Practical security and privacy attacks against biometric hashing using sparse recovery

被引:17
|
作者
Topcu, Berkay [1 ,2 ]
Karabat, Cagatay [1 ]
Azadmanesh, Matin [2 ]
Erdogan, Hakan [2 ]
机构
[1] Sci & Technol Res Council Turkey TUBITAK, Informat & Informat Secur Res Ctr BILGEM, TR-41470 Gebze, Kocaeli, Turkey
[2] Sabanci Univ, Fac Sci & Nat Engn, TR-34956 Istanbul, Turkey
关键词
Biometric verification; Biometric hashing; Advanced attack model; Rainbow attack;
D O I
10.1186/s13634-016-0396-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [31] Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
    Shaik, Altaf
    Borgaonkar, Ravishankar
    Asokan, N.
    Niemi, Valtteri
    Seifert, Jean-Pierre
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [32] A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets
    Cruz, Bruno
    Gomez-Meire, Silvana
    Ruano-Ordas, David
    Janicke, Helge
    Yevseyeva, Iryna
    Mendez, Jose R.
    SCIENTIFIC PROGRAMMING, 2019, 2019
  • [33] On the Security of Practical Mail User Agents against Cache Side-Channel Attacks
    Kim, Hodong
    Yoon, Hyundo
    Shin, Youngjoo
    Hur, Junbeom
    APPLIED SCIENCES-BASEL, 2020, 10 (11):
  • [34] Security of Hash Functions against Attacks Using Quantum Computers
    Hosoyamada A.
    NTT Technical Review, 2023, 21 (07): : 43 - 47
  • [35] Three Practical Attacks Against ZigBee Security: Attack Scenario Definitions, Practical Experiments, Countermeasures, and Lessons Learned
    Olawumi, Olayemi
    Haataja, Keijo
    Asikainen, Mikko
    Vidgren, Niko
    Toivanen, Pekka
    2014 14TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2014, : 199 - 206
  • [36] Long-term Availability of Crypto Currencies Security and Privacy Against Quantum-Attacks
    Sakurai, Kouichi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 : 507 - 509
  • [37] Security and privacy in an IT context a low-cost WIDS employed against MITM attacks (concept)
    Poljak, N.
    Sevo, M.
    Livaja, I.
    2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 1614 - 1617
  • [38] Biometric Security and Privacy Using Smart Identity Management and Interoperability: Validation and Vulnerabilities of Various Techniques
    Wechsler, Harry
    REVIEW OF POLICY RESEARCH, 2012, 29 (01) : 63 - 89
  • [39] Using Model Optimization as Countermeasure against Model Recovery Attacks
    Jap, Dirmanto
    Bhasin, Shivam
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 196 - 209
  • [40] Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
    Schulz, Matthias
    Loch, Adrian
    Hollick, Matthias
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,