Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge.

Gespeichert in:
Bibliographische Detailangaben
Titel: Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge.
Autoren: Belguechi, Rima Ouidad, Rosenberger, Chistophe
Quelle: EURASIP Journal on Information Security; 4/1/2025, Vol. 2025 Issue 1, p1-15, 15p
Schlagwörter: GENERAL Data Protection Regulation, 2016, PARTICLE swarm optimization, BIOMETRY, HUMAN fingerprints
Abstract: According to the EU's General Data Protection Regulation, cancelable biometrics (CB) are essential for protecting biometric templates by combining three important criteria: irreversibility, revocability, and unlinkability. Unfortunately, many works have demonstrated that the distance preserving property, inherent to CB transforms, has permitted to initiate similarity-based attack (SA). Similarity-based attack takes the information leakage between the original distance and the transformed distance and aims at reconstructing a nearby biometric feature, used to gain illegal access to the system. In this paper, we propose to mitigate the SA by mastering the attacker's knowledge that can lead to its success. For the sake of generality, we reformulate SA for unordered set templates and propose a generalized particle swarm optimization strategy to launch the attack. We pointed out that the weak point allowing the SA to operate is the distance score provided by the matching module. To limit the amount of attacker's knowledge, we propose a new matching strategy adapted to all template formats based on similarity ratio score. We have performed experiments and different comparisons on two common databases, from fingerprints and faces, and have proved at each time, the efficiency of the given countermeasure to the threatening SA. Furthermore, the security is discussed when the attacker's knowledge is expanded by additional information as synthetic biometric features, which meant to approximate the initial research space. Recommendations are then given to alleviate such risks at the design level. [ABSTRACT FROM AUTHOR]
Copyright of EURASIP Journal on Information Security is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Datenbank: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=16874161&ISBN=&volume=2025&issue=1&date=20250401&spage=1&pages=1-15&title=EURASIP Journal on Information Security&atitle=Mitigate%20authentication%20attack%20risk%20on%20cancelable%20biometrics%20by%20leveraging%20attacker%20knowledge.&aulast=Belguechi%2C%20Rima%20Ouidad&id=DOI:10.1186/s13635-025-00198-3
    Name: Full Text Finder
    Category: fullText
    Text: Full Text Finder
    Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif
    MouseOverText: Full Text Finder
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Belguechi%20RO
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edb
DbLabel: Complementary Index
An: 184164921
RelevancyScore: 1041
AccessLevel: 6
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 1040.78979492188
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Belguechi%2C+Rima+Ouidad%22">Belguechi, Rima Ouidad</searchLink><br /><searchLink fieldCode="AR" term="%22Rosenberger%2C+Chistophe%22">Rosenberger, Chistophe</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: EURASIP Journal on Information Security; 4/1/2025, Vol. 2025 Issue 1, p1-15, 15p
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22GENERAL+Data+Protection+Regulation%2C+2016%22">GENERAL Data Protection Regulation, 2016</searchLink><br /><searchLink fieldCode="DE" term="%22PARTICLE+swarm+optimization%22">PARTICLE swarm optimization</searchLink><br /><searchLink fieldCode="DE" term="%22BIOMETRY%22">BIOMETRY</searchLink><br /><searchLink fieldCode="DE" term="%22HUMAN+fingerprints%22">HUMAN fingerprints</searchLink>
– Name: Abstract
  Label: Abstract
  Group: Ab
  Data: According to the EU's General Data Protection Regulation, cancelable biometrics (CB) are essential for protecting biometric templates by combining three important criteria: irreversibility, revocability, and unlinkability. Unfortunately, many works have demonstrated that the distance preserving property, inherent to CB transforms, has permitted to initiate similarity-based attack (SA). Similarity-based attack takes the information leakage between the original distance and the transformed distance and aims at reconstructing a nearby biometric feature, used to gain illegal access to the system. In this paper, we propose to mitigate the SA by mastering the attacker's knowledge that can lead to its success. For the sake of generality, we reformulate SA for unordered set templates and propose a generalized particle swarm optimization strategy to launch the attack. We pointed out that the weak point allowing the SA to operate is the distance score provided by the matching module. To limit the amount of attacker's knowledge, we propose a new matching strategy adapted to all template formats based on similarity ratio score. We have performed experiments and different comparisons on two common databases, from fingerprints and faces, and have proved at each time, the efficiency of the given countermeasure to the threatening SA. Furthermore, the security is discussed when the attacker's knowledge is expanded by additional information as synthetic biometric features, which meant to approximate the initial research space. Recommendations are then given to alleviate such risks at the design level. [ABSTRACT FROM AUTHOR]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of EURASIP Journal on Information Security is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=184164921
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1186/s13635-025-00198-3
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 15
        StartPage: 1
    Subjects:
      – SubjectFull: GENERAL Data Protection Regulation, 2016
        Type: general
      – SubjectFull: PARTICLE swarm optimization
        Type: general
      – SubjectFull: BIOMETRY
        Type: general
      – SubjectFull: HUMAN fingerprints
        Type: general
    Titles:
      – TitleFull: Mitigate authentication attack risk on cancelable biometrics by leveraging attacker knowledge.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Belguechi, Rima Ouidad
      – PersonEntity:
          Name:
            NameFull: Rosenberger, Chistophe
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 04
              Text: 4/1/2025
              Type: published
              Y: 2025
          Identifiers:
            – Type: issn-print
              Value: 16874161
          Numbering:
            – Type: volume
              Value: 2025
            – Type: issue
              Value: 1
          Titles:
            – TitleFull: EURASIP Journal on Information Security
              Type: main
ResultId 1