Abstract

Biometrics traits such as faces, fingerprints, and irises, are becoming prevalent in computer security applications: from authentication systems to identification systems. Given the sensitive nature of biometrics, a great deal of effort is put into protecting the biometric data after it is acquired — from secure sketch and fuzzy extractors to the use of secure multiparty computations (in protocols such as SCiFI or GSHADE). While these solutions make sure that the extracted values (e.g., binary strings or vectors) that correspond to the biometrics are kept privately and securely, their practical implementations are not optimal with respect to privacy guarantees in the process of extracting the information from the raw biometric data. This paper analyses current solutions for protected systems and discusses the existing and potential problems in the security and privacy of their feature extraction and the binarization processes. As an illustrative example, we show a PoC of an attack on a feature extraction solution from facial images, used in several protected systems, and show that it reveals information which is very close to the training image of the user. As we argue in this paper, other solutions provide privacy for the system's users but make use of external set of biometric data which is often quite large, thus facing privacy and ownership issues associated with the external set of people. The take home message of this paper is: Many of the existing “privacy preserving” solutions neglect the privacy and security aspects of the feature extraction and binarization processes. Hence, we urge future research to close this gap in the security and privacy of biometric systems.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.