skip to main content
10.1145/1854229.1854244acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting

Authors Info & Claims
Published:09 September 2010Publication History

ABSTRACT

Biometric Hash algorithms, also called BioHash, are commonly designed to ensure template protection to its biometric raw data. They provide a certain level of robustness against input variability to assure reproducibility by compensating for intra-class variation of the biometric raw data. This concept can be a potential vulnerability. In this paper, we present two different approaches which exploit this vulnerability to reconstruct raw data out of a given BioHash for handwriting introduced in [1]. The first method uses manual user interaction combined with a genetic algorithm and the second approach uses a spline interpolation function based on specific features to generate raw data. Although they are hard to compare due to the different design, we do compare them with respect to their ability to reconstruct raw data within specific scenarios (constrained and unconstrained time and trails), time consumption during the reconstruction and usability. To show the differences, we evaluate using 250 raw data sets (10 individuals overall) consisting of 5 different handwriting semantics. We generate 50 BioHash vectors out of the raw data and use these as reference data to generate artificial raw data by using both attack methods. These experimental results show that the interactive approach is able to reconstruct raw data more accurate, compared to the automatic method, but with a much higher reconstruction time. If several hundred raw data samples are generated by the automatic approach the chance rises that one of the samples achieve equal or even better results than the interactive approach.

References

  1. Vielhauer, C. 2006. Biometric User Authentication for IT Security: From Fundamentals to Handwriting, Springer, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Jain, A.J., Nandakumar, K., Nagar, A. 2008, "Biometric Template Security," EURASIP Journal on Advances in Signal Processing, vol. 2008, Article ID 579416, 17 pages Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A.B.J. Teoh, A. Goh and D.C.L. Ngo, 2006, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs" IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.28, no.12, pp. 1892--1901. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Juelsand and M. Sudan, 2002, "A Fuzzy Vault Scheme" in Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, 2002, p. 408.Google ScholarGoogle Scholar
  5. A. Nagarand, S. Chaudhury, 2006, "Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme" in Proc. of IEEE International Conference Pattern Recognition, vol.4, HK., China, pp. 537--540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y.J. Lee, K. Bae, S.J. Lee, K.R. Park and J. Kim, 2007, "Biometric Key Binding: Fuzzy Vault based on Iris Images" in Proceedings of Second International Conference on Biometrics, Seoul, South Korea, pp.800--808. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y.C. Feng and P.C. Yuen, 2006, "Protecting Face Biometric Data on Smartcard with Reed-Solomon Code" in Proc. of CVPR Workshop on Biometrics, New York, USA, p.29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Cappelli, A. Erol, D. Maio and D. Maltoni, 2000, "Synthetic Fingerprint-image Generation", in proceedings 15th International Conference on Pattern Recognition (ICPR2000), Barcelona, vol.3, pp.475--478. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Holland, J.H., 1975 "Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology.", Control and Artificial Intelligence: MIT Press, 1995, First Published by University of Michigan Press 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Galbally, J., Fierrez, J., Martinez-Diaz M. and Ortega-Garcia, J., 2009, "Synthetic Generation of Handwritten Signatures Based on Spectral Analysis", in Defense and Security Symposium, Biometric Technologies for Human Identification, BTHI, Proc. SPIE, Orlando, USA.Google ScholarGoogle Scholar

Index Terms

  1. Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and security
        September 2010
        264 pages
        ISBN:9781450302869
        DOI:10.1145/1854229

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate128of318submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader