [1 ,2 ]
Karabat, Cagatay [1 ]
Azadmanesh, Matin [2 ]
Erdogan, Hakan [2 ]
机构
[1] Sci & Technol Res Council Turkey TUBITAK, Informat & Informat Secur Res Ctr BILGEM, TR-41470 Gebze, Kocaeli, Turkey
[2] Sabanci Univ, Fac Sci & Nat Engn, TR-34956 Istanbul, Turkey
关键词
Biometric verification; Biometric hashing; Advanced attack model; Rainbow attack;
D O I
10.1186/s13634-016-0396-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [1] Practical security and privacy attacks against biometric hashing using sparse recovery
    Berkay Topcu
    Cagatay Karabat
    Matin Azadmanesh
    Hakan Erdogan
    EURASIP Journal on Advances in Signal Processing, 2016
  • [2] A general framework for secure biometric hashing against reconstruction attacks
    Lianyi Yu
    Yan Wo
    Applied Intelligence, 2023, 53 : 12811 - 12830
  • [3] A general framework for secure biometric hashing against reconstruction attacks
    Yu, Lianyi
    Wo, Yan
    APPLIED INTELLIGENCE, 2023, 53 (10) : 12811 - 12830
  • [4] Security Analysis of Multimodal Biometric Systems against Spoof Attacks
    Akhtar, Zahid
    Kale, Sandeep
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 604 - +
  • [5] Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks
    Habib, Sohail
    Khan, Hassan
    Hamilton-Wright, Andrew
    Hengartner, Urs
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (02)
  • [6] Deep Secure Quantization: On secure biometric hashing against similarity-based attacks
    Chen, Yanzhi
    Wo, Yan
    Xie, Renjie
    Wu, Chudan
    Han, Guoqiang
    SIGNAL PROCESSING, 2019, 154 : 314 - 323
  • [7] Security and performance enhancement of fingerprint biometric template using symmetric hashing
    Ajish, S.
    Kumar, K. S. Anil
    COMPUTERS & SECURITY, 2020, 90
  • [8] Provoking Security: Spoofing Attacks against Crypto-Biometric Systems
    Toli, Christina-Angeliki
    Preneel, Bart
    2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 67 - 72
  • [9] Two practical attacks against Bluetooth security using new enhanced implementations of security analysis tools
    Haataja, Keijo M. J.
    Proceedings of the IASTED International Conference on Communication, Network, and Information Security, 2005, : 13 - 18
  • [10] Secure biometric hashing against relation-based attacks via maximizing min-entropy
    Yu, Lianyi
    Wang, Qiangjiang
    Wo, Yan
    Han, Guoqiang
    Computers and Security, 2022, 118