Application of new alteration attack on biometric authentication systems

M. Lafkih, Patrick Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, Mohammed El Haziti, Wadood Abdul, D. Aboutajdine
{"title":"Application of new alteration attack on biometric authentication systems","authors":"M. Lafkih, Patrick Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, Mohammed El Haziti, Wadood Abdul, D. Aboutajdine","doi":"10.1109/ANTI-CYBERCRIME.2015.7351944","DOIUrl":null,"url":null,"abstract":"Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However, the protection of biometric systems against different types of attacks is not yet guaranteed. While many studies are proposed in order to increase the security of biometric systems, several attacks are developed in order to exploit the weaknesses of these systems. In this paper, we present a new alteration attack on biometric authentication systems. We suppose that the impostor has altered image of the real user and he presents it as request in order to gain unlawful access to the system. Altered image can be recuperated from a fingerprint trace in case of fingerprint based systems or user photograph for attacking face based authentication systems. Next, we study the impact of alteration level on the matching score for fingerprint and face based biometric systems. Our analysis shows that both systems are vulnerable to the proposed attack and the alteration level has serious impact on the security of biometric systems. The impostor can have a matching score greater than 90% for the tested fingerprint based biometric system and 190/194 associations are matched for the tested face based biometric authentication system.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 First International Conference on Anti-Cybercrime (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351944","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However, the protection of biometric systems against different types of attacks is not yet guaranteed. While many studies are proposed in order to increase the security of biometric systems, several attacks are developed in order to exploit the weaknesses of these systems. In this paper, we present a new alteration attack on biometric authentication systems. We suppose that the impostor has altered image of the real user and he presents it as request in order to gain unlawful access to the system. Altered image can be recuperated from a fingerprint trace in case of fingerprint based systems or user photograph for attacking face based authentication systems. Next, we study the impact of alteration level on the matching score for fingerprint and face based biometric systems. Our analysis shows that both systems are vulnerable to the proposed attack and the alteration level has serious impact on the security of biometric systems. The impostor can have a matching score greater than 90% for the tested fingerprint based biometric system and 190/194 associations are matched for the tested face based biometric authentication system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
新型篡改攻击在生物识别认证系统中的应用
基于生物特征的身份验证系统是传统身份验证技术的替代方案,与密码相比,这些系统具有更大的安全性优势,因为生物特征数据不会被遗忘或浪费。然而,生物识别系统对不同类型攻击的保护还没有得到保证。虽然提出了许多研究以提高生物识别系统的安全性,但为了利用这些系统的弱点,开发了几种攻击。本文提出了一种针对生物特征认证系统的篡改攻击方法。我们假设冒名顶替者已经更改了真实用户的图像,并将其作为请求呈现,以非法访问系统。在基于指纹的系统或攻击基于人脸的身份验证系统的情况下,可以从指纹痕迹中恢复改变的图像或用户照片。接下来,我们研究了改变程度对基于指纹和人脸的生物识别系统匹配分数的影响。我们的分析表明,这两个系统都容易受到所提出的攻击,并且改变水平对生物识别系统的安全性有严重影响。对于所测试的基于指纹的生物识别系统,冒名顶替者可以具有大于90%的匹配分数,并且对于所测试的基于人脸的生物识别认证系统,匹配190/194个关联。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A new Chinese wall security policy model based on the subject's wall and object's wall Application of new alteration attack on biometric authentication systems Securing cognitive radio enabled smart grid systems against cyber attacks Website fingerprinting as a cybercrime investigation model: Role and challenges Toward an multidisciplinary curriculum in cyberscience
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1