From: A survey on biometric cryptosystems and cancelable biometrics
Technology | Proposed attack(s) |
---|---|
Biometric cryptosystems | Â |
Biometric encryptionâ„¢[20] | Blended substitution attack, attack via record multiplicity, masquerade attack (hill climbing) |
Fuzzy commitment scheme [15] | Attacks on error correcting codes |
Shielding functions [51] | Attack via record multiplicity |
Fuzzy vault scheme [16] | Blended substitution attack, attack via record multiplicity, chaff elimination |
False acceptance attack, masquerade attack, brute force attack | |
Biometric hardend passwords [19] | Power consumption observation |
Cancelable Biometrics | Â |
Non-invertible transforms [12] | Overwriting final decision, Attack via Record Multiplicity, Substitution Attack (known Transform) |
Biometric salting [41] | Overwriting final decision, with Stolen Token: False Acceptance Attack, Substitution Attack, Masquerade Attack |