Near-collisions and their Impact on Biometric Security (long)

05/06/2022
by   Axel Durbet, et al.
0

Biometric recognition encompasses two operating modes. The first one is biometric identification which consists in determining the identity of an individual based on her biometrics and requires browsing the entire database (i.e., a 1:N search). The other one is biometric authentication which corresponds to verifying claimed biometrics of an individual (i.e., a 1:1 search) to authenticate her, or grant her access to some services. The matching process is based on the similarities between a fresh and an enrolled biometric template. Considering the case of binary templates, we investigate how a highly populated database yields near-collisions, impacting the security of both the operating modes. Insight into the security of binary templates is given by establishing a lower bound on the size of templates and an upper bound on the size of a template database depending on security parameters. We provide efficient algorithms for partitioning a leaked template database in order to improve the generation of a master-template-set that can impersonates any enrolled user and possibly some future users. Practical impacts of proposed algorithms are finally emphasized with experimental studies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/04/2023

Untargeted Near-collision Attacks in Biometric Recognition

A biometric recognition system can operate in two distinct modes, identi...
research
07/24/2021

Biometric Masterkeys

Biometric authentication is used to secure digital or physical access. S...
research
12/29/2013

A Novel Scheme for Generating Secure Face Templates Using BDA

In identity management system, frequently used biometric recognition sys...
research
01/22/2014

Enhancing Template Security of Face Biometrics by Using Edge Detection and Hashing

In this paper we address the issues of using edge detection techniques o...
research
10/26/2020

On the Root of Trust Identification Problem

Root of Trust Identification (RTI) refers to determining whether a given...
research
10/03/2019

A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing

Cancelable biometric schemes generate secure biometric templates by comb...
research
04/23/2019

Privacy Preserving Group Membership Verification and Identification

When convoking privacy, group membership verification checks if a biomet...

Please sign up or login with your details

Forgot password? Click here to reset