Provoking security: Spoofing attacks against crypto-biometric systems

Christina-Angeliki Toli, B. Preneel
{"title":"Provoking security: Spoofing attacks against crypto-biometric systems","authors":"Christina-Angeliki Toli, B. Preneel","doi":"10.1109/WorldCIS.2015.7359416","DOIUrl":null,"url":null,"abstract":"Over the past decade, the trustworthiness of biometrics during authentication, and mostly, verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. In terms of spoofing, a non-colluding honest entity tries to fake somebody else's identity by presenting samples of that person's traits, or tries to gain benefit from the “leakage” of stored biometric information in a database or an electronic chip. Literature efforts are devoted to studying model threats and problems raised by targeted malicious actions for biometric systems. However, prevention mechanisms for supporting complicated schemes and the cryptography's role in the area have not received much attention. This paper presents crypto-biometric techniques, analyzing comparatively the different categories according to the main goal of the design and the methodology used in. Intrusions and countermeasures for single and multiple modalities based cryptographic approaches are covered. Finally, a novel bimodal system is suggested, able to reject such kind of attacks, presenting an anti-spoofing behavior under the cooperation between user and the function. The aim of this multidisciplinary work is to organize the current performances on how to develop security, pinpoint the potentiality for improvements and contribute to research in addressing fraud for real-world cases.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 World Congress on Internet Security (WorldCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WorldCIS.2015.7359416","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Over the past decade, the trustworthiness of biometrics during authentication, and mostly, verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. In terms of spoofing, a non-colluding honest entity tries to fake somebody else's identity by presenting samples of that person's traits, or tries to gain benefit from the “leakage” of stored biometric information in a database or an electronic chip. Literature efforts are devoted to studying model threats and problems raised by targeted malicious actions for biometric systems. However, prevention mechanisms for supporting complicated schemes and the cryptography's role in the area have not received much attention. This paper presents crypto-biometric techniques, analyzing comparatively the different categories according to the main goal of the design and the methodology used in. Intrusions and countermeasures for single and multiple modalities based cryptographic approaches are covered. Finally, a novel bimodal system is suggested, able to reject such kind of attacks, presenting an anti-spoofing behavior under the cooperation between user and the function. The aim of this multidisciplinary work is to organize the current performances on how to develop security, pinpoint the potentiality for improvements and contribute to research in addressing fraud for real-world cases.
挑衅安全:针对加密生物识别系统的欺骗攻击
在过去的十年中,生物识别技术在身份验证过程中的可信度,以及大多数情况下,验证过程已经被欺骗攻击者所破坏,这些攻击者利用了安全漏洞。就欺骗而言,一个不串通的诚实实体试图通过提供该人的特征样本来伪造他人的身份,或者试图从数据库或电子芯片中存储的生物特征信息的“泄漏”中获利。文献努力致力于研究生物识别系统中有针对性的恶意行为所带来的模型威胁和问题。然而,支持复杂方案的预防机制和密码学在该领域的作用并没有得到太多的关注。本文介绍了加密生物识别技术,根据设计的主要目标和使用的方法,对不同的分类进行了比较分析。介绍了基于单模和多模的密码方法的入侵和对策。最后,提出了一种新的双峰系统,能够在用户和功能的协同下拒绝这类攻击,呈现出抗欺骗行为。这项多学科工作的目的是组织当前关于如何开发安全性的表现,确定改进的潜力,并为解决现实世界案例中的欺诈问题的研究做出贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信