DOI QR코드

DOI QR Code

Dictionary Attack on Functional Transform-Based Cancelable Fingerprint Templates

  • Shin, Sang-Wook (School of Computer and Information Engineering, Inha University) ;
  • Lee, Mun-Kyu (School of Computer and Information Engineering, Inha University) ;
  • Moon, Dae-Sung (S/W & Content Research Laboratory, ETRI) ;
  • Moon, Ki-Young (S/W & Content Research Laboratory, ETRI)
  • Received : 2009.04.01
  • Accepted : 2009.08.04
  • Published : 2009.10.31

Abstract

Recently, Ratha and others proposed a cancelable biometrics scheme which transforms an original fingerprint template into a new one using a noninvertible transformation. However, we show that the original template is recovered by a dictionary attack if two transformed templates originating from it are revealed. In our attack, we simulate the transformation and construct a set of possible pre-images for each transformed template. Then, we find the correct pre-image by computing the intersection of these sets. We present an algorithm implementing this idea as well as successful experimental results.

Keywords

References

  1. S.W. Shin et al., “Analysis on Functional Transform-Based Cancelable Fingerprints,” Proc. Conf. Information Security and Cryptology, Dec. 2008, pp. 219-222 (in Korean).
  2. N.K. Ratha, J.H. Connell, and R.M. Bolle, “Enhancing Security and Privacy in Biometrics-Based Authentication System,” IBM Syst. J., vol. 40, no. 3, 2001, pp. 614-634.
  3. N.K. Ratha et al., “Generating Cancelable Fingerprint Templates,” IEEE Trans. Pattern Anal. Mach. Intell. vol. 29, no. 4, Apr. 2007, pp. 561-572. https://doi.org/10.1109/TPAMI.2007.1004
  4. C. Lee et al., “Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information,” IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 4, Aug. 2007, pp. 980-992. https://doi.org/10.1109/TSMCB.2007.896999
  5. FVC 2002 Databases, http://bias.csr.unibo.it/fvc2002/download.asp.

Cited by

  1. A Revocable Fingerprint Template for Security and Privacy Preserving vol.4, pp.6, 2009, https://doi.org/10.3837/tiis.2010.12.020
  2. A Practical Implementation of Fuzzy Fingerprint Vault vol.5, pp.10, 2009, https://doi.org/10.3837/tiis.2011.10.006
  3. A survey on biometric cryptosystems and cancelable biometrics vol.2011, pp.None, 2009, https://doi.org/10.1186/1687-417x-2011-3
  4. Recommender System to Research Students’ Study Efficiency vol.51, pp.None, 2009, https://doi.org/10.1016/j.sbspro.2012.08.273
  5. MINIMUM SPANNING TREE (MST) BASED TECHNIQUES FOR GENERATION OF CANCELABLE FINGERPRINT TEMPLATES vol.28, pp.6, 2009, https://doi.org/10.1142/s0218001414560138
  6. Cancelable Biometrics: A review vol.32, pp.5, 2009, https://doi.org/10.1109/msp.2015.2434151
  7. Biometric template protection using cancelable biometrics and visual cryptography techniques vol.75, pp.23, 2016, https://doi.org/10.1007/s11042-015-2933-6
  8. A Survey on Biometrics and Cancelable Biometrics Systems vol.18, pp.1, 2009, https://doi.org/10.1142/s0219467818500067
  9. A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution vol.80, pp.7, 2021, https://doi.org/10.1007/s11042-020-10095-1
  10. Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification vol.21, pp.8, 2021, https://doi.org/10.3390/s21082859