Practical security and privacy attacks against biometric hashing using sparse recovery

被引:17
|
作者
Topcu, Berkay [1 ,2 ]
Karabat, Cagatay [1 ]
Azadmanesh, Matin [2 ]
Erdogan, Hakan [2 ]
机构
[1] Sci & Technol Res Council Turkey TUBITAK, Informat & Informat Secur Res Ctr BILGEM, TR-41470 Gebze, Kocaeli, Turkey
[2] Sabanci Univ, Fac Sci & Nat Engn, TR-34956 Istanbul, Turkey
关键词
Biometric verification; Biometric hashing; Advanced attack model; Rainbow attack;
D O I
10.1186/s13634-016-0396-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [21] Investigating attacks to improve security and privacy in RFID systems using the security bit method
    Damghani, Hamidreza
    Hosseinian, Heliasadat
    Damghani, Leila
    2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 833 - 838
  • [22] The security of elastic block ciphers against key-recovery attacks
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 89 - +
  • [23] Border Crossing Security and Privacy in Biometric Passport using Cryptographic Authentication Protocol
    Prabhusundhar, P.
    Kumar, V. K. Narendira
    Srinivasan, B.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,
  • [24] Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric Encryption
    Lacerda Filho, Eduardo M.
    Goncalves, Vinicius P.
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 481 - 489
  • [25] Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm
    Mohanaprakash, T. A.
    Andrews, J.
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [26] Practical Security of RSA Against NTC-Architecture Quantum Computing Attacks
    Li, Kai
    Cai, Qing-yu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (08) : 2733 - 2744
  • [27] Practical Security of RSA Against NTC-Architecture Quantum Computing Attacks
    Kai Li
    Qing-yu Cai
    International Journal of Theoretical Physics, 2021, 60 : 2733 - 2744
  • [28] SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks
    Shen, Liyan
    Ke, Zhenhan
    Shi, Jinqiao
    Zhang, Xi
    Sun, Yanwei
    Zhao, Jiapeng
    Wang, Xuebin
    Zhao, Xiaojie
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13437 - 13451
  • [29] Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition
    Li, Dezhi
    Park, Hojin
    Dong, Xingbo
    Lai, YenLung
    Zhang, Hui
    Teoh, Andrew Beng Jin
    Jin, Zhe
    PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT V, 2024, 14429 : 57 - 73
  • [30] Assessing the invertibility of deep biometric representations: Investigating CNN hyperparameters for enhanced security against adversarial attacks
    Grazian, Clara
    Jin, Qian
    Tangari, Gioacchino
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 264