A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems

IF 5 3区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Egyptian Informatics Journal Pub Date : 2024-08-12 DOI:10.1016/j.eij.2024.100511
Zineb Maaref , Foudil Belhadj , Abdelouahab Attia , Zahid Akhtar , Muhammed Basheer Jasser , Athirah Mohd Ramly , Ali Wagdy Mohamed
{"title":"A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems","authors":"Zineb Maaref ,&nbsp;Foudil Belhadj ,&nbsp;Abdelouahab Attia ,&nbsp;Zahid Akhtar ,&nbsp;Muhammed Basheer Jasser ,&nbsp;Athirah Mohd Ramly ,&nbsp;Ali Wagdy Mohamed","doi":"10.1016/j.eij.2024.100511","DOIUrl":null,"url":null,"abstract":"<div><p>Cancelable biometrics (CB) has been principally proposed to solve some issues related to the security, privacy, and revocability of users’ stored templates in traditional biometric systems. Its basic idea is to design a transformation function that creates a pseudo identity starting from the original biometric template while respecting mainly two properties irreversibility and revocability. The first property seeks the protection of the user data by ensuring the impossibility of recovering the original template from the transformed one. The second property permits to issue multiple pseudo identities related to one biometric trait originated from the same user. Although great efforts have been made in the literature to ensure these two properties, most of the proposed transform functions are vulnerable to several attacks and their effectiveness is still under study. Thus, the purpose of this paper is to boost the security analysis of CB by reviewing existing attacks against cancelable biometric systems. We discuss the vulnerabilities of some protection schemes that attract multiple security issues and enable the attacker to penetrate the protection system. The robustness evaluation of such schemes against some known attacks has been outlined. Also, some taxonomies related to attack approaches are presented. Furthermore, we provide comparisons between multiple attacks on cancelable biometric systems in terms of many valuable factors, after which we build a rigorous framework to evaluate a protection scheme and mitigate these attacks. As a result, our study serves as a wake-up call for the research community focused on cancelable biometric template protection, drawing attention to the vulnerabilities in these protection systems and raising awareness in this area to mitigate serious attacks. By identifying weaknesses and assessing their impacts, we hope to stimulate further research and development to enhance the security of CB systems.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0000,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524000744/pdfft?md5=79c720e6a0f0ddd9d6796aeaadd6ad36&pid=1-s2.0-S1110866524000744-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866524000744","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Cancelable biometrics (CB) has been principally proposed to solve some issues related to the security, privacy, and revocability of users’ stored templates in traditional biometric systems. Its basic idea is to design a transformation function that creates a pseudo identity starting from the original biometric template while respecting mainly two properties irreversibility and revocability. The first property seeks the protection of the user data by ensuring the impossibility of recovering the original template from the transformed one. The second property permits to issue multiple pseudo identities related to one biometric trait originated from the same user. Although great efforts have been made in the literature to ensure these two properties, most of the proposed transform functions are vulnerable to several attacks and their effectiveness is still under study. Thus, the purpose of this paper is to boost the security analysis of CB by reviewing existing attacks against cancelable biometric systems. We discuss the vulnerabilities of some protection schemes that attract multiple security issues and enable the attacker to penetrate the protection system. The robustness evaluation of such schemes against some known attacks has been outlined. Also, some taxonomies related to attack approaches are presented. Furthermore, we provide comparisons between multiple attacks on cancelable biometric systems in terms of many valuable factors, after which we build a rigorous framework to evaluate a protection scheme and mitigate these attacks. As a result, our study serves as a wake-up call for the research community focused on cancelable biometric template protection, drawing attention to the vulnerabilities in these protection systems and raising awareness in this area to mitigate serious attacks. By identifying weaknesses and assessing their impacts, we hope to stimulate further research and development to enhance the security of CB systems.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
可取消生物识别系统的漏洞和攻击策略综述
可取消生物识别技术(CB)主要是为了解决传统生物识别系统中与用户存储模板的安全性、隐私性和可撤销性有关的一些问题而提出的。其基本思想是设计一个转换函数,从原始生物识别模板开始创建一个伪身份,同时尊重不可逆转性和可撤销性这两个主要特性。第一个特性是确保无法从转换后的模板中恢复原始模板,从而保护用户数据。第二个特性允许发布与同一用户的一个生物特征相关的多个伪身份。尽管文献为确保这两个特性做出了巨大努力,但提出的大多数变换函数都容易受到多种攻击,其有效性仍在研究之中。因此,本文的目的是通过回顾现有的针对可取消生物识别系统的攻击,加强对 CB 的安全性分析。我们讨论了一些保护方案的漏洞,这些方案会引起多种安全问题,并使攻击者能够侵入保护系统。我们还概述了针对一些已知攻击对这些方案的鲁棒性评估。此外,我们还介绍了一些与攻击方法相关的分类标准。此外,我们还就许多有价值的因素对可取消生物识别系统的多种攻击进行了比较,然后建立了一个严格的框架来评估保护方案并减轻这些攻击。因此,我们的研究为专注于可取消生物识别模板保护的研究界敲响了警钟,引起了人们对这些保护系统漏洞的关注,并提高了这一领域的意识,以减轻严重的攻击。我们希望通过找出薄弱环节并评估其影响,激励进一步的研究和开发,以增强 CB 系统的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Egyptian Informatics Journal
Egyptian Informatics Journal Decision Sciences-Management Science and Operations Research
CiteScore
11.10
自引率
1.90%
发文量
59
审稿时长
110 days
期刊介绍: The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.
期刊最新文献
HD-MVCNN: High-density ECG signal based diabetic prediction and classification using multi-view convolutional neural network A hybrid encryption algorithm based approach for secure privacy protection of big data in hospitals A new probabilistic linguistic decision-making process based on PL-BWM and improved three-way TODIM methods Interval valued inventory model with different payment strategies for green products under interval valued Grey Wolf optimizer Algorithm fitness function Intelligent SDN to enhance security in IoT networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1