Skip to main content

Table 6 Potential attacks against BCS and CB.

From: A survey on biometric cryptosystems and cancelable biometrics

Technology Proposed attack(s)
Biometric cryptosystems  
Biometric encryption™[20] Blended substitution attack, attack via record multiplicity, masquerade attack (hill climbing)
Fuzzy commitment scheme [15] Attacks on error correcting codes
Shielding functions [51] Attack via record multiplicity
Fuzzy vault scheme [16] Blended substitution attack, attack via record multiplicity, chaff elimination
Key-Gen. Schemes [77, 126] False acceptance attack, masquerade attack, brute force attack
Biometric hardend passwords [19] Power consumption observation
Cancelable Biometrics  
Non-invertible transforms [12] Overwriting final decision, Attack via Record Multiplicity, Substitution Attack (known Transform)
Biometric salting [41] Overwriting final decision, with Stolen Token: False Acceptance Attack, Substitution Attack, Masquerade Attack