Biometric template attacks and recent protection mechanisms: A survey

被引:26
作者
Abdullahi, Sani M. [1 ,2 ,3 ]
Sun, Shuifa [1 ,4 ,6 ]
Wang, Beng [4 ]
Wei, Ning [1 ]
Wang, Hongxia [5 ]
机构
[1] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
[2] China Three Gorges Univ, Coll Econ & Management, Yichang 443002, Peoples R China
[3] Univ Southern Denmark, Maersk McKinney Moller Inst, Campusvej 55, DK-5230 Odense, Denmark
[4] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou 311121, Peoples R China
[5] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[6] China Three Gorges Univ, Yichang 443002, Peoples R China
关键词
Biometric template protection; Template attacks; Authentication system; Protection mechanism; FINGERPRINT LIVENESS DETECTION; USER AUTHENTICATION SCHEME; CANCELABLE BIOMETRICS; FUZZY VAULT; 3-FACTOR AUTHENTICATION; IMAGE-RECONSTRUCTION; SENSOR NETWORKS; KEY AGREEMENT; SECURE; ENCRYPTION;
D O I
10.1016/j.inffus.2023.102144
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is an undeniable fact that biometric recognition systems are susceptible to different software-related or template attacks at different vulnerable points in the biometric authentication system. However, these attacks are frequently overlooked, implying one of two possibilities: either researchers and biometric stakeholders have forgotten or simply ignored the consequences of these attacks, or they are unaware of some of these threats. Meanwhile, if biometric systems do not have the required protection, these attacks can lead to biometric system compromise and consequently the loss of sensitive personal data, which is irreplaceable and irrevocable. Therefore, considering the significance of the implications posed by these threats, researchers and biometric stakeholders have, over the last two decades, proposed different methods to mitigate some of the attacks, while a large number of the existing attacks are left unattended to. Hence, we deemed it paramount to bring this to the attention of the research community. This article is an effort to emphasize the implications of these attacks, exploit the threat approach based on attackers' knowledge, and consolidate them into a single, thorough, and comprehensive review together with recent state-of-the-art protection mechanisms that are put forward to mitigate these threats. Moreover, a comparative performance analysis of these protection mechanisms and other possible countermeasures to the attacks is given. It is expected that this survey will, on the one hand, be a wakeup call to the biometric template protection research community, thus drawing their attention to the task at hand. On the other hand, an awareness to the ordinary users and biometric stakeholders on the risks posed by these threats.
引用
收藏
页数:28
相关论文
共 206 条
[41]   Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art [J].
Czajka, Adam ;
Bowyer, Kevin W. .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[42]  
Dang Thao, 2020, [Smart Media Journal, 스마트미디어저널], V9, P39
[43]   Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4900-4913
[45]   Efficient private key generation from iris data for privacy and security applications [J].
Dash, Priyabrata ;
Pandey, Fagul ;
Sarma, Monalisa ;
Samanta, Debasis .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
[46]   A lightweight biometrics based remote user authentication scheme for IoT services [J].
Dhillon, Parwinder Kaur ;
Kalra, Sheetal .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 :255-270
[47]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[48]  
Dong X., 2021, 2021 IEEE INT JOINT, P1
[49]  
Dong XB, 2020, Arxiv, DOI arXiv:1910.07770
[50]   A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics [J].
Dong, Xingbo ;
Jin, Zhe ;
Jin, Andrew Teoh Beng .
2019 IEEE 10TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2019,