On the Reliability of Cancelable Biometrics: Revisit the Irreversibility

by   Xingbo Dong, et al.

Over the years, many biometric template protection schemes, primarily based on the notion of "cancelable biometrics" have been proposed. A cancelable biometric algorithm needs to satisfy four biometric template protection criteria, i.e., irreversibility, revocability, unlinkability, and performance preservation. However, a systematic analysis of irreversibility has been often neglected. In this paper, the common distance correlation characteristic of cancelable biometrics is analyzed. Next, a similarity-based attack is formulated to break the irreversibility of cancelable biometric under the Kerckhoffs's assumption where the cancelable biometrics algorithm and parameter are known to the attackers. The irreversibility based on the mutual information is also redefined, and a framework to measure the information leakage from the distance correlation characteristic is proposed. The results achieved on face, iris, and fingerprint prove that it is theoretically hard to meet full irreversibility. To have a good biometric system, a balance has to be achieved between accuracy and security.



There are no comments yet.


page 1

page 2

page 3

page 4


Fingerprint Orientation Estimation: Challenges and Opportunities

There is an exponential increase in portable electronic devices with bio...

A Novel Approach For Generating Face Template Using Bda

In identity management system, commonly used biometric recognition syste...

Security analysis of cancellable biometrics using constrained-optimized similarity-based attack

Cancellable biometrics (CB) intentionally distorts biometric template fo...

A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics

Cancellable biometrics (CB) as a means for biometric template protection...

Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT

With the emergence of the Internet-of-Things (IoT), there is a growing n...

Biometric Verification Secure Against Malicious Adversaries

Biometric verification has been widely deployed in current authenticatio...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.