Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems †

Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric reference template and for the matching with a probe template (on-card-comparison). In order to assess the performance and robustness against attacks of these systems, it is necessary to better understand which information could help an attacker successfully impersonate a legitimate user. The first part of the paper details a new attack based on the use of a priori information (such as the fingerprint classification, sensor type, image resolution or number of minutiae in the biometric reference) that could be exploited by an attacker. In the second part, a new countermeasure against brute force and zero effort attacks based on fingerprint classification given a minutiae template is proposed. These two contributions show how fingerprint classification could have an impact for attacks and countermeasures in embedded biometric systems. Experiments show interesting results on significant fingerprint datasets.

[1]  Jun Li,et al.  Combining singular points and orientation image information for fingerprint classification , 2008, Pattern Recognit..

[2]  Anil K. Jain,et al.  A Multichannel Approach to Fingerprint Classification , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[3]  Raffaele Cappelli,et al.  SFinGe : an Approach to Synthetic Fingerprint Generation , 2004 .

[4]  Baptiste Hemery,et al.  Computation EvaBio: A Tool for Performance Evaluation in Biometrics , 2011 .

[5]  Christophe Rosenberger,et al.  EvaBio platform for the evaluation biometric system: Application to the optimization of the enrollment process for fingerprints devices , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).

[6]  Arun Ross,et al.  50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..

[7]  Kenneth Ko,et al.  User's Guide to NIST Biometric Image Software (NBIS) , 2007 .

[8]  Massimo Tistarelli,et al.  MCC: A baseline algorithm for fingerprint verification in FVC-onGoing , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.

[9]  Yilong Yin,et al.  A Fingerprint Matching Algorithm Based On Delaunay Triangulation Net , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[10]  Christophe Rosenberger,et al.  Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[11]  Congying Han,et al.  A novel fingerprint classification method based on deep learning , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).

[12]  K JainAnil,et al.  50 years of biometric research , 2016 .

[13]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[14]  Francisco Herrera,et al.  A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation , 2019, IEEE Access.

[15]  Christophe Rosenberger,et al.  Fingerprint Class Recognition for Securing EMV Transaction , 2017, ICISSP.

[16]  Benoît Vibert,et al.  Contributions à l'évaluation de systèmes biométriques embarqués. (Contributions to the evaluation of embedded biometric systems) , 2017 .

[17]  A. Ganson Fingerprint Classification , 1970, Nature.

[18]  Mineichi Kudo,et al.  Comparison of algorithms that select features for pattern classifiers , 2000, Pattern Recognit..

[19]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[20]  Chih-Jen Lin,et al.  A comparison of methods for multiclass support vector machines , 2002, IEEE Trans. Neural Networks.

[21]  Jasmine Banks,et al.  Minutiae Triangle Graphs: A New Fingerprint Representation with Invariance Properties , 2019, 2019 International Conference on Image and Vision Computing New Zealand (IVCNZ).

[22]  Anil K. Jain,et al.  Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.

[23]  Arun Ross,et al.  Toward reconstructing fingerprints from minutiae points , 2005, SPIE Defense + Commercial Sensing.

[24]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[25]  Andy Adler,et al.  Biometric System Security , 2008 .

[26]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[27]  Yiguang Liu,et al.  A 3D Surface Reconstruction Method Based on Delaunay Triangulation , 2019, ICIG.

[28]  Christophe Charrier,et al.  A Machine Learning Regression scheme to design a FR-Image Quality Assessment Algorithm , 2012, CGIV.

[29]  Christophe Rosenberger,et al.  In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors? , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).

[30]  Franz Aurenhammer,et al.  Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.

[31]  Anil K. Jain,et al.  FVC2004: Third Fingerprint Verification Competition , 2004, ICBA.

[32]  Edward Richard Henry,et al.  Classification and uses of finger prints , 1928 .

[33]  Jie Tian,et al.  Fingerprint classification by a hierarchical classifier , 2013, Pattern Recognit..

[34]  Loris Nanni,et al.  Combining Multiple Matchers for Fingerprint Verification: A Case Study in FVC2004 , 2005, ICIAP.

[35]  Robert L. Scot Drysdale,et al.  A comparison of sequential Delaunay triangulation algorithms , 1995, SCG '95.

[36]  Jean-Philippe Pons,et al.  Efficient Multi-View Reconstruction of Large-Scale Scenes using Interest Points, Delaunay Triangulation and Graph Cuts , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[37]  Jonathan Richard Shewchuk,et al.  Delaunay refinement algorithms for triangular mesh generation , 2002, Comput. Geom..

[38]  Meenakshisundaram Gopi,et al.  Surface Reconstruction based on Lower Dimensional Localized Delaunay Triangulation , 2000, Comput. Graph. Forum.

[39]  Kai Huang,et al.  Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges , 2001, VIP.