Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack

Cancellable biometrics (CB) intentionally distorts biometric template for security protection, and simultaneously preserving the distance/similarity for matching in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB is underestimated. Dong et al. [BTAS'19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong's genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We justify the effectiveness of CSA from the supervised learning perspective. We conduct extensive experiments to demonstrate CSA against Index-of-Max (IoM) hashing with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing security, and outperforms GASA remarkably. Furthermore, we reveal the correlation of IoM hash code size and the attack performance of CSA.

[1]  Emre Kaplan,et al.  Known Sample Attacks on Relation Preserving Data Transformations , 2020, IEEE Transactions on Dependable and Secure Computing.

[2]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[3]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[4]  Stefanos Zafeiriou,et al.  ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[5]  Zhe Jin,et al.  Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing , 2017, IEEE Transactions on Information Forensics and Security.

[6]  Zhe Jin,et al.  A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[7]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[8]  Guoqiang Han,et al.  Deep Secure Quantization: On secure biometric hashing against similarity-based attacks , 2019, Signal Process..

[9]  Nicholas I. M. Gould,et al.  A globally convergent Lagrangian barrier algorithm for optimization with general inequality constraints and simple bounds , 1997, Math. Comput..

[10]  Kiyoung Moon,et al.  Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[11]  Patrick Lacharme,et al.  A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing , 2020, IEEE Transactions on Information Forensics and Security.

[12]  Pong C. Yuen,et al.  Masquerade attack on transform-based binary-template protection based on perceptron learning , 2014, Pattern Recognit..

[13]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[14]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[15]  Christophe Rosenberger,et al.  Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[16]  A. Lee Swindlehurst,et al.  Cancelable Biometric Recognition With ECGs: Subspace-Based Approaches , 2019, IEEE Transactions on Information Forensics and Security.

[17]  Pritee Khanna,et al.  Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features , 2019, IEEE Transactions on Information Forensics and Security.

[18]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[19]  M. Kubát An Introduction to Machine Learning , 2017, Springer International Publishing.

[20]  Jung Yeon Hwang,et al.  Open-set face identification with index-of-max hashing by learning , 2020, Pattern Recognit..

[21]  H. Adeli,et al.  Augmented Lagrangian genetic algorithm for structural optimization , 1994 .

[22]  Christoph Busch,et al.  Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).

[23]  Zhe Jin,et al.  A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[24]  Charless C. Fowlkes,et al.  Do We Need More Training Data? , 2015, International Journal of Computer Vision.

[25]  Julian Fiérrez,et al.  Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).