FB pixel

Biometric templates can be inverted for attacks, but also protected with hashing

New papers from Idiap researchers show how
Biometric templates can be inverted for attacks, but also protected with hashing
 

A pair of papers from the Idiap Research Institute’s Biometrics Security and Privacy Group show the potential vulnerability of biometric templates to 3D reconstruction attacks, and a possible way to protect those templates through hashing.

Both papers were shared over LinkedIn by Idiap Senior Researcher Sébastien Marcel, who also co-authored each.

A new method of cancelable biometric template protection was presented in “MLP-Hash: Protecting Face Templates via Hashing of Randomized Multi-Layer Perceptron” at the EUSIPCO 2023. The research’s other authors are Vedrana Krivokuća Hahn and Hatef Otroshi.

The biometric features extracted to create the template are passed through a user-specific randomly-weighted multi-layer perceptron (MLP), and the output converted to binary.

A perceptron is described as “an algorithm for simplified learning of binary classifiers” by Simplilearn.

The method was tested with an evaluation based on the ISO/IEC 30136 biometric template protection evaluation standard, with the MOBIO and LFW datasets. It showed performance competitive with template protection algorithms like BioHashing and IoM Hashing, according to the report.

Encrypted templates are generally considered within the biometrics industry to be near-impossible to reverse engineer into usable data, particularly at scale. New attack techniques continue to emerge, however, potentially making previously safe templates vulnerable.

“Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks Via 3D Face Reconstruction,” by Marcel and Otroshi, proposes a new method the researchers call GaFaR, for “Geometry-aware Face Reconstruction.”

The researchers developed a template inversion attack with a “pretrained geometry-aware face generation network” and mapping trained on real and synthetic faces.

The resulting method was tested in presentation attacks using digital and printed facial images, which showed some success in attacks against both the same system the template was stolen from and other facial recognition systems.

The paper was published in the IEEE Transactions on Pattern Analysis and Machine Intelligence.

Related Posts

Article Topics

 |   |   |   |   |   |   | 

Latest Biometrics News

 

ICE using data and probability to decide where to detain and arrest people

U.S. Immigration and Customs Enforcement’s Enhanced Leads Identification & Targeting for Enforcement (ELITE) tool is being used to identify “targets”…

 

In AI era, identity is about governance, Microblink’s Hartley Thompson tells BU Podcast

“One of the defining things in my life is change,” says Hartley Thompson of Microblink. “How do you react to…

 

CLR Labs wins funding to support biometrics, IAD, digital wallet standardization

Cabinet Louis Reynaud (CLR Labs) has won funding from a French government program to support its standardization efforts in biometrics,…

 

Checkr crossed $800M gross in 2025 as biometric background checks expand

Biometric background check provider Checkr is celebrating 2025 as its most successful year ever, with gross revenue surpassing $800 million…

 

Identity and risk infrastructure startup secures $12M for Europe, LATAM expansion

Monnai, which provides identity and risk data infrastructure, has announced a 12 million dollar equity funding round led by Motive…

 

Hopae appoints Sarah Clark to lead US expansion of digital ID verification platform

Sarah Clark is Hopae’s new CPO and GM for North America, joining the Seoul-headquartered company to help extend the reach…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events