2022
DOI: 10.48550/arxiv.2203.16730
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems

Abstract: As a promising candidate to complement traditional biometric modalities, brain biometrics using electroencephalography (EEG) data has received a widespread attention in recent years. However, compared with existing biometrics such as fingerprints and face recognition, research on EEG biometrics is still in its infant stage. Most of the studies focus on either designing signal elicitation protocols from the perspective of neuroscience or developing feature extraction and classification algorithms from the viewp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Taking into account the properties of cancelable biometrics, a recent study [48] extended the preimage attack, which was defined for cryptographic hash functions, in the context of cancelable biometric templates: given a transformed template y, it should be difficult to find the true solution x = x 0 such that y = f (x 0 , k), where f (•) is the transformation function with key k and x 0 the raw biometric template. That is to say, collision resistance is a property of cryptographic hash functions, but it is not necessarily required by the noninvertible transformation in a cancelable template design.…”
Section: Preimage Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Taking into account the properties of cancelable biometrics, a recent study [48] extended the preimage attack, which was defined for cryptographic hash functions, in the context of cancelable biometric templates: given a transformed template y, it should be difficult to find the true solution x = x 0 such that y = f (x 0 , k), where f (•) is the transformation function with key k and x 0 the raw biometric template. That is to say, collision resistance is a property of cryptographic hash functions, but it is not necessarily required by the noninvertible transformation in a cancelable template design.…”
Section: Preimage Attacksmentioning
confidence: 99%
“…We demonstrate that t ′ 1 is far from t 1 so that the attacker will not be able to break in the system again. Re-entering user accounts using previously estimated feature vectors after template revocation is referred to as second attacks [48].…”
Section: Hill-climbing Attacks and Second Attacksmentioning
confidence: 99%