Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes
نویسندگان
چکیده
Visual cryptography is an increasingly popular cryptographic technique which allows for secret sharing and encryption of sensitive data. This method has been extended and applied to secure biometric data in various protocols. In this paper, we propose a general framework to help assess the security of these extended biometric visual cryptographic schemes (e-BVC). First, we formalize the notion of “perfect resistance against false authentication” under our framework and show that our formalization captures the traditional false acceptance attack under plausible assumptions. Second, we modify the traditional false acceptance attack and propose a new and generic strategy for attacking e-BVC schemes. As an application, we present a case analysis for a recent implementation of a face recognition protocol and verify the practical impact of our proposed framework and attack in detail.
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA Framework for Biometric Visual Cryptography
Visual cryptography is an increasingly popular cryptographic technique which allows for secret sharing and encryption of sensitive data. This method has been extended and applied to secure biometric data in various protocols. Recently, Karabina and Robinson proposed a general framework to help assess the security of these extended biometric visual cryptographic schemes (e-BVC), and formalized t...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملFeature Level Fusion of Iris and Fingerprint Biometrics for personal identification using Artificial Neural Network
This research presents the multi –modal biometric system for iris and fingerprint This paper presents the Feature level fusion using wavelet for combining two unimodal biometric system. Gabor transform is used for feature extraction and wavelet transformation for fusion of iris and fingerprint. The system applied artificial neural network technique for recognizing whether the user is genuine (a...
متن کاملAttacks and Countermeasures in Fingerprint Based Biometric Cryptosystems
We investigate implementations of biometric cryptosystems protecting fingerprint templates (which are mostly based on the fuzzy vault scheme by Juels and Sudan in 2002) with respect to the security they provide. We show that attacks taking advantage of the system’s false acceptance rate, i.e. false-accept attacks, pose a very serious risk — even if brute-force attacks are impractical to perform...
متن کامل