id ftccsdartic:oai:HAL:hal-01015274v1
record_format openpolar
spelling ftccsdartic:oai:HAL:hal-01015274v1 2023-05-15T16:49:56+02:00 Preimage Attack on BioHashing Lacharme, Patrick Cherrier, Estelle Rosenberger, Christophe Equipe SAFE - Laboratoire GREYC - UMR6072 Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC) Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN) Normandie Université (NU)-Normandie Université (NU)-Université de Caen Normandie (UNICAEN) Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN) Normandie Université (NU) -, Iceland 2013 https://hal.archives-ouvertes.fr/hal-01015274 https://hal.archives-ouvertes.fr/hal-01015274/document https://hal.archives-ouvertes.fr/hal-01015274/file/secrypt_2013.pdf en eng HAL CCSD hal-01015274 https://hal.archives-ouvertes.fr/hal-01015274 https://hal.archives-ouvertes.fr/hal-01015274/document https://hal.archives-ouvertes.fr/hal-01015274/file/secrypt_2013.pdf info:eu-repo/semantics/OpenAccess International Conference on Security and Cryptography (SECRYPT) https://hal.archives-ouvertes.fr/hal-01015274 International Conference on Security and Cryptography (SECRYPT), 2013, -, Iceland. 8 p [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] info:eu-repo/semantics/conferenceObject Conference papers 2013 ftccsdartic 2021-10-24T13:16:27Z International audience Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow revocability nor diversity, without an adapted post-processing. Cancelable biometrics, including the very popular algorithm BioHashing, is used to cope with the underlying privacy and security issues. The principle is to transform a biometric template in a BioCode, in order to enhance user privacy and application security. These schemes are used for template protection of several biometric modalities, as fingerprints or face and the robustness is generally related to the hardness to recover the original biometric template by an impostor. In this paper, we propose to use genetic algorithms to approximate the original biometric feature and spoof the authentication system. We show through experimental results on fingerprints the efficiency of the proposed attack on the BioHashing algorithm, by approximating the original FingerCode, given the seed and the corresponding BioCode. Conference Object Iceland Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
institution Open Polar
collection Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
op_collection_id ftccsdartic
language English
topic [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
spellingShingle [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Lacharme, Patrick
Cherrier, Estelle
Rosenberger, Christophe
Preimage Attack on BioHashing
topic_facet [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
description International audience Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow revocability nor diversity, without an adapted post-processing. Cancelable biometrics, including the very popular algorithm BioHashing, is used to cope with the underlying privacy and security issues. The principle is to transform a biometric template in a BioCode, in order to enhance user privacy and application security. These schemes are used for template protection of several biometric modalities, as fingerprints or face and the robustness is generally related to the hardness to recover the original biometric template by an impostor. In this paper, we propose to use genetic algorithms to approximate the original biometric feature and spoof the authentication system. We show through experimental results on fingerprints the efficiency of the proposed attack on the BioHashing algorithm, by approximating the original FingerCode, given the seed and the corresponding BioCode.
author2 Equipe SAFE - Laboratoire GREYC - UMR6072
Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC)
Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)
Normandie Université (NU)-Normandie Université (NU)-Université de Caen Normandie (UNICAEN)
Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)
Normandie Université (NU)
format Conference Object
author Lacharme, Patrick
Cherrier, Estelle
Rosenberger, Christophe
author_facet Lacharme, Patrick
Cherrier, Estelle
Rosenberger, Christophe
author_sort Lacharme, Patrick
title Preimage Attack on BioHashing
title_short Preimage Attack on BioHashing
title_full Preimage Attack on BioHashing
title_fullStr Preimage Attack on BioHashing
title_full_unstemmed Preimage Attack on BioHashing
title_sort preimage attack on biohashing
publisher HAL CCSD
publishDate 2013
url https://hal.archives-ouvertes.fr/hal-01015274
https://hal.archives-ouvertes.fr/hal-01015274/document
https://hal.archives-ouvertes.fr/hal-01015274/file/secrypt_2013.pdf
op_coverage -, Iceland
genre Iceland
genre_facet Iceland
op_source International Conference on Security and Cryptography (SECRYPT)
https://hal.archives-ouvertes.fr/hal-01015274
International Conference on Security and Cryptography (SECRYPT), 2013, -, Iceland. 8 p
op_relation hal-01015274
https://hal.archives-ouvertes.fr/hal-01015274
https://hal.archives-ouvertes.fr/hal-01015274/document
https://hal.archives-ouvertes.fr/hal-01015274/file/secrypt_2013.pdf
op_rights info:eu-repo/semantics/OpenAccess
_version_ 1766040101681364992