Biometric template attacks and recent protection mechanisms: A survey

被引:26
作者
Abdullahi, Sani M. [1 ,2 ,3 ]
Sun, Shuifa [1 ,4 ,6 ]
Wang, Beng [4 ]
Wei, Ning [1 ]
Wang, Hongxia [5 ]
机构
[1] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
[2] China Three Gorges Univ, Coll Econ & Management, Yichang 443002, Peoples R China
[3] Univ Southern Denmark, Maersk McKinney Moller Inst, Campusvej 55, DK-5230 Odense, Denmark
[4] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou 311121, Peoples R China
[5] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[6] China Three Gorges Univ, Yichang 443002, Peoples R China
关键词
Biometric template protection; Template attacks; Authentication system; Protection mechanism; FINGERPRINT LIVENESS DETECTION; USER AUTHENTICATION SCHEME; CANCELABLE BIOMETRICS; FUZZY VAULT; 3-FACTOR AUTHENTICATION; IMAGE-RECONSTRUCTION; SENSOR NETWORKS; KEY AGREEMENT; SECURE; ENCRYPTION;
D O I
10.1016/j.inffus.2023.102144
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is an undeniable fact that biometric recognition systems are susceptible to different software-related or template attacks at different vulnerable points in the biometric authentication system. However, these attacks are frequently overlooked, implying one of two possibilities: either researchers and biometric stakeholders have forgotten or simply ignored the consequences of these attacks, or they are unaware of some of these threats. Meanwhile, if biometric systems do not have the required protection, these attacks can lead to biometric system compromise and consequently the loss of sensitive personal data, which is irreplaceable and irrevocable. Therefore, considering the significance of the implications posed by these threats, researchers and biometric stakeholders have, over the last two decades, proposed different methods to mitigate some of the attacks, while a large number of the existing attacks are left unattended to. Hence, we deemed it paramount to bring this to the attention of the research community. This article is an effort to emphasize the implications of these attacks, exploit the threat approach based on attackers' knowledge, and consolidate them into a single, thorough, and comprehensive review together with recent state-of-the-art protection mechanisms that are put forward to mitigate these threats. Moreover, a comparative performance analysis of these protection mechanisms and other possible countermeasures to the attacks is given. It is expected that this survey will, on the one hand, be a wakeup call to the biometric template protection research community, thus drawing their attention to the task at hand. On the other hand, an awareness to the ordinary users and biometric stakeholders on the risks posed by these threats.
引用
收藏
页数:28
相关论文
共 206 条
[91]   Cancelable features using log-Gabor filters for biometric authentication [J].
Kaur, Harkeerat ;
Khanna, Pritee .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) :4673-4694
[92]   Cancelable fingerprint template design with randomized non-negative least squares [J].
Kho, Jun Beom ;
Kim, Jaihie ;
Kim, Ig-Jae ;
Teoh, Andrew B. J. .
PATTERN RECOGNITION, 2019, 91 :245-260
[93]   Itealization of correlation attack against the fuzzy vault scheme [J].
Kholmatov, Alisher ;
Yanikoglu, Berrin .
SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
[94]   Reconstruction of Fingerprints from Minutiae Using Conditional Adversarial Networks [J].
Kim, Hakil ;
Cui, Xuenan ;
Kim, Man-Gyu ;
Thi Hai Binh Nguyen .
DIGITAL FORENSICS AND WATERMARKING, IWDW 2018, 2019, 11378 :353-362
[95]   Cancelable ECG Biometrics Using Compressive Sensing-Generalized Likelihood Ratio Test [J].
Kim, Hanvit ;
Chun, Se Young .
IEEE ACCESS, 2019, 7 :9232-9242
[96]   Finger Vein Template Protection Based on Alignment-Robust Feature Description and Index-of-Maximum Hashing [J].
Kirchgasser S. ;
Kauba C. ;
Lai Y.-L. ;
Zhe J. ;
Uhl A. .
IEEE Transactions on Biometrics, Behavior, and Identity Science, 2020, 2 (04) :337-349
[97]  
Kolberg J, 2020, LECT NOTE INFORM, VP-306
[98]   Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification [J].
Kolberg, Jascha ;
Bauspiess, Pia ;
Gomez-Barrero, Marta ;
Rathgeb, Christian ;
Durmuth, Markus ;
Busch, Christoph .
2019 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2019,
[99]   An improved and secure multiserver authentication scheme based on biometrics and smartcard [J].
Kumar, Ashish ;
Om, Hari .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (01) :27-38
[100]   Generative Adversarial Attacks on Fingerprint Recognition Systems [J].
Kwon, Hee Won ;
Nam, Jea-Won ;
Kim, Joongheon ;
Lee, Youn Kyu .
35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, :483-485