Biometric template attacks and recent protection mechanisms: A survey

被引:26
作者
Abdullahi, Sani M. [1 ,2 ,3 ]
Sun, Shuifa [1 ,4 ,6 ]
Wang, Beng [4 ]
Wei, Ning [1 ]
Wang, Hongxia [5 ]
机构
[1] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
[2] China Three Gorges Univ, Coll Econ & Management, Yichang 443002, Peoples R China
[3] Univ Southern Denmark, Maersk McKinney Moller Inst, Campusvej 55, DK-5230 Odense, Denmark
[4] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou 311121, Peoples R China
[5] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[6] China Three Gorges Univ, Yichang 443002, Peoples R China
关键词
Biometric template protection; Template attacks; Authentication system; Protection mechanism; FINGERPRINT LIVENESS DETECTION; USER AUTHENTICATION SCHEME; CANCELABLE BIOMETRICS; FUZZY VAULT; 3-FACTOR AUTHENTICATION; IMAGE-RECONSTRUCTION; SENSOR NETWORKS; KEY AGREEMENT; SECURE; ENCRYPTION;
D O I
10.1016/j.inffus.2023.102144
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is an undeniable fact that biometric recognition systems are susceptible to different software-related or template attacks at different vulnerable points in the biometric authentication system. However, these attacks are frequently overlooked, implying one of two possibilities: either researchers and biometric stakeholders have forgotten or simply ignored the consequences of these attacks, or they are unaware of some of these threats. Meanwhile, if biometric systems do not have the required protection, these attacks can lead to biometric system compromise and consequently the loss of sensitive personal data, which is irreplaceable and irrevocable. Therefore, considering the significance of the implications posed by these threats, researchers and biometric stakeholders have, over the last two decades, proposed different methods to mitigate some of the attacks, while a large number of the existing attacks are left unattended to. Hence, we deemed it paramount to bring this to the attention of the research community. This article is an effort to emphasize the implications of these attacks, exploit the threat approach based on attackers' knowledge, and consolidate them into a single, thorough, and comprehensive review together with recent state-of-the-art protection mechanisms that are put forward to mitigate these threats. Moreover, a comparative performance analysis of these protection mechanisms and other possible countermeasures to the attacks is given. It is expected that this survey will, on the one hand, be a wakeup call to the biometric template protection research community, thus drawing their attention to the task at hand. On the other hand, an awareness to the ordinary users and biometric stakeholders on the risks posed by these threats.
引用
收藏
页数:28
相关论文
共 206 条
[51]   A Cancellable Face Template Scheme Based on Nonlinear Multi-Dimension Spectral Hashing [J].
Dong, Xingbo ;
Wong, KokSheik ;
Jin, Zhe ;
Dugelay, Jean-luc .
2019 7TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF), 2019,
[52]   Efficient Decision-based Black-box Adversarial Attacks on Face Recognition [J].
Dong, Yinpeng ;
Su, Hang ;
Wu, Baoyuan ;
Li, Zhifeng ;
Liu, Wei ;
Zhang, Tong ;
Zhu, Jun .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :7706-7714
[53]  
Drozdowski P, 2018, EUR SIGNAL PR CONF, P2360, DOI 10.23919/EUSIPCO.2018.8553053
[54]   Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition With Privacy Protection [J].
Drozdowski, Pawel ;
Stockhardt, Fabian ;
Rathgeb, Christian ;
Osorio-Roig, Daile ;
Busch, Christoph .
IEEE ACCESS, 2021, 9 :139361-139378
[55]   HERS: Homomorphically Encrypted Representation Search [J].
Engelsma, Joshua J. ;
Jain, Anil K. ;
Boddeti, Vishnu Naresh .
IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIENCE, 2022, 4 (03) :349-360
[56]  
Evans N., 2019, Advances in Computer Vision and Pattern Recognition
[57]   Adversarial attacks on fingerprint liveness detection [J].
Fei, Jianwei ;
Xia, Zhihua ;
Yu, Peipeng ;
Xiao, Fengjun .
EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
[58]   Fingerprint Reconstruction: From Minutiae to Phase [J].
Feng, Jianjiang ;
Jain, Anil K. .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2011, 33 (02) :209-223
[59]   A Hybrid Approach for Generating Secure and Discriminating Face Template [J].
Feng, Yi C. ;
Yuen, Pong C. ;
Jain, Anil K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :103-117
[60]   Biometric Antispoofing Methods: A Survey in Face Recognition [J].
Galbally, Javier ;
Marcel, Sebastien ;
Fierrez, Julian .
IEEE ACCESS, 2014, 2 :1530-1552