Application of new alteration attack on biometric authentication systems

M. Lafkih, Patrick Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, Mohammed El Haziti, Wadood Abdul, D. Aboutajdine
{"title":"Application of new alteration attack on biometric authentication systems","authors":"M. Lafkih, Patrick Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, Mohammed El Haziti, Wadood Abdul, D. Aboutajdine","doi":"10.1109/ANTI-CYBERCRIME.2015.7351944","DOIUrl":null,"url":null,"abstract":"Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However, the protection of biometric systems against different types of attacks is not yet guaranteed. While many studies are proposed in order to increase the security of biometric systems, several attacks are developed in order to exploit the weaknesses of these systems. In this paper, we present a new alteration attack on biometric authentication systems. We suppose that the impostor has altered image of the real user and he presents it as request in order to gain unlawful access to the system. Altered image can be recuperated from a fingerprint trace in case of fingerprint based systems or user photograph for attacking face based authentication systems. Next, we study the impact of alteration level on the matching score for fingerprint and face based biometric systems. Our analysis shows that both systems are vulnerable to the proposed attack and the alteration level has serious impact on the security of biometric systems. The impostor can have a matching score greater than 90% for the tested fingerprint based biometric system and 190/194 associations are matched for the tested face based biometric authentication system.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 First International Conference on Anti-Cybercrime (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351944","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Biometrics-based authentication systems are presented as an alternative solution to the traditional authentication techniques, these systems have more security advantages compared to a password as biometric data cannot be forgotten or wasted. However, the protection of biometric systems against different types of attacks is not yet guaranteed. While many studies are proposed in order to increase the security of biometric systems, several attacks are developed in order to exploit the weaknesses of these systems. In this paper, we present a new alteration attack on biometric authentication systems. We suppose that the impostor has altered image of the real user and he presents it as request in order to gain unlawful access to the system. Altered image can be recuperated from a fingerprint trace in case of fingerprint based systems or user photograph for attacking face based authentication systems. Next, we study the impact of alteration level on the matching score for fingerprint and face based biometric systems. Our analysis shows that both systems are vulnerable to the proposed attack and the alteration level has serious impact on the security of biometric systems. The impostor can have a matching score greater than 90% for the tested fingerprint based biometric system and 190/194 associations are matched for the tested face based biometric authentication system.
新型篡改攻击在生物识别认证系统中的应用
基于生物特征的身份验证系统是传统身份验证技术的替代方案,与密码相比,这些系统具有更大的安全性优势,因为生物特征数据不会被遗忘或浪费。然而,生物识别系统对不同类型攻击的保护还没有得到保证。虽然提出了许多研究以提高生物识别系统的安全性,但为了利用这些系统的弱点,开发了几种攻击。本文提出了一种针对生物特征认证系统的篡改攻击方法。我们假设冒名顶替者已经更改了真实用户的图像,并将其作为请求呈现,以非法访问系统。在基于指纹的系统或攻击基于人脸的身份验证系统的情况下,可以从指纹痕迹中恢复改变的图像或用户照片。接下来,我们研究了改变程度对基于指纹和人脸的生物识别系统匹配分数的影响。我们的分析表明,这两个系统都容易受到所提出的攻击,并且改变水平对生物识别系统的安全性有严重影响。对于所测试的基于指纹的生物识别系统,冒名顶替者可以具有大于90%的匹配分数,并且对于所测试的基于人脸的生物识别认证系统,匹配190/194个关联。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信