Untargeted Near-collision Attacks on Biometrics: Real-world Bounds and
Theoretical Limits
- URL: http://arxiv.org/abs/2304.01580v5
- Date: Wed, 21 Feb 2024 10:18:57 GMT
- Title: Untargeted Near-collision Attacks on Biometrics: Real-world Bounds and
Theoretical Limits
- Authors: Axel Durbet and Paul-Marie Grollemund and Kevin Thiry-Atighehchi
- Abstract summary: We focus on untargeted attacks that can be carried out both online and offline, and in both identification and verification modes.
We use the False Match Rate (FMR) and the False Positive Identification Rate (FPIR) to address the security of these systems.
The study of this metric space, and system parameters, gives us the complexity of untargeted attacks and the probability of a near-collision.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: A biometric recognition system can operate in two distinct modes:
identification or verification. In the first mode, the system recognizes an
individual by searching the enrolled templates of all the users for a match. In
the second mode, the system validates a user's identity claim by comparing the
fresh provided template with the enrolled template. The biometric
transformation schemes usually produce binary templates that are better handled
by cryptographic schemes, and the comparison is based on a distance that leaks
information about the similarities between two biometric templates. Both the
experimentally determined false match rate and false non-match rate through
recognition threshold adjustment define the recognition accuracy, and hence the
security of the system. To our knowledge, few works provide a formal treatment
of security in case of minimal information leakage, i.e., the binary outcome of
a comparison with a threshold. In this paper, we focus on untargeted attacks
that can be carried out both online and offline, and in both identification and
verification modes. On the first hand, we focus our analysis on the accuracy
metrics of biometric systems. We provide the complexity of untargeted attacks
using the False Match Rate (FMR) and the False Positive Identification Rate
(FPIR) to address the security of these systems. Studying near-collisions with
these metrics allows us to estimate the maximum number of users in a database,
given a chosen FMR, to preserve the security and the accuracy. These results
are evaluated on systems from the literature. On the other hand, we rely on
probabilistic modelling to assess the theoretical security limits of biometric
systems. The study of this metric space, and system parameters (template size,
threshold and database size), gives us the complexity of untargeted attacks and
the probability of a near-collision.
Related papers
- Supervised and Unsupervised Alignments for Spoofing Behavioral Biometrics [7.021534792043867]
Biometric recognition systems are based on intrinsic properties of their users, usually encoded in high dimension representations called embeddings.
We perform spoofing attacks on two behavioral biometric systems using a set of alignment techniques.
arXiv Detail & Related papers (2024-08-14T20:46:59Z) - Token-Level Adversarial Prompt Detection Based on Perplexity Measures
and Contextual Information [67.78183175605761]
Large Language Models are susceptible to adversarial prompt attacks.
This vulnerability underscores a significant concern regarding the robustness and reliability of LLMs.
We introduce a novel approach to detecting adversarial prompts at a token level.
arXiv Detail & Related papers (2023-11-20T03:17:21Z) - t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric
Comparators [27.452032643800223]
Presentation attack (spoofing) detection (PAD) typically operates alongside biometric verification to improve reliablity in the face of spoofing attacks.
We introduce a new metric for the joint evaluation of PAD solutions operating in situ with biometric verification.
arXiv Detail & Related papers (2023-09-21T16:30:40Z) - Exploit the Leak: Understanding Risks in Biometric Matchers [0.0]
In a biometric authentication or identification system, the matcher compares a stored and a fresh template to determine whether there is a match.
For better compliance with privacy legislation, the matcher can be built upon a privacy-preserving distance.
This paper provides an analysis of information leakage during distance evaluation.
arXiv Detail & Related papers (2023-07-25T17:29:32Z) - Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal
Biometric Fusion Algorithms [58.156733807470395]
This paper reports a benchmarking study carried out within the framework of the BioSecure DS2 (Access Control) evaluation campaign.
The campaign targeted the application of physical access control in a medium-size establishment with some 500 persons.
To the best of our knowledge, this is the first attempt to benchmark quality-based multimodal fusion algorithms.
arXiv Detail & Related papers (2021-11-17T13:39:48Z) - Asymmetric Modality Translation For Face Presentation Attack Detection [55.09300842243827]
Face presentation attack detection (PAD) is an essential measure to protect face recognition systems from being spoofed by malicious users.
We propose a novel framework based on asymmetric modality translation forPAD in bi-modality scenarios.
Our method achieves state-of-the-art performance under different evaluation protocols.
arXiv Detail & Related papers (2021-10-18T08:59:09Z) - Feature Fusion Methods for Indexing and Retrieval of Biometric Data:
Application to Face Recognition with Privacy Protection [15.834050000008878]
The proposed method reduces the computational workload associated with a biometric identification transaction by 90%.
The method guarantees unlinkability, irreversibility, and renewability of the protected biometric data.
arXiv Detail & Related papers (2021-07-27T08:53:29Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - SMT-based Safety Verification of Parameterised Multi-Agent Systems [78.04236259129524]
We study the verification of parameterised multi-agent systems (MASs)
In particular, we study whether unwanted states, characterised as a given state formula, are reachable in a given MAS.
arXiv Detail & Related papers (2020-08-11T15:24:05Z) - On the Resilience of Biometric Authentication Systems against Random
Inputs [6.249167635929514]
We assess the security of machine learning based biometric authentication systems against an attacker who submits uniform random inputs.
In particular, for one reconstructed biometric system with an average FPR of 0.03, the success rate was as high as 0.78.
arXiv Detail & Related papers (2020-01-13T04:20:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.