Vulnerabilities of fuzzy vault schemes using biometric data with traces
Autor: | Maryam Lafkih, Sanaa Ghouzali, Driss Aboutajdine, Mounia Mikram, Patrick Lacharme, Mohammed El Haziti, Christophe Rosenberger |
---|---|
Přispěvatelé: | Laboratoire de Recherche Informatique et Télécommunications (LRIT), Université Mohammed V de Rabat [Agdal]-Centre National de la Recherche Scientifique et Technologique (CNRST), Equipe SAFE - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Normandie Université (NU)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU), Laboratoire de l'intégration, du matériau au système (IMS), Université Sciences et Technologies - Bordeaux 1-Institut Polytechnique de Bordeaux-Centre National de la Recherche Scientifique (CNRS), King Saud University [Riyadh] (KSU) |
Rok vydání: | 2015 |
Předmět: |
Biometrics
Computer science Data_MISCELLANEOUS Fingerprint (computing) ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION Computer security computer.software_genre Image (mathematics) [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] Brute-force attack Fingerprint Mobile phone ComputerApplications_MISCELLANEOUS Face (geometry) Cryptosystem Correlation attack computer |
Zdroj: | IWCMC International Wireless Communications & Mobile Computing Conference (IWCMC) International Wireless Communications & Mobile Computing Conference (IWCMC), Apr 2015, Dubrovnic, Croatia |
DOI: | 10.1109/iwcmc.2015.7289189 |
Popis: | Biometric cryptosystems represent emerging techniques for biometric template protection. These cryptosystems are vulnerable to different types of attacks, as brute force attacks or correlation attacks if several templates are compromised. Another biometric security issue comes from certain biometric data (as fingerprint or face image) that can leave traces, but are, in the same time, the most commonly biometric modalities used in mobile security. In this paper, a new attack based on the alteration of original user data is investigated on fuzzy Vault biometric cryptosystems. We assume that the attacker uses a modified version of the real user image to gain unauthorized access to the system (mobile phone). Experimental results carried out using fingerprint and face modalities show that this assumption has serious impact on the security of this type of biometric cryptosystems. |
Databáze: | OpenAIRE |
Externí odkaz: |