A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing
Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric s...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2020-01, Vol.15, p.1-1 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE transactions on information forensics and security |
container_volume | 15 |
creator | Ghammamy, Loubna Karabinaz, Koray Lacharme, Patrick Thiry-Atighehchi, Kevin |
description | Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes. |
doi_str_mv | 10.1109/TIFS.2020.2977533 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_02937205v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9019657</ieee_id><sourcerecordid>2386054355</sourcerecordid><originalsourceid>FETCH-LOGICAL-c370t-90778b94f63887c0e69b9984da912622db0817fb237f551531c2ce7640805303</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhoMoWKs_QLwsePKQOrub_TrWYG2hItLcl02ysSlptu5Gbf-9KSk9zTA87wvzRNE9hgnGoJ6zxWw1IUBgQpQQjNKLaIQZ4zEHgi_PO6bX0U0IG4AkwVyOos8pSv1h15nWNIdQB-QqlP05lJq2sI3JG4teare1na8LtCrWdmsDyk2wJXItWrSl3ceuit_NHs1NWNft1210VZkm2LvTHEfZ7DVL5_Hy422RTpdxQQV0sQIhZK6SilMpRQGWq1wpmZRGYcIJKXOQWFQ5oaJiDDOKC1JYwROQwCjQcfQ01K5No3e-3hp_0M7Uej5d6uMNiKKCAPvFPfs4sDvvvn9s6PTG_fj-46AJlRxYQhnrKTxQhXcheFudazHoo2R9lKyPkvVJcp95GDK1tfbMK8CKM0H_AW3qdJQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2386054355</pqid></control><display><type>article</type><title>A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing</title><source>IEEE Electronic Library (IEL)</source><creator>Ghammamy, Loubna ; Karabinaz, Koray ; Lacharme, Patrick ; Thiry-Atighehchi, Kevin</creator><creatorcontrib>Ghammamy, Loubna ; Karabinaz, Koray ; Lacharme, Patrick ; Thiry-Atighehchi, Kevin</creatorcontrib><description>Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2020.2977533</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Artificial Intelligence ; Authentication ; Authentication attack ; Automatic Control Engineering ; Bioinformatics ; Biomedical imaging ; Biometrics ; Cancelable biometrics ; Computation and Language ; Computer Science ; Computer Vision and Pattern Recognition ; Cryptography ; Cryptography and Security ; Document and Text Processing ; Feature extraction ; Human-Computer Interaction ; Image Processing ; Index-of-Max hashing ; Linkability attack ; Locality sensitive hashing ; Password ; Permutations ; Reversibility attack</subject><ispartof>IEEE transactions on information forensics and security, 2020-01, Vol.15, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c370t-90778b94f63887c0e69b9984da912622db0817fb237f551531c2ce7640805303</citedby><cites>FETCH-LOGICAL-c370t-90778b94f63887c0e69b9984da912622db0817fb237f551531c2ce7640805303</cites><orcidid>0000-0003-0042-8771 ; 0000-0001-9538-8877 ; 0000-0003-3438-1860</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9019657$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,776,780,792,881,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9019657$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://hal.science/hal-02937205$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Ghammamy, Loubna</creatorcontrib><creatorcontrib>Karabinaz, Koray</creatorcontrib><creatorcontrib>Lacharme, Patrick</creatorcontrib><creatorcontrib>Thiry-Atighehchi, Kevin</creatorcontrib><title>A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes.</description><subject>Artificial Intelligence</subject><subject>Authentication</subject><subject>Authentication attack</subject><subject>Automatic Control Engineering</subject><subject>Bioinformatics</subject><subject>Biomedical imaging</subject><subject>Biometrics</subject><subject>Cancelable biometrics</subject><subject>Computation and Language</subject><subject>Computer Science</subject><subject>Computer Vision and Pattern Recognition</subject><subject>Cryptography</subject><subject>Cryptography and Security</subject><subject>Document and Text Processing</subject><subject>Feature extraction</subject><subject>Human-Computer Interaction</subject><subject>Image Processing</subject><subject>Index-of-Max hashing</subject><subject>Linkability attack</subject><subject>Locality sensitive hashing</subject><subject>Password</subject><subject>Permutations</subject><subject>Reversibility attack</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1Lw0AQhoMoWKs_QLwsePKQOrub_TrWYG2hItLcl02ysSlptu5Gbf-9KSk9zTA87wvzRNE9hgnGoJ6zxWw1IUBgQpQQjNKLaIQZ4zEHgi_PO6bX0U0IG4AkwVyOos8pSv1h15nWNIdQB-QqlP05lJq2sI3JG4teare1na8LtCrWdmsDyk2wJXItWrSl3ceuit_NHs1NWNft1210VZkm2LvTHEfZ7DVL5_Hy422RTpdxQQV0sQIhZK6SilMpRQGWq1wpmZRGYcIJKXOQWFQ5oaJiDDOKC1JYwROQwCjQcfQ01K5No3e-3hp_0M7Uej5d6uMNiKKCAPvFPfs4sDvvvn9s6PTG_fj-46AJlRxYQhnrKTxQhXcheFudazHoo2R9lKyPkvVJcp95GDK1tfbMK8CKM0H_AW3qdJQ</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Ghammamy, Loubna</creator><creator>Karabinaz, Koray</creator><creator>Lacharme, Patrick</creator><creator>Thiry-Atighehchi, Kevin</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0003-0042-8771</orcidid><orcidid>https://orcid.org/0000-0001-9538-8877</orcidid><orcidid>https://orcid.org/0000-0003-3438-1860</orcidid></search><sort><creationdate>20200101</creationdate><title>A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing</title><author>Ghammamy, Loubna ; Karabinaz, Koray ; Lacharme, Patrick ; Thiry-Atighehchi, Kevin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c370t-90778b94f63887c0e69b9984da912622db0817fb237f551531c2ce7640805303</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Artificial Intelligence</topic><topic>Authentication</topic><topic>Authentication attack</topic><topic>Automatic Control Engineering</topic><topic>Bioinformatics</topic><topic>Biomedical imaging</topic><topic>Biometrics</topic><topic>Cancelable biometrics</topic><topic>Computation and Language</topic><topic>Computer Science</topic><topic>Computer Vision and Pattern Recognition</topic><topic>Cryptography</topic><topic>Cryptography and Security</topic><topic>Document and Text Processing</topic><topic>Feature extraction</topic><topic>Human-Computer Interaction</topic><topic>Image Processing</topic><topic>Index-of-Max hashing</topic><topic>Linkability attack</topic><topic>Locality sensitive hashing</topic><topic>Password</topic><topic>Permutations</topic><topic>Reversibility attack</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ghammamy, Loubna</creatorcontrib><creatorcontrib>Karabinaz, Koray</creatorcontrib><creatorcontrib>Lacharme, Patrick</creatorcontrib><creatorcontrib>Thiry-Atighehchi, Kevin</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ghammamy, Loubna</au><au>Karabinaz, Koray</au><au>Lacharme, Patrick</au><au>Thiry-Atighehchi, Kevin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2020-01-01</date><risdate>2020</risdate><volume>15</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2020.2977533</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0003-0042-8771</orcidid><orcidid>https://orcid.org/0000-0001-9538-8877</orcidid><orcidid>https://orcid.org/0000-0003-3438-1860</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2020-01, Vol.15, p.1-1 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_02937205v1 |
source | IEEE Electronic Library (IEL) |
subjects | Artificial Intelligence Authentication Authentication attack Automatic Control Engineering Bioinformatics Biomedical imaging Biometrics Cancelable biometrics Computation and Language Computer Science Computer Vision and Pattern Recognition Cryptography Cryptography and Security Document and Text Processing Feature extraction Human-Computer Interaction Image Processing Index-of-Max hashing Linkability attack Locality sensitive hashing Password Permutations Reversibility attack |
title | A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T04%3A02%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Cryptanalysis%20of%20Two%20Cancelable%20Biometric%20Schemes%20based%20on%20Index-of-Max%20Hashing&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Ghammamy,%20Loubna&rft.date=2020-01-01&rft.volume=15&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2020.2977533&rft_dat=%3Cproquest_RIE%3E2386054355%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2386054355&rft_id=info:pmid/&rft_ieee_id=9019657&rfr_iscdi=true |