loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Dorine Chagnon 1 ; Axel Durbet 1 ; Paul-Marie Grollemund 2 and Kevin Thiry-Atighehchi 1

Affiliations: 1 University Clermont Auvergne, LIMOS (UMR 6158 CNRS), Clermont-Ferrand, France ; 2 University Clermont Auvergne, LMBP (UMR 6620 CNRS), Clermont-Ferrand, France

Keyword(s): Privacy-Preserving Distance, Hamming Distance, Information Leakage, Biometric Security.

Abstract: In a biometric authentication or identification system, the matcher compares a stored and a fresh template to determine whether there is a match. This assessment is based on both a similarity score and a predefined threshold. For better compliance with privacy legislation, the matcher can be built upon a privacy-preserving distance. Beyond the binary output (‘yes’ or ‘no’), most schemes may perform more precise computations, e.g., the value of the distance. Such precise information is prone to leakage even when not returned by the system. This can occur due to a malware infection or the use of a weakly privacy-preserving distance, exemplified by side channel attacks or partially obfuscated designs. This paper provides an analysis of information leakage during distance evaluation. We provide a catalog of information leakage scenarios with their impacts on data privacy. Each scenario gives rise to unique attacks with impacts quantified in terms of computational costs, thereby providing a better understanding of the security level. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.133.149.29

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Chagnon, D., Durbet, A., Grollemund, P.-M. and Thiry-Atighehchi, K. (2025). Exploit the Leak: Understanding Risks in Biometric Matchers. In Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 2: ICISSP; ISBN 978-989-758-735-1; ISSN 2184-4356, SciTePress, pages 353-362. DOI: 10.5220/0013250600003899

@conference{icissp25,
author={Dorine Chagnon and Axel Durbet and Paul{-}Marie Grollemund and Kevin Thiry{-}Atighehchi},
title={Exploit the Leak: Understanding Risks in Biometric Matchers},
booktitle={Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 2: ICISSP},
year={2025},
pages={353-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013250600003899},
isbn={978-989-758-735-1},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 2: ICISSP
TI - Exploit the Leak: Understanding Risks in Biometric Matchers
SN - 978-989-758-735-1
IS - 2184-4356
AU - Chagnon, D.
AU - Durbet, A.
AU - Grollemund, P.
AU - Thiry-Atighehchi, K.
PY - 2025
SP - 353
EP - 362
DO - 10.5220/0013250600003899
PB - SciTePress