1)/(
∏
k
i=2
2
η(n−i+1)
). Since this probability is near 1,
the usurpation of
b
n/w
c
persons with w the size of the
template is a likely event.
5 EVALUATION AND
CONCLUSION
We evaluate our attack (Section 3.2) through our
Python implementation. Gurobi 9.1.2 is used to
solve the quadratic non-convex programs, on a com-
puter running on Debian 11, with an EPYC 7F72
dual processor (48 cores) and 256GB RAM. We have
launched resolutions of the programs 50 times, each
with a time limit of 150 seconds. Table 1 reports the
running times for the different settings along with the
amount of changes done in the attacker fingerprint,
using Euclidian distance. With a 4×4-pixel image
and a 50-bit template, 150 seconds starts to be insuf-
ficient to solve the system and optimize the criterion.
In 500 seconds, we solve the system with a 10×10-
pixel image for a better ratio amount of changes over
image size. Thus, the experiments are encouraging
for a NP-hard problem (Sahni, 1974).
Table 1: Summary of the experiments for a 50-bit template.
Image Size Template Size Mean Distance Mean Time (s)
2 × 2 99 0.14
2 × 3 117 32.76
3 × 3 50 133 150.0
4 × 3 144 146.67
4 × 4 177 150.0
In this paper, we present several authentication at-
tacks on a popular CB scheme consisting in a compo-
sition of a kernel-based filter with a projection-based
transformation, in the stolen token scenario. Their
particularity is to completely reverse a CB scheme to
impersonate any or several users. To the best of our
knowledge, this is the first time that attacks are con-
ducted on a complete chain of treatments, including a
non-linear filter. The proposed methodology is to for-
malize the attacks as constrained optimization prob-
lems. As long as the attacker has access to one or
several templates with the corresponding passwords
or not, our attacks can be performed. Future work
will focus on finding optimizations and relaxations of
the systems to ensure the scaling of our attacks.
ACKNOWLEDGEMENT
The authors acknowledges the support of the French
Agence Nationale de la Recherche (ANR), under
grant ANR-20-CE39-0005 (project PRIVABIO).
REFERENCES
(2011). ISO/IEC24745:2011: Information technology – Se-
curity techniques – Biometric information protection.
Standard, International Organization for Standardiza-
tion.
(2018). ISO/IEC30136:2018(E): Information technology
– Performance testing of biometrictemplate protec-
tion scheme. Standard, International Organization for
Standardization.
Dong, X., Jin, Z., and Jin, A. T. B. (2019). A genetic algo-
rithm enabled similarity-based attack on cancellable
biometrics. In 2019 IEEE 10th International Confer-
ence on Biometrics Theory, Applications and Systems
(BTAS), pages 1–8.
Ghammam, L., Karabina, K., Lacharme, P., and Thiry-
Atighehchi, K. (2020). A cryptanalysis of two cance-
lable biometric schemes based on index-of-max hash-
ing. IEEE Transactions on Information Forensics and
Security, PP:1–12.
Jin, A. T. B., Ling, D. N. C., and Goh, A. (2004). Biohash-
ing: two factor authentication featuring fingerprint
data and tokenised random number. Pattern Recog-
nition, 37(11):2245–2255.
Lacharme, P., Cherrier, E., and Rosenberger, C. (2013).
Preimage attack on biohashing. In 2013 Interna-
tional Conference on Security and Cryptography (SE-
CRYPT), pages 1–8.
Li, C. and Hu, J. (2014). Attacks via record multiplicity on
cancelable biometrics templates. Concurrency Com-
putation: Practice and Experience, pages 1593–1605.
Nagar, A., Nandakumar, K., and Jain, A. K. (2010). Bio-
metric template transformation: a security analysis. In
Memon, N. D., Dittmann, J., Alattar, A. M., and Delp,
E. J., editors, Media Forensics and Security, volume
7541 of SPIE Proceedings, page 75410O. SPIE.
Nandakumar, K. and Jain, A. K. (2015). Biometric tem-
plate protection: Bridging the performance gap be-
tween theory and practice. IEEE Signal Processing
Magazine, 32:88–100.
Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G.,
and Yearwood, J. (2016). Protection of privacy in bio-
metric data. IEEE Access, 4:880–892.
Ratha, N. K., Connell, J. H., and Bolle, R. M. (2001). En-
hancing security and privacy in biometrics-based au-
thentication system. IBM Systems J., 37(11):2245–
2255.
Sahni, S. (1974). Computationally related problems. SIAM
Journal on Computing, 3(4):262–279.
Teoh, A. B. J., Yip, W. K., and Lee, S. (2008). Can-
cellable biometrics and annotations on BioHash. Pat-
tern Recognition, 41(6):2034–2044.
Topcu, B., Karabat, C., Azadmanesh, M., and Erdo-
gan, H. (2016). Practical security and privacy at-
tacks against biometric hashing using sparse recovery.
EURASIP Journal on Advances in Signal Processing,
2016(1):100.
Vincent, O. and Folorunso, O. (2009). A descriptive algo-
rithm for sobel image edge detection.
Authentication Attacks on Projection-based Cancelable Biometric Schemes
573