Reversing the irreversible: A survey on inverse biometrics

被引:52
作者
Gomez-Barrero, Marta [1 ]
Galbally, Javier [2 ]
机构
[1] Hsch Darmstadt, Da Sec Biometr & Internet Secur Res Grp, Darmstadt, Germany
[2] European Commiss, DJ Joint Res Ctr E3, Rome, Italy
关键词
Biometrics; Inverse Biometrics; Privacy; Security; Survey; VOICE TRANSFORMATION; IMAGE-RECONSTRUCTION; USER AUTHENTICATION; TEMPLATE; PRIVACY; SECURITY; ATTACKS; RECOGNITION; METHODOLOGY; COMBINATION;
D O I
10.1016/j.cose.2019.101700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of biometric recognition, several issues related to the privacy and security provided by this technology have been recently raised and analysed. As a result, the early common belief among the biometrics community of templates irreversibility has been proven wrong. It is now an accepted fact that it is possible to reconstruct from an unprotected template a synthetic sample that matches the bona fide one. This reverse engineering process, commonly referred to as inverse biometrics, constitutes a severe threat for biometric systems from two different angles: on the one hand, sensitive personal data (i.e., biometric data) can be derived from compromised unprotected templates; on the other hand, other powerful attacks can be launched building upon these reconstructed samples. Given its important implications, biometric stakeholders have produced over the last fifteen years numerous works analysing the different aspects related to inverse biometrics: development of reconstruction algorithms for different characteristics; proposal of methodologies to assess the vulnerabilities of biometric systems to the aforementioned algorithms; development of countermeasures to reduce the possible effects of attacks. The present article is an effort to condense all this information in one comprehensive review of: the problem itself, the evaluation of the problem, and the mitigation of the problem. The present article is an effort to condense all this information in one comprehensive review of: the problem itself, the evaluation of the problem, and the mitigation of the problem. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:16
相关论文
共 145 条
[1]  
Abe M., 1988, ICASSP 88: 1988 International Conference on Acoustics, Speech, and Signal Processing (Cat. No.88CH2561-9), P655, DOI 10.1109/ICASSP.1988.196671
[2]  
Adler A., 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513), P469, DOI 10.1109/CCECE.2004.1345057
[3]  
Adler A, 2003, CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS, P1163
[4]   Recent Advances in Homomorphic Encryption [J].
Aguilar-Melchor, Carlos ;
Fau, Simon ;
Fontaine, Caroline ;
Gogniat, Guy ;
Sirdey, Renaud .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) :108-117
[5]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[6]  
Alegre F, 2012, EUR SIGNAL PR CONF, P36
[7]  
[Anonymous], 2008, Basic Principles of Speech Synthesis
[8]  
[Anonymous], P IEEE S SEC PRIV SS
[9]  
[Anonymous], 2013, GENERATING SEQUENCES
[10]  
[Anonymous], 2018, LECT NOTES COMPUT SC