Biometrics
3. Main Threats against Privacy-Preserving Biometric Authentication Systems
3.2. A Biometric Reference Recovery Attack
The most successful strategy to perform a biometric reference recovery attack is to use a hill-climbing technique to perform a centre search attack. The attack can be launched under three conditions:(1)The adversary is in possession of a matching template (maybe spoofed) for the target biometric reference.
(2)The adversary is able to see the output of the authentication process
(3)The matching process between a fresh and a stored template relies on specific distances, called leaking distances, which include the Euclidean and the Hamming distance.
Figure 3 provides an intuition of the attack strategy. In the example (Figure 3) the stored reference template is the point
Figure 3
Example of a recovery template attack for a BAS with biometric traits represented as vectors in
This reference recovery attack is very efficient as it only requires a number of authentication attempts that are linear in the length of the biometric template. Moreover, it can be mounted against many biometric authentication systems (privacy-preserving or not) and even systems that employ secure multiparty computation techniques including somewhat homomorphic encryption.
Another strategy to perform biometric reference recovery attacks is to gain access to the database and try to decrypt the target template. This approach, however, is way less successful since normally the employed cryptographic techniques used to protect the templates' privacy are proven to be secure.