Skip to main content

Table 6 Potential attacks against BCS and CB.

From: A survey on biometric cryptosystems and cancelable biometrics

Technology

Proposed attack(s)

Biometric cryptosystems

 

Biometric encryptionâ„¢[20]

Blended substitution attack, attack via record multiplicity, masquerade attack (hill climbing)

Fuzzy commitment scheme [15]

Attacks on error correcting codes

Shielding functions [51]

Attack via record multiplicity

Fuzzy vault scheme [16]

Blended substitution attack, attack via record multiplicity, chaff elimination

Key-Gen. Schemes [77, 126]

False acceptance attack, masquerade attack, brute force attack

Biometric hardend passwords [19]

Power consumption observation

Cancelable Biometrics

 

Non-invertible transforms [12]

Overwriting final decision, Attack via Record Multiplicity, Substitution Attack (known Transform)

Biometric salting [41]

Overwriting final decision, with Stolen Token: False Acceptance Attack, Substitution Attack, Masquerade Attack