Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack

Hanrui Wang, Xingbo Dong, Zhe Jin, Andrew Beng Jin Teoh, Massimo Tistarelli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In cancellable biometrics (CB) schemes, template security is achieved by applying, mainly non-linear, transformations to the biometric template. The transformation is designed to preserve the template distance/similarity in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB are underestimated. Dong et al. [BTAS'19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that are generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong's genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We interpret the effectiveness of CSA from the supervised learning perspective. We identify such constraints then conduct extensive experiments to demonstrate CSA against CB with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing and BioHashing security, and outperforms GASA significantly. Inferring from the above results, we further remark that, other than IoM and BioHashing, CSA is critical to other CB schemes as far as the constraints can be formulated. Furthermore, we reveal the correlation of hash code size and the attack performance of CSA.

Original languageEnglish
Title of host publicationProceedings - 2021 IEEE Winter Conference on Applications of Computer Vision Workshops, WACVW 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages70-77
Number of pages8
ISBN (Electronic)9781665419673
DOIs
Publication statusPublished - 2021 Jan
Event2021 IEEE Winter Conference on Applications of Computer Vision Workshops, WACVW 2021 - Virtual, Waikola, United States
Duration: 2021 Jan 52021 Jan 9

Publication series

NameProceedings - 2021 IEEE Winter Conference on Applications of Computer Vision Workshops, WACVW 2021

Conference

Conference2021 IEEE Winter Conference on Applications of Computer Vision Workshops, WACVW 2021
Country/TerritoryUnited States
CityVirtual, Waikola
Period21/1/521/1/9

Bibliographical note

Funding Information:
This work has been partially supported by the European Union COST Action CA16101, University of Sassari fondo di Ateneo per la ricerca 2020, Italian Ministry for Research special research project SPADA, Fundamental Research Grant Scheme (FRGS/1/2018/ICT02/MUSM/03/3) and NVIDIA Corporation donation of the Titan Xp GPU.

Publisher Copyright:
© 2021 IEEE.

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Media Technology

Fingerprint

Dive into the research topics of 'Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack'. Together they form a unique fingerprint.

Cite this