Authentication Attacks on Projection-based Cancelable Biometric Schemes

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cancelable biometric schemes aim at generating secure biometric templates by combining user specific tokens, such as password, stored secret or salt, along with biometric data. This type of transformation is constructed as a composition of a biometric transformation with a feature extraction algorithm. The security requirements of cancelable biometric schemes concern the irreversibility, unlinkability and revocability of templates, without losing in accuracy of comparison. While several schemes were recently attacked regarding these requirements, full reversibility of such a composition in order to produce colliding biometric characteristics, and specifically presentation attacks, were never demonstrated to the best of our knowledge. In this paper, we formalize these attacks for a traditional cancelable scheme with the help of integer linear programming (ILP) and quadratically constrained quadratic programming (QCQP). Solving these optimization problems allows an adversary to slightly alter its fingerprint image in order to impersonate any individual. Moreover, in an even more severe scenario, it is possible to simultaneously impersonate several individuals.

Cite

CITATION STYLE

APA

Durbet, A., Grollemund, P. M., Lafourcade, P., Migdal, D., & Thiry-Atighehchi, K. (2022). Authentication Attacks on Projection-based Cancelable Biometric Schemes. In Proceedings of the International Conference on Security and Cryptography (Vol. 1, pp. 568–573). Science and Technology Publications, Lda. https://doi.org/10.5220/0011277100003283

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free