Completion requirements
Some consider biometrics as intrusive and as a violation of privacy. While you read, pay attention to how biometric systems authenticate and to the three main threats against biometric systems. What are these three threats and what are the cryptographic and non-cryptographic countermeasures?
3. Main Threats against Privacy-Preserving Biometric Authentication Systems
3.1. Biometric Sample Recovery Attacks
Biometric sample recovery attacks are performed in two main ways: via template spoofing (e.g., extracting the fingerprint left on a glass) or via brute-force techniques. The most common way to bypass a BAS is
by using a spoof of a biometric trait. A spoof refers to a fake or an artificial biometric template that does not correspond to a live person. These include, for instance, gummy fingers, residual fingerprint impressions of legitimate
users, photographs of legitimate users, or voice recordings of legitimate users. The only alternative to these practical techniques is to estimate a valid biometric sample using brute-force strategies.
Below, we list the possible brute-force strategies that could be adopted in recovering a valid biometric template. Luckily, all the approaches run in exponential time and thus most of the current biometric authentication systems are secure.
In the following, we assume that the adversary can see the result of the authentication process
at each trial and that the templates are binary vectors. Binary representation of biometric traits is not far from reality since this is the
case for biometric authentication based on iris templates.
Blind Brute-Force. The easiest algorithm to find a matching template from scratch is the blind brute-force. In this case, the attacker picks biometric traits at random. This corresponds to randomly selecting and trying biometric templates from the available space (i.e.,
) until one template gets accepted by the system.
Set-Covering. This attack strategy represents the optimal brute-force solution: pick a random trial template from the set of potential candidates (which at the beginning is the whole space
). If the trial
template is rejected, remove from
all the points that are within
distance from it, and pick another point at random from the updated set
. Although this method possibly eliminates from
some of the matching
points (if the trial templates are picked with a distance of
one from the other) if such an algorithm exists and was efficient, it would be exponentially fast in finding a matching template. Such an algorithm could also be used to solve
the set-covering problem, which is known to be NP-hard . An intuition of this geometrical challenge is given in Figure. The points on the plane are biometric templates, and the trial samplings are the centres of the green circles. The green circles delimit
the acceptance region around the tried point and have radius equal to the threshold
of the system. Greedy approximations to the optimal solution of the set-covering problem are reachable in an efficient way, in which case the number of trials
the adversary needs to perform is only a factor of
more than the optimal cover.
An intuitive example of what the set-covering problem is. The aim is to cover the largest possible area in the space
using 5 circles. On (a), the centres of the circles are chosen at random (the covered
area is less than
), while on (b), we provide a better covering of the space (the covered area is about
). Finding the optimal covering corresponds to solving an NP-hard problem for large dimensions of the space.
Below, we list the possible brute-force strategies that could be adopted in recovering a valid biometric template. Luckily, all the approaches run in exponential time and thus most of the current biometric authentication systems are secure.
In the following, we assume that the adversary can see the result of the authentication process
Blind Brute-Force. The easiest algorithm to find a matching template from scratch is the blind brute-force. In this case, the attacker picks biometric traits at random. This corresponds to randomly selecting and trying biometric templates from the available space (i.e.,
Set-Covering. This attack strategy represents the optimal brute-force solution: pick a random trial template from the set of potential candidates (which at the beginning is the whole space
Figure 2
An intuitive example of what the set-covering problem is. The aim is to cover the largest possible area in the space