Security analysis of cancellable biometrics using constrained-optimized similarity-based attack

06/23/2020
by   Hanrui Wang, et al.
0

Cancellable biometrics (CB) intentionally distorts biometric template for security protection, and simultaneously preserving the distance/similarity for matching in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB is underestimated. Dong et al. [BTAS'19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong's genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We justify the effectiveness of CSA from the supervised learning perspective. We conduct extensive experiments to demonstrate CSA against Index-of-Max (IoM) hashing with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing security, and outperforms GASA remarkably. Furthermore, we reveal the correlation of IoM hash code size and the attack performance of CSA.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/08/2019

A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics

Cancellable biometrics (CB) as a means for biometric template protection...
research
10/17/2019

On the Reliability of Cancelable Biometrics: Revisit the Irreversibility

Over the years, many biometric template protection schemes, primarily ba...
research
03/16/2017

Ranking Based Locality Sensitive Hashing Enabled Cancelable Biometrics: Index-of-Max Hashing

In this paper, we propose a ranking based locality sensitive hashing ins...
research
03/02/2022

A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code

Hashing technology gains much attention in protecting the biometric temp...
research
03/22/2023

Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval

Deep hashing has been extensively applied to massive image retrieval due...
research
04/18/2022

Centralized Adversarial Learning for Robust Deep Hashing

Deep hashing has been extensively utilized in massive image retrieval be...
research
11/04/2021

Continuous Encryption Functions for Security Over Networks

This paper presents a study of continuous encryption functions (CEFs) of...

Please sign up or login with your details

Forgot password? Click here to reset