Practical security and privacy attacks against biometric hashing using sparse recovery

被引:17
|
作者
Topcu, Berkay [1 ,2 ]
Karabat, Cagatay [1 ]
Azadmanesh, Matin [2 ]
Erdogan, Hakan [2 ]
机构
[1] Sci & Technol Res Council Turkey TUBITAK, Informat & Informat Secur Res Ctr BILGEM, TR-41470 Gebze, Kocaeli, Turkey
[2] Sabanci Univ, Fac Sci & Nat Engn, TR-34956 Istanbul, Turkey
关键词
Biometric verification; Biometric hashing; Advanced attack model; Rainbow attack;
D O I
10.1186/s13634-016-0396-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [41] A Robust and Practical Solution to ADS-B Security Against Denial-of-Service Attacks
    Zhang, Qianyun
    Wang, Zhendong
    Wu, Biyi
    Gui, Guan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13647 - 13659
  • [42] Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs
    Bhasin, Shivam
    Selmane, Nidhal
    Guilley, Sylvain
    Danger, Jean-Luc
    2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 15 - 21
  • [43] Preserving Location Privacy in the IoT against Advanced Attacks using Deep Learning
    Alyousef, Abdullah S.
    Srinivasan, Karthik
    Alrahhal, Mohamad Shady
    Alshammari, Majdah
    Al-Akhras, Mousa
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 416 - 427
  • [44] Defending against sparse adversarial attacks using impulsive noise reduction filters
    Radlak, Krystian
    Szczepankiewicz, Michal
    Smolka, Bogdan
    REAL-TIME IMAGE PROCESSING AND DEEP LEARNING 2021, 2021, 11736
  • [45] DDSA: A Defense Against Adversarial Attacks Using Deep Denoising Sparse Autoencoder
    Bakhti, Yassine
    Fezza, Sid Ahmed
    Hamidouche, Wassim
    Deforges, Olivier
    IEEE ACCESS, 2019, 7 : 160397 - 160407
  • [46] Critical Infrastructure Security Against Drone Attacks Using Visual Analytics
    Zhang, Xindi
    Chandramouli, Krishna
    COMPUTER VISION SYSTEMS (ICVS 2019), 2019, 11754 : 713 - 722
  • [47] Enhanced Security of MANETs Against Black Hole Attacks Using AS Technique
    Unissa, Ishrath
    Ahmad, Syed Jalal
    ICCCE 2018, 2019, 500 : 83 - 92
  • [48] Enhancing Deep Learning Model Privacy Against Membership Inference Attacks Using Privacy-Preserving Oversampling
    Subhasish Ghosh
    Amit Kr Mandal
    Agostino Cortesi
    SN Computer Science, 6 (4)
  • [49] PIHA: Detection method using perceptual image hashing against query-based adversarial attacks
    Choi, Seok-Hwan
    Shin, Jinmyeong
    Choi, Yoon-Ho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 145 : 563 - 577
  • [50] Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution
    Pan, Yaxi
    Zhang, Ling
    Huang, Duan
    APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 16