Table 2: Summary of the experiments of the ε-cover-template search algorithm ILP version.
n ε #clients Time (ms)
20 1592.213
30 10 50 2428.682
40 3887.738
n ε #clients Time (ms)
5 24949.724
70 15 200 20978.806
25 29089.280
n ε #clients Time (ms)
90 11087.893
70 10 130 18330.508
170 20887.950
Table 3: Summary of the experiments of the ε-cover-template search algorithm SANN version.
n ε #clients Error Time
in % (ms)
20 0.64 17
30 10 50 0.00 1
40 0.05 1
n ε #clients Error Time
in % (ms)
5 0.00 36
70 15 200 0.00 36
25 0.00 40
n ε #clients Error Time
in % (ms)
90 0.14 12
70 10 130 0.00 22
170 0.00 31
REFERENCES
(2011). ISO/IEC24745:2011: Information technology – Se-
curity techniques – Biometric information protection.
Standard, International Organization for Standardiza-
tion.
(2018). ISO/IEC30136:2018(E): Information technology
– Performance testing of biometrictemplate protec-
tion scheme. Standard, International Organization for
Standardization.
Aarts, E., Korst, J., and Michiels, W. (2005). Simulated
Annealing, pages 187–210.
Ali, S., Karabina, K., and Karagoz, E. (2020). Formal accu-
racy analysis of a biometric data transformation and
its application to secure template generation. In SE-
CRYPT 2020, pages 485–496.
Bontrager, P., Roy, A., Togelius, J., Memon, N., and Ross,
A. (2018). Deepmasterprints: Generating master-
prints for dictionary attacks via latent variable evolu-
tion. In 2018 IEEE 9th International Conference on
Biometrics Theory, Applications and Systems (BTAS),
pages 1–9. IEEE.
Defays, D. (1977). An efficient algorithm for a complete
link method. The Computer Journal, 20(4):364–366.
Durbet, A., Lafourcade, P., Migdal, D., Thiry-Atighehchi,
K., and Grollemund, P.-M. (2021). Authentica-
tion attacks on projection-based cancelable biometric
schemes.
Frances, M. and Litman, A. (1997). On covering problems
of codes. Theory of Computing Systems, 30(2):113–
119.
Gernot, T. and Lacharme, P. (2021). Biometric masterkeys.
Ghammam, L., Karabina, K., Lacharme, P., and Thiry-
Atighehchi, K. (2020). A cryptanalysis of two cance-
lable biometric schemes based on index-of-max hash-
ing. IEEE Transactions on Information Forensics and
Security, PP:1–12.
Gramm, J., Niedermeier, R., and Rossmanith, P. (2001). Ex-
act solutions for closest string and related problems.
pages 441–453.
Jain, A., Prabhakar, S., Hong, L., and Pankanti, S. (2000).
Filterbank-based fingerprint matching. IEEE Trans-
actions on Image Processing, 9(5):846–859.
Jin, A. T. B., Ling, D. N. C., and Goh, A. (2004). Biohash-
ing: two factor authentication featuring fingerprint
data and tokenised random number. Pattern Recog-
nition, 37(11):2245–2255.
Kirkpatrick, S., Gelatt, C. D., and Vecchi, M. P. (1983).
Optimization by simulated annealing. Science,
220(4598):671–680.
Lacharme, P., Cherrier, E., and Rosenberger, C. (2013).
Preimage Attack on BioHashing. In SECRYPT 2013,
pages 363–370.
Lamberger, M., Mendel, F., Rijmen, V., and Simoens, K.
(2012). Memoryless near-collisions via coding theory.
Designs, Codes and Cryptography, 62(1):1–18.
Lamberger, M. and Teufl, E. (2012). Memoryless near-
collisions, revisited.
Lumini, A. and Nanni, L. (2007). An improved BioHash-
ing for human authentication. Pattern Recognition,
40(3):1057 – 1065.
Manjunath, B. S. and Ma, W. Y. (1996). Texture features for
browsing and retrieval of image data. 18(8):837–842.
Meneses, C., Lu, Z., Oliveira, C., and Pardalos, P. (2004).
Optimal solutions for the closest string problem via
integer programming. Informs Journal on Computing
- INFORMS, 16:419–429.
Nandakumar, K. and Jain, A. K. (2015). Biometric tem-
plate protection: Bridging the performance gap be-
tween theory and practice. IEEE Signal Processing
Magazine, 32:88–100.
Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G.,
and Yearwood, J. (2016). Protection of privacy in bio-
metric data. IEEE Access, 4:880–892.
Patel, V. M., Ratha, N. K., and Chellappa, R. (2015). Can-
celable biometrics: A review. IEEE Signal Processing
Magazine, 32(5):54–65.
Pedroso, J. P. (2011). Optimization with gurobi and python.
INESC Porto and Universidade do Porto, Porto, Por-
tugal, 1.
Ratha, N. K., Connell, J. H., and Bolle, R. M. (2001).
An analysis of minutiae matching strength. In Bi-
gun, J. and Smeraldi, F., editors, Audio- and Video-
Based Biometric Person Authentication, pages 223–
228, Berlin, Heidelberg. Springer Berlin Heidelberg.
Roy, A., Memon, N., and Ross, A. (2017). Masterprint: Ex-
ploring the vulnerability of partial fingerprint-based
authentication systems. IEEE Transactions on Infor-
mation Forensics and Security, 12(9):2013–2025.
Near-collisions and Their Impact on Biometric Security
389