FB pixel

Biometric templates can be inverted for attacks, but also protected with hashing

New papers from Idiap researchers show how
Biometric templates can be inverted for attacks, but also protected with hashing
 

A pair of papers from the Idiap Research Institute’s Biometrics Security and Privacy Group show the potential vulnerability of biometric templates to 3D reconstruction attacks, and a possible way to protect those templates through hashing.

Both papers were shared over LinkedIn by Idiap Senior Researcher Sébastien Marcel, who also co-authored each.

A new method of cancelable biometric template protection was presented in “MLP-Hash: Protecting Face Templates via Hashing of Randomized Multi-Layer Perceptron” at the EUSIPCO 2023. The research’s other authors are Vedrana Krivokuća Hahn and Hatef Otroshi.

The biometric features extracted to create the template are passed through a user-specific randomly-weighted multi-layer perceptron (MLP), and the output converted to binary.

A perceptron is described as “an algorithm for simplified learning of binary classifiers” by Simplilearn.

The method was tested with an evaluation based on the ISO/IEC 30136 biometric template protection evaluation standard, with the MOBIO and LFW datasets. It showed performance competitive with template protection algorithms like BioHashing and IoM Hashing, according to the report.

Encrypted templates are generally considered within the biometrics industry to be near-impossible to reverse engineer into usable data, particularly at scale. New attack techniques continue to emerge, however, potentially making previously safe templates vulnerable.

“Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks Via 3D Face Reconstruction,” by Marcel and Otroshi, proposes a new method the researchers call GaFaR, for “Geometry-aware Face Reconstruction.”

The researchers developed a template inversion attack with a “pretrained geometry-aware face generation network” and mapping trained on real and synthetic faces.

The resulting method was tested in presentation attacks using digital and printed facial images, which showed some success in attacks against both the same system the template was stolen from and other facial recognition systems.

The paper was published in the IEEE Transactions on Pattern Analysis and Machine Intelligence.

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

ATO attacks surge in Q2 2024, Sift warns of growing ‘Fraud-as-a-Service’ threat

A recent report highlights the growing threat of account takeover (ATO) attacks, which surged by 24 percent in the second…

 

EU AI pact sets new standards for ethical AI use across Europe

By Tony Porter, Chief Privacy Officer at Corsight AI The European Union’s AI Pact marks a crucial step towards forming…

 

Deepfake detection challenge, integration to protect content integrity unveiled

A new deepfake detection competition has been announced with the intention of advancing “next-generation deepfake detection and localization systems” development….

 

Utah judge blocks age verification requirement for social media

A federal judge in Utah has ruled in favor of tech lobby group NetChoice and against the state’s new law…

 

Google announces beta test for digital IDs based on biometrics and US passports

A new type of digital ID based on U.S. passports in Google Wallet has been introduced ahead of beta testing….

 

Biometrics startups address pressing industry challenges in pitch competition

A group of biometric and digital identity startups went head-to-head in a pitching competition at Identity Week on Wednesday and…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events