Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge.
Gespeichert in:
| Titel: | Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge. |
|---|---|
| Autoren: | Belguechi, Rima Ouidad, Rosenberger, Chistophe |
| Quelle: | EURASIP Journal on Information Security; 4/1/2025, Vol. 2025 Issue 1, p1-15, 15p |
| Schlagwörter: | GENERAL Data Protection Regulation, 2016, PARTICLE swarm optimization, BIOMETRY, HUMAN fingerprints |
| Abstract: | According to the EU's General Data Protection Regulation, cancelable biometrics (CB) are essential for protecting biometric templates by combining three important criteria: irreversibility, revocability, and unlinkability. Unfortunately, many works have demonstrated that the distance preserving property, inherent to CB transforms, has permitted to initiate similarity-based attack (SA). Similarity-based attack takes the information leakage between the original distance and the transformed distance and aims at reconstructing a nearby biometric feature, used to gain illegal access to the system. In this paper, we propose to mitigate the SA by mastering the attacker's knowledge that can lead to its success. For the sake of generality, we reformulate SA for unordered set templates and propose a generalized particle swarm optimization strategy to launch the attack. We pointed out that the weak point allowing the SA to operate is the distance score provided by the matching module. To limit the amount of attacker's knowledge, we propose a new matching strategy adapted to all template formats based on similarity ratio score. We have performed experiments and different comparisons on two common databases, from fingerprints and faces, and have proved at each time, the efficiency of the given countermeasure to the threatening SA. Furthermore, the security is discussed when the attacker's knowledge is expanded by additional information as synthetic biometric features, which meant to approximate the initial research space. Recommendations are then given to alleviate such risks at the design level. [ABSTRACT FROM AUTHOR] |
| Copyright of EURASIP Journal on Information Security is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Datenbank: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=16874161&ISBN=&volume=2025&issue=1&date=20250401&spage=1&pages=1-15&title=EURASIP Journal on Information Security&atitle=Mitigate%20authentication%20attack%20risk%20on%20cancelable%20biometrics%20by%20leveraging%20attacker%20knowledge.&aulast=Belguechi%2C%20Rima%20Ouidad&id=DOI:10.1186/s13635-025-00198-3 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Belguechi%20RO Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 184164921 RelevancyScore: 1041 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 1040.78979492188 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Belguechi%2C+Rima+Ouidad%22">Belguechi, Rima Ouidad</searchLink><br /><searchLink fieldCode="AR" term="%22Rosenberger%2C+Chistophe%22">Rosenberger, Chistophe</searchLink> – Name: TitleSource Label: Source Group: Src Data: EURASIP Journal on Information Security; 4/1/2025, Vol. 2025 Issue 1, p1-15, 15p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22GENERAL+Data+Protection+Regulation%2C+2016%22">GENERAL Data Protection Regulation, 2016</searchLink><br /><searchLink fieldCode="DE" term="%22PARTICLE+swarm+optimization%22">PARTICLE swarm optimization</searchLink><br /><searchLink fieldCode="DE" term="%22BIOMETRY%22">BIOMETRY</searchLink><br /><searchLink fieldCode="DE" term="%22HUMAN+fingerprints%22">HUMAN fingerprints</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: According to the EU's General Data Protection Regulation, cancelable biometrics (CB) are essential for protecting biometric templates by combining three important criteria: irreversibility, revocability, and unlinkability. Unfortunately, many works have demonstrated that the distance preserving property, inherent to CB transforms, has permitted to initiate similarity-based attack (SA). Similarity-based attack takes the information leakage between the original distance and the transformed distance and aims at reconstructing a nearby biometric feature, used to gain illegal access to the system. In this paper, we propose to mitigate the SA by mastering the attacker's knowledge that can lead to its success. For the sake of generality, we reformulate SA for unordered set templates and propose a generalized particle swarm optimization strategy to launch the attack. We pointed out that the weak point allowing the SA to operate is the distance score provided by the matching module. To limit the amount of attacker's knowledge, we propose a new matching strategy adapted to all template formats based on similarity ratio score. We have performed experiments and different comparisons on two common databases, from fingerprints and faces, and have proved at each time, the efficiency of the given countermeasure to the threatening SA. Furthermore, the security is discussed when the attacker's knowledge is expanded by additional information as synthetic biometric features, which meant to approximate the initial research space. Recommendations are then given to alleviate such risks at the design level. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of EURASIP Journal on Information Security is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=184164921 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1186/s13635-025-00198-3 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 15 StartPage: 1 Subjects: – SubjectFull: GENERAL Data Protection Regulation, 2016 Type: general – SubjectFull: PARTICLE swarm optimization Type: general – SubjectFull: BIOMETRY Type: general – SubjectFull: HUMAN fingerprints Type: general Titles: – TitleFull: Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Belguechi, Rima Ouidad – PersonEntity: Name: NameFull: Rosenberger, Chistophe IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 04 Text: 4/1/2025 Type: published Y: 2025 Identifiers: – Type: issn-print Value: 16874161 Numbering: – Type: volume Value: 2025 – Type: issue Value: 1 Titles: – TitleFull: EURASIP Journal on Information Security Type: main |
| ResultId | 1 |
Full Text Finder
Nájsť tento článok vo Web of Science