2016
DOI: 10.1186/s13634-016-0396-1
|View full text |Cite
|
Sign up to set email alerts
|

Practical security and privacy attacks against biometric hashing using sparse recovery

Abstract: Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 32 publications
0
13
0
Order By: Relevance
“…This could be achieved by exploiting security vulnerabilities specific to the cancelable transformation scheme or even by using brute-force attacks. Inversion attacks [18], [31], [32] are the most common type of attack against biometric template protection schemes. These attacks aim at reversing the CB transform, utilizing vulnerabilities specific to each CB scheme.…”
Section: A Related Workmentioning
confidence: 99%
“…This could be achieved by exploiting security vulnerabilities specific to the cancelable transformation scheme or even by using brute-force attacks. Inversion attacks [18], [31], [32] are the most common type of attack against biometric template protection schemes. These attacks aim at reversing the CB transform, utilizing vulnerabilities specific to each CB scheme.…”
Section: A Related Workmentioning
confidence: 99%
“…That is, they suffer from the same problems associated with traditional-based authentication systems. In other words, if these random keys are compromised, the False Acceptance Rate (FAR) would increase significantly [24]. Moreover, although the employed non-invertible transforms are much harder to be reversed compared to invertible transforms, it would be much simpler for a skilled attacker to invert the transform and disclose the original features if he/she could gain access to these userspecific factors.…”
Section: Related Workmentioning
confidence: 99%
“…Feature extraction is an important step in speech retrieval, with most research making use of perceptual hashes [7][8][9] or audio fingerprints [10][11][12]. In addition, in order to improve system security, some good methods have been applied, such as zero-leakage biometric protection [13], cancelable biometrics [14,15], biometrics hashing [16,17], and secret key generation [18].…”
Section: Introductionmentioning
confidence: 99%
“…It has good security, but for the false acceptance rate (FAR), the matching efficiency needs to be promoted. Similarly, zeroleakage biometric protection [13] and biometric hashing [16,17] have good security but are affected by algorithm complexity for weak system efficiency.…”
Section: Introductionmentioning
confidence: 99%