Near-collisions and their Impact on Biometric Security (long)

by   Axel Durbet, et al.

Biometric recognition encompasses two operating modes. The first one is biometric identification which consists in determining the identity of an individual based on her biometrics and requires browsing the entire database (i.e., a 1:N search). The other one is biometric authentication which corresponds to verifying claimed biometrics of an individual (i.e., a 1:1 search) to authenticate her, or grant her access to some services. The matching process is based on the similarities between a fresh and an enrolled biometric template. Considering the case of binary templates, we investigate how a highly populated database yields near-collisions, impacting the security of both the operating modes. Insight into the security of binary templates is given by establishing a lower bound on the size of templates and an upper bound on the size of a template database depending on security parameters. We provide efficient algorithms for partitioning a leaked template database in order to improve the generation of a master-template-set that can impersonates any enrolled user and possibly some future users. Practical impacts of proposed algorithms are finally emphasized with experimental studies.



page 1

page 2

page 3

page 4


Biometric Masterkeys

Biometric authentication is used to secure digital or physical access. S...

A New Biometric Template Protection using Random Orthonormal Projection and Fuzzy Commitment

Biometric template protection is one of most essential parts in putting ...

A Novel Scheme for Generating Secure Face Templates Using BDA

In identity management system, frequently used biometric recognition sys...

Enhancing Template Security of Face Biometrics by Using Edge Detection and Hashing

In this paper we address the issues of using edge detection techniques o...

On the Root of Trust Identification Problem

Root of Trust Identification (RTI) refers to determining whether a given...

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

In this work, we investigate the concept of biometric backdoors: a templ...

A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing

Cancelable biometric schemes generate secure biometric templates by comb...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.