高级检索
    王会勇, 唐士杰, 丁勇, 王玉珏, 李佳慧. 生物特征识别模板保护综述[J]. 计算机研究与发展, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371
    引用本文: 王会勇, 唐士杰, 丁勇, 王玉珏, 李佳慧. 生物特征识别模板保护综述[J]. 计算机研究与发展, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371
    Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui. Survey on Biometrics Template Protection[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371
    Citation: Wang Huiyong, Tang Shijie, Ding Yong, Wang Yujue, Li Jiahui. Survey on Biometrics Template Protection[J]. Journal of Computer Research and Development, 2020, 57(5): 1003-1021. DOI: 10.7544/issn1000-1239.2020.20190371

    生物特征识别模板保护综述

    Survey on Biometrics Template Protection

    • 摘要: 生物特征识别(biometric authentication, BA)已经成为一种重要的身份鉴别手段,但当前部署的很多BA系统在保护用户生物特征数据的安全性和隐私性方面考虑不足,成为阻碍BA技术推广应用的一个关键障碍.BA系统可能面临来自软件和硬件的多种攻击,针对生物特征模板的攻击是其中最常见的一种.已经有很多技术文献致力于应对这种类型的攻击,但现有的综述性文献存在论述不全面或内容冲突等问题.为系统总结针对生物特征模板的攻击与保护技术,首先介绍了BA系统的相关概念、体系架构以及安全性与隐私性的内涵,然后阐述了BA系统面临的典型模板攻击方法.随后,将BA系统模板保护技术归纳为基于变换的方法和基于加密的方法2个类别,阐述并分析了每个类别中的经典方法与新兴技术.最后,指出了构建安全BA系统可能面临的几个主要困难与可能的解决思路.

       

      Abstract: Biometric authentication (BA) has become an important means of identity authentication. However, many BA systems deployed at present do not take enough consideration in protecting the security and privacy of users biometric data, which has become a main obstacle to the popularization and application of the BA technology. BA systems may face various attacks from software or hardware implementations, among which, template attack is the main consideration. Many technical literatures have been devoted to dealing with this type of attacks. However, existing review literatures suffer from incomplete descriptions or conflicting discussions. In order to systematically summarize the attacking and protection technologies against biometric templates, some related concepts of the BA system is introduced at first, as well as the architecture of a BA system and the connotation of BA security and privacy. Then, template protection technologies for a BA system are classified into two main categories for description: the transformation-based methods and the crypto-based methods, which solves some conflictions in existing literatures. Afterwards, some classical methods and emerging technologies in each category are expounded and analyzed, as well as some subsequent evaluations and improvements. Finally, several major difficulties and the corresponding possible solutions for building a secure BA system are pointed out.

       

    /

    返回文章
    返回