
95% of researchers rate our articles as excellent or good
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.
Find out more
ORIGINAL RESEARCH article
Front. Imaging
Sec. Imaging Applications
Volume 4 - 2025 | doi: 10.3389/fimag.2025.1476377
This article is part of the Research Topic New Generation of Attacks on Biometric User Authentication Systems. View all 3 articles
The final, formatted version of the article will be published soon.
You have multiple emails registered with Frontiers:
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
Homomorphically encrypted face recognition systems protect face information by hiding facial embeddings using homomorphic encryption schemes as a privacy-preserving mechanism. These systems conduct comparisons of encrypted face templates without the need for decryption, producing recognition scores as in an embedding space. For efficiency considerations, face recognition systems often tolerate revealing these scores after performing a comparison under encryption, yet this practice introduces a vulnerability. Accessing comparison scores in the cleartext introduces the risk of reconstructing the target embedding and inferring demographic information, which compromises the privacy and security of face recognition systems. In this paper, we highlight the susceptibility of face recognition systems to these risks, particularly for systems employing the inner product as a similarity measure commonly used in modern deep learning-based systems. We propose a training-less face template recovery attack based on the Lagrange multiplier optimization method. Our attack requires only a few random facial images and their comparison scores relative to the target facial template. To show the applicability of our attack in real-world scenarios, we assume that the synthetic facial images represent the spoofed faces. This assumption aligns with scenarios where attackers lack direct access to face recognition systems or avoid being caught, necessitating external approaches using spoofed faces to compromise these systems. We evaluate our attack on synthetic faces by verifying whether the recovered template is deemed similar to the target template held by face recognition systems set to accept strict thresholds. Our empirical study shows that an attacker needs between 50 and 192 scores and synthetic faces for a template recovery with a 100% success rate. We then analyze the impact of recovered templates by measuring the amount of soft biometrics they contain, and their resemblance to the reconstructed images of their target templates.
Keywords: Homomorphic encryption, Template recovery, Biometric template protection, inner product-based score, Biometric Recognition, synthetic facial images
Received: 05 Aug 2024; Accepted: 01 Apr 2025.
Copyright: © 2025 Bassit, Hahn, Rezgui, Shahreza, Veldhuis and Peter. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Amina Bassit, Michigan State University, East Lansing, United States
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Research integrity at Frontiers
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.