A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing

Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2020-01, Vol.15, p.1-1
Hauptverfasser: Ghammamy, Loubna, Karabinaz, Koray, Lacharme, Patrick, Thiry-Atighehchi, Kevin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE transactions on information forensics and security
container_volume 15
creator Ghammamy, Loubna
Karabinaz, Koray
Lacharme, Patrick
Thiry-Atighehchi, Kevin
description Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes.
doi_str_mv 10.1109/TIFS.2020.2977533
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_02937205v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9019657</ieee_id><sourcerecordid>2386054355</sourcerecordid><originalsourceid>FETCH-LOGICAL-c370t-90778b94f63887c0e69b9984da912622db0817fb237f551531c2ce7640805303</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhoMoWKs_QLwsePKQOrub_TrWYG2hItLcl02ysSlptu5Gbf-9KSk9zTA87wvzRNE9hgnGoJ6zxWw1IUBgQpQQjNKLaIQZ4zEHgi_PO6bX0U0IG4AkwVyOos8pSv1h15nWNIdQB-QqlP05lJq2sI3JG4teare1na8LtCrWdmsDyk2wJXItWrSl3ceuit_NHs1NWNft1210VZkm2LvTHEfZ7DVL5_Hy422RTpdxQQV0sQIhZK6SilMpRQGWq1wpmZRGYcIJKXOQWFQ5oaJiDDOKC1JYwROQwCjQcfQ01K5No3e-3hp_0M7Uej5d6uMNiKKCAPvFPfs4sDvvvn9s6PTG_fj-46AJlRxYQhnrKTxQhXcheFudazHoo2R9lKyPkvVJcp95GDK1tfbMK8CKM0H_AW3qdJQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2386054355</pqid></control><display><type>article</type><title>A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing</title><source>IEEE Electronic Library (IEL)</source><creator>Ghammamy, Loubna ; Karabinaz, Koray ; Lacharme, Patrick ; Thiry-Atighehchi, Kevin</creator><creatorcontrib>Ghammamy, Loubna ; Karabinaz, Koray ; Lacharme, Patrick ; Thiry-Atighehchi, Kevin</creatorcontrib><description>Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2020.2977533</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Artificial Intelligence ; Authentication ; Authentication attack ; Automatic Control Engineering ; Bioinformatics ; Biomedical imaging ; Biometrics ; Cancelable biometrics ; Computation and Language ; Computer Science ; Computer Vision and Pattern Recognition ; Cryptography ; Cryptography and Security ; Document and Text Processing ; Feature extraction ; Human-Computer Interaction ; Image Processing ; Index-of-Max hashing ; Linkability attack ; Locality sensitive hashing ; Password ; Permutations ; Reversibility attack</subject><ispartof>IEEE transactions on information forensics and security, 2020-01, Vol.15, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c370t-90778b94f63887c0e69b9984da912622db0817fb237f551531c2ce7640805303</citedby><cites>FETCH-LOGICAL-c370t-90778b94f63887c0e69b9984da912622db0817fb237f551531c2ce7640805303</cites><orcidid>0000-0003-0042-8771 ; 0000-0001-9538-8877 ; 0000-0003-3438-1860</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9019657$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,776,780,792,881,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9019657$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://hal.science/hal-02937205$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Ghammamy, Loubna</creatorcontrib><creatorcontrib>Karabinaz, Koray</creatorcontrib><creatorcontrib>Lacharme, Patrick</creatorcontrib><creatorcontrib>Thiry-Atighehchi, Kevin</creatorcontrib><title>A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes.</description><subject>Artificial Intelligence</subject><subject>Authentication</subject><subject>Authentication attack</subject><subject>Automatic Control Engineering</subject><subject>Bioinformatics</subject><subject>Biomedical imaging</subject><subject>Biometrics</subject><subject>Cancelable biometrics</subject><subject>Computation and Language</subject><subject>Computer Science</subject><subject>Computer Vision and Pattern Recognition</subject><subject>Cryptography</subject><subject>Cryptography and Security</subject><subject>Document and Text Processing</subject><subject>Feature extraction</subject><subject>Human-Computer Interaction</subject><subject>Image Processing</subject><subject>Index-of-Max hashing</subject><subject>Linkability attack</subject><subject>Locality sensitive hashing</subject><subject>Password</subject><subject>Permutations</subject><subject>Reversibility attack</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1Lw0AQhoMoWKs_QLwsePKQOrub_TrWYG2hItLcl02ysSlptu5Gbf-9KSk9zTA87wvzRNE9hgnGoJ6zxWw1IUBgQpQQjNKLaIQZ4zEHgi_PO6bX0U0IG4AkwVyOos8pSv1h15nWNIdQB-QqlP05lJq2sI3JG4teare1na8LtCrWdmsDyk2wJXItWrSl3ceuit_NHs1NWNft1210VZkm2LvTHEfZ7DVL5_Hy422RTpdxQQV0sQIhZK6SilMpRQGWq1wpmZRGYcIJKXOQWFQ5oaJiDDOKC1JYwROQwCjQcfQ01K5No3e-3hp_0M7Uej5d6uMNiKKCAPvFPfs4sDvvvn9s6PTG_fj-46AJlRxYQhnrKTxQhXcheFudazHoo2R9lKyPkvVJcp95GDK1tfbMK8CKM0H_AW3qdJQ</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Ghammamy, Loubna</creator><creator>Karabinaz, Koray</creator><creator>Lacharme, Patrick</creator><creator>Thiry-Atighehchi, Kevin</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0003-0042-8771</orcidid><orcidid>https://orcid.org/0000-0001-9538-8877</orcidid><orcidid>https://orcid.org/0000-0003-3438-1860</orcidid></search><sort><creationdate>20200101</creationdate><title>A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing</title><author>Ghammamy, Loubna ; Karabinaz, Koray ; Lacharme, Patrick ; Thiry-Atighehchi, Kevin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c370t-90778b94f63887c0e69b9984da912622db0817fb237f551531c2ce7640805303</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Artificial Intelligence</topic><topic>Authentication</topic><topic>Authentication attack</topic><topic>Automatic Control Engineering</topic><topic>Bioinformatics</topic><topic>Biomedical imaging</topic><topic>Biometrics</topic><topic>Cancelable biometrics</topic><topic>Computation and Language</topic><topic>Computer Science</topic><topic>Computer Vision and Pattern Recognition</topic><topic>Cryptography</topic><topic>Cryptography and Security</topic><topic>Document and Text Processing</topic><topic>Feature extraction</topic><topic>Human-Computer Interaction</topic><topic>Image Processing</topic><topic>Index-of-Max hashing</topic><topic>Linkability attack</topic><topic>Locality sensitive hashing</topic><topic>Password</topic><topic>Permutations</topic><topic>Reversibility attack</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ghammamy, Loubna</creatorcontrib><creatorcontrib>Karabinaz, Koray</creatorcontrib><creatorcontrib>Lacharme, Patrick</creatorcontrib><creatorcontrib>Thiry-Atighehchi, Kevin</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ghammamy, Loubna</au><au>Karabinaz, Koray</au><au>Lacharme, Patrick</au><au>Thiry-Atighehchi, Kevin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2020-01-01</date><risdate>2020</risdate><volume>15</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Cancelable biometric schemes generate secure biometric templates by combining user specific tokens and biometric data. The main objective is to create irreversible, unlinkable, and revocable templates, with high accuracy of comparison. In this paper, we cryptanalyze two recent cancelable biometric schemes based on a particular locality sensitive hashing function, index-of-max (IoM): Gaussian Random Projection-IoM (GRP-IoM) and Uniformly Random Permutation-IoM (URP-IoM). As originally proposed, these schemes were claimed to be resistant against reversibility, authentication, and linkability attacks under the stolen token scenario. We propose several attacks against GRP-IoM and URP-IoM, and argue that both schemes are severely vulnerable against authentication and linkability attacks. We also propose better, but not yet practical, reversibility attacks against GRP-IoM. The correctness and practical impact of our attacks are verified over the same dataset provided by the authors of these two schemes.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2020.2977533</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0003-0042-8771</orcidid><orcidid>https://orcid.org/0000-0001-9538-8877</orcidid><orcidid>https://orcid.org/0000-0003-3438-1860</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2020-01, Vol.15, p.1-1
issn 1556-6013
1556-6021
language eng
recordid cdi_hal_primary_oai_HAL_hal_02937205v1
source IEEE Electronic Library (IEL)
subjects Artificial Intelligence
Authentication
Authentication attack
Automatic Control Engineering
Bioinformatics
Biomedical imaging
Biometrics
Cancelable biometrics
Computation and Language
Computer Science
Computer Vision and Pattern Recognition
Cryptography
Cryptography and Security
Document and Text Processing
Feature extraction
Human-Computer Interaction
Image Processing
Index-of-Max hashing
Linkability attack
Locality sensitive hashing
Password
Permutations
Reversibility attack
title A Cryptanalysis of Two Cancelable Biometric Schemes based on Index-of-Max Hashing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T04%3A02%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Cryptanalysis%20of%20Two%20Cancelable%20Biometric%20Schemes%20based%20on%20Index-of-Max%20Hashing&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Ghammamy,%20Loubna&rft.date=2020-01-01&rft.volume=15&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2020.2977533&rft_dat=%3Cproquest_RIE%3E2386054355%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2386054355&rft_id=info:pmid/&rft_ieee_id=9019657&rfr_iscdi=true