
information leakage can significantly affect the over-
all security of the system.
It is important to highlight that the leakage ‘be-
low the threshold’ does not notably harm the security
of the system, while the leakage of ‘both below and
above the threshold’ markedly decreases the security.
Indeed, the attacks exploiting the leakage ‘below the
threshold’ are primarily exponential, while those ex-
ploiting information ‘below and above the threshold’
are mainly constant.
The accumulation attack we investigated assumes
errors uniformly distributed throughout each authen-
tication session. The result of the accumulation at-
tack could be further refined by considering a variable
number of coupons, randomly drawn between 0 and
ε in each round, while acknowledging the actual dis-
tribution of the errors. To the best of our knowledge,
no previous studies provide an analysis of the distri-
bution of the errors for any systems.
In practical scenarios, certain errors may occur
more frequently than others, while some may never
occur. A skewed distribution of errors will substan-
tially increase the expected number of authentications
required from the legitimate user for the server to re-
cover the hidden template in its entirety. Future re-
search should involve refining the accumulation at-
tack as suggested above and exploring other distance
metrics, such as L
1
(i.e., Manhattan distance) and L
2
.
ACKNOWLEDGEMENTS
The authors acknowledge the support of the French
Agence Nationale de la Recherche (ANR), under
grant ANR-20-CE39-0005 (project PRIVABIO).
REFERENCES
Ahlgren, J. (2014). The probability distribution for draws
until first success without replacement.
Aydin, F. and Aysu, A. (2024). Leaking secrets in homo-
morphic encryption with side-channel attacks. Jour-
nal of Cryptographic Engineering, pages 1–11.
Belguechi, R., Cherrier, E., Rosenberger, C., and Ait-
Aoudia, S. (2013). Operational bio-hash to preserve
privacy of fingerprint minutiae templates. IET bio-
metrics, 2(2):76–84.
Berenbrink, P. and Sauerwald, T. (2009). The weighted
coupon collector’s problem and applications. In Ngo,
H. Q., editor, Computing and Combinatorics, pages
449–458, Berlin, Heidelberg. Springer Berlin Heidel-
berg.
Bernal-Romero, J. C., Ramirez-Cortes, J. M., Rangel-
Magdaleno, J. D. J., Gomez-Gil, P., Peregrina-
Barreto, H., and Cruz-Vega, I. (2023). A review on
protection and cancelable techniques in biometric sys-
tems. IEEE Access, 11:8531–8568.
Cho, S., Oh, B.-S., Kim, D., and Toh, K.-A. (2021). Palm-
vein verification using images from the visible spec-
trum. IEEE Access, 9:86914–86927.
Chvatal, V. (1979). A greedy heuristic for the set-
covering problem. Mathematics of operations re-
search, 4(3):233–235.
Daugman, J. (2009). How iris recognition works. In The
essential guide to image processing, pages 715–739.
Elsevier.
Daugman, J. (2015). Information theory and the iriscode.
IEEE transactions on information forensics and secu-
rity, 11(2):400–409.
Dehkordi, A. B. and Abu-Bakar, S. A. (2015). Iris code
matching using adaptive hamming distance. In 2015
IEEE International Conference on Signal and Im-
age Processing Applications (ICSIPA), pages 404–
408. IEEE.
Ferrante, M. and Saltalamacchia, M. (2014). The coupon
collector’s problem. MATerials MATem
`
atics, 2014:35.
Harikrishnan, D., Sunil Kumar, N., Joseph, S., and Nair,
K. K. (2024). Towards a fast and secure finger-
print authentication system based on a novel encoding
scheme. International Journal of Electrical Engineer-
ing & Education, 61(1):100–112.
Hashemi, M., Forte, D., and Ganji, F. (2024). Time is
money, friend! timing side-channel attack against gar-
bled circuit constructions. In International Confer-
ence on Applied Cryptography and Network Security,
pages 325–354. Springer.
He, R., Cai, Y., Tan, T., and Davis, L. (2015). Learning
predictable binary codes for face indexing. Pattern
recognition, 48(10):3160–3168.
Korte, B. H., Vygen, J., Korte, B., and Vygen, J. (2011).
Combinatorial optimization, volume 1. Springer.
Ouda, O., Tsumura, N., and Nakaguchi, T. (2010). Bioen-
coding: A reliable tokenless cancelable biometrics
scheme for protecting iriscodes. IEICE TRANS-
ACTIONS on Information and Systems, 93(7):1878–
1888.
Pagnin, E., Dimitrakakis, C., Abidin, A., and Mitrokotsa,
A. (2014). On the leakage of information in biometric
authentication. In International Conference on Cryp-
tology in India, pages 265–280. Springer.
Patel, V. M., Ratha, N. K., and Chellappa, R. (2015). Can-
celable biometrics: A review. IEEE signal processing
magazine, 32(5):54–65.
Rahman, A., Chowdhury, M. E., Khandakar, A., Kiranyaz,
S., Zaman, K. S., Reaz, M. B. I., Islam, M. T., Ezed-
din, M., and Kadir, M. A. (2021). Multimodal eeg
and keystroke dynamics based biometric system using
machine learning algorithms. Ieee Access, 9:94625–
94643.
Ratha, N. K., Connell, J. H., and Bolle, R. M. (2001).
An analysis of minutiae matching strength. In Bi-
gun, J. and Smeraldi, F., editors, Audio- and Video-
Based Biometric Person Authentication, pages 223–
228, Berlin, Heidelberg. Springer Berlin Heidelberg.
Exploit the Leak: Understanding Risks in Biometric Matchers
361