A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems

IF 5 3区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Zineb Maaref , Foudil Belhadj , Abdelouahab Attia , Zahid Akhtar , Muhammed Basheer Jasser , Athirah Mohd Ramly , Ali Wagdy Mohamed
{"title":"A comprehensive review of vulnerabilities and attack strategies in cancelable biometric systems","authors":"Zineb Maaref ,&nbsp;Foudil Belhadj ,&nbsp;Abdelouahab Attia ,&nbsp;Zahid Akhtar ,&nbsp;Muhammed Basheer Jasser ,&nbsp;Athirah Mohd Ramly ,&nbsp;Ali Wagdy Mohamed","doi":"10.1016/j.eij.2024.100511","DOIUrl":null,"url":null,"abstract":"<div><p>Cancelable biometrics (CB) has been principally proposed to solve some issues related to the security, privacy, and revocability of users’ stored templates in traditional biometric systems. Its basic idea is to design a transformation function that creates a pseudo identity starting from the original biometric template while respecting mainly two properties irreversibility and revocability. The first property seeks the protection of the user data by ensuring the impossibility of recovering the original template from the transformed one. The second property permits to issue multiple pseudo identities related to one biometric trait originated from the same user. Although great efforts have been made in the literature to ensure these two properties, most of the proposed transform functions are vulnerable to several attacks and their effectiveness is still under study. Thus, the purpose of this paper is to boost the security analysis of CB by reviewing existing attacks against cancelable biometric systems. We discuss the vulnerabilities of some protection schemes that attract multiple security issues and enable the attacker to penetrate the protection system. The robustness evaluation of such schemes against some known attacks has been outlined. Also, some taxonomies related to attack approaches are presented. Furthermore, we provide comparisons between multiple attacks on cancelable biometric systems in terms of many valuable factors, after which we build a rigorous framework to evaluate a protection scheme and mitigate these attacks. As a result, our study serves as a wake-up call for the research community focused on cancelable biometric template protection, drawing attention to the vulnerabilities in these protection systems and raising awareness in this area to mitigate serious attacks. By identifying weaknesses and assessing their impacts, we hope to stimulate further research and development to enhance the security of CB systems.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0000,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524000744/pdfft?md5=79c720e6a0f0ddd9d6796aeaadd6ad36&pid=1-s2.0-S1110866524000744-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866524000744","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Cancelable biometrics (CB) has been principally proposed to solve some issues related to the security, privacy, and revocability of users’ stored templates in traditional biometric systems. Its basic idea is to design a transformation function that creates a pseudo identity starting from the original biometric template while respecting mainly two properties irreversibility and revocability. The first property seeks the protection of the user data by ensuring the impossibility of recovering the original template from the transformed one. The second property permits to issue multiple pseudo identities related to one biometric trait originated from the same user. Although great efforts have been made in the literature to ensure these two properties, most of the proposed transform functions are vulnerable to several attacks and their effectiveness is still under study. Thus, the purpose of this paper is to boost the security analysis of CB by reviewing existing attacks against cancelable biometric systems. We discuss the vulnerabilities of some protection schemes that attract multiple security issues and enable the attacker to penetrate the protection system. The robustness evaluation of such schemes against some known attacks has been outlined. Also, some taxonomies related to attack approaches are presented. Furthermore, we provide comparisons between multiple attacks on cancelable biometric systems in terms of many valuable factors, after which we build a rigorous framework to evaluate a protection scheme and mitigate these attacks. As a result, our study serves as a wake-up call for the research community focused on cancelable biometric template protection, drawing attention to the vulnerabilities in these protection systems and raising awareness in this area to mitigate serious attacks. By identifying weaknesses and assessing their impacts, we hope to stimulate further research and development to enhance the security of CB systems.

可取消生物识别系统的漏洞和攻击策略综述
可取消生物识别技术(CB)主要是为了解决传统生物识别系统中与用户存储模板的安全性、隐私性和可撤销性有关的一些问题而提出的。其基本思想是设计一个转换函数,从原始生物识别模板开始创建一个伪身份,同时尊重不可逆转性和可撤销性这两个主要特性。第一个特性是确保无法从转换后的模板中恢复原始模板,从而保护用户数据。第二个特性允许发布与同一用户的一个生物特征相关的多个伪身份。尽管文献为确保这两个特性做出了巨大努力,但提出的大多数变换函数都容易受到多种攻击,其有效性仍在研究之中。因此,本文的目的是通过回顾现有的针对可取消生物识别系统的攻击,加强对 CB 的安全性分析。我们讨论了一些保护方案的漏洞,这些方案会引起多种安全问题,并使攻击者能够侵入保护系统。我们还概述了针对一些已知攻击对这些方案的鲁棒性评估。此外,我们还介绍了一些与攻击方法相关的分类标准。此外,我们还就许多有价值的因素对可取消生物识别系统的多种攻击进行了比较,然后建立了一个严格的框架来评估保护方案并减轻这些攻击。因此,我们的研究为专注于可取消生物识别模板保护的研究界敲响了警钟,引起了人们对这些保护系统漏洞的关注,并提高了这一领域的意识,以减轻严重的攻击。我们希望通过找出薄弱环节并评估其影响,激励进一步的研究和开发,以增强 CB 系统的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Egyptian Informatics Journal
Egyptian Informatics Journal Decision Sciences-Management Science and Operations Research
CiteScore
11.10
自引率
1.90%
发文量
59
审稿时长
110 days
期刊介绍: The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信