Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and
Devices
- URL: http://arxiv.org/abs/2001.08211v1
- Date: Tue, 21 Jan 2020 22:26:12 GMT
- Title: Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and
Devices
- Authors: Chris Xiaoxuan Lu, Yang Li, Yuanbo Xiangli and Zhengxiong Li
- Abstract summary: We study the feasibility of the compound identity leakage across cyber-physical spaces.
Co-located smart device IDs (e.g., smartphone MAC addresses) and physical biometrics (e.g., facial/vocal samples) are side channels to each other.
Two real-world experiments on different biometrics and device IDs show that the presented approach can compromise more than 70% of device IDs.
- Score: 10.583851548297728
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Along with the benefits of Internet of Things (IoT) come potential privacy
risks, since billions of the connected devices are granted permission to track
information about their users and communicate it to other parties over the
Internet. Of particular interest to the adversary is the user identity which
constantly plays an important role in launching attacks. While the exposure of
a certain type of physical biometrics or device identity is extensively
studied, the compound effect of leakage from both sides remains unknown in
multi-modal sensing environments. In this work, we explore the feasibility of
the compound identity leakage across cyber-physical spaces and unveil that
co-located smart device IDs (e.g., smartphone MAC addresses) and physical
biometrics (e.g., facial/vocal samples) are side channels to each other. It is
demonstrated that our method is robust to various observation noise in the wild
and an attacker can comprehensively profile victims in multi-dimension with
nearly zero analysis effort. Two real-world experiments on different biometrics
and device IDs show that the presented approach can compromise more than 70\%
of device IDs and harvests multiple biometric clusters with ~94% purity at the
same time.
Related papers
- Multi-Channel Time-Series Person and Soft-Biometric Identification [65.83256210066787]
This work investigates person and soft-biometrics identification from recordings of humans performing different activities using deep architectures.
We evaluate the method on four datasets of multi-channel time-series human activity recognition (HAR)
Soft-biometric based attribute representation shows promising results and emphasis the necessity of larger datasets.
arXiv Detail & Related papers (2023-04-04T07:24:51Z) - Multimodal Adaptive Fusion of Face and Gait Features using Keyless
attention based Deep Neural Networks for Human Identification [67.64124512185087]
Soft biometrics such as gait are widely used with face in surveillance tasks like person recognition and re-identification.
We propose a novel adaptive multi-biometric fusion strategy for the dynamic incorporation of gait and face biometric cues by leveraging keyless attention deep neural networks.
arXiv Detail & Related papers (2023-03-24T05:28:35Z) - Efficient aggregation of face embeddings for decentralized face
recognition deployments (extended version) [0.7349727826230862]
Biometrics are one of the most privacy-sensitive data. Ubiquitous authentication systems with a focus on privacy favor decentralized approaches.
This paper proposes an efficient way to aggregate embeddings used for face recognition based on an extensive analysis on different datasets.
arXiv Detail & Related papers (2022-12-20T09:28:25Z) - Mobile Behavioral Biometrics for Passive Authentication [65.94403066225384]
This work carries out a comparative analysis of unimodal and multimodal behavioral biometric traits.
Experiments are performed over HuMIdb, one of the largest and most comprehensive freely available mobile user interaction databases.
In our experiments, the most discriminative background sensor is the magnetometer, whereas among touch tasks the best results are achieved with keystroke.
arXiv Detail & Related papers (2022-03-14T17:05:59Z) - Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal
Biometric Fusion Algorithms [58.156733807470395]
This paper reports a benchmarking study carried out within the framework of the BioSecure DS2 (Access Control) evaluation campaign.
The campaign targeted the application of physical access control in a medium-size establishment with some 500 persons.
To the best of our knowledge, this is the first attempt to benchmark quality-based multimodal fusion algorithms.
arXiv Detail & Related papers (2021-11-17T13:39:48Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - When Physical Unclonable Function Meets Biometrics [0.5156484100374058]
Electrocardiogram (ECG) based biometric has become popular as it can authenticate patients and monitor the patient's vital signs.
volatile memory-based (NVM) PUF can be easily placed in the device to avoid counterfeit.
Our aim is to provide a comprehensive study on the state-of-the-art developments papers based on biometrics enabled hardware security.
arXiv Detail & Related papers (2020-12-14T20:00:40Z) - Vision-based techniques for gait recognition [6.817301687702869]
We discuss current techniques of gait recognition and modelling with the environment in which the research was conducted.
We provide motivations for a novel paradigm in biometrics-based human recognition, i.e. the use of the fronto-normal view of gait as a far-range biometrics combined with biometrics operating at a near distance.
arXiv Detail & Related papers (2020-04-30T06:33:01Z) - Analyze and Development System with Multiple Biometric Identification [0.0]
Methods developed earlier to ensure personal the information from the thefts was not effective and safe.
Biometrics were introduced when it was needed technology for more efficient security of personal information.
In biometric authentication system, user may not remember any passwords or carry any keys.
arXiv Detail & Related papers (2020-04-10T05:08:54Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.