Biometrics Authentication System: Privacy and Security Associations
VerifiedAdded on 2024/07/01
|4
|2397
|213
AI Summary
This research paper explores the privacy and security concerns associated with biometric authentication systems. It examines the vulnerabilities of traditional biometric systems and proposes a novel design incorporating RFID tags and live biometric processes to enhance security and privacy. The paper delves into the literature review, highlighting existing solutions and challenges in biometric authentication, including issues related to data storage, transmission, and user authentication. The proposed design aims to address these challenges by implementing a two-step authentication process, utilizing smart cards for biometric data storage, and incorporating voice recognition technology for enhanced security. The paper concludes by emphasizing the importance of robust security measures to protect user privacy and ensure the integrity of biometric authentication systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
ITC595 Research Project
Biometrics authentication System: Privacy and
Security Associations
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT – Biometric authentication is a security
procedure that used the Biometric data. Biometric data is a
collection of the human characteristics such as voice, fingerprint,
iris, palm print, face recognition, and so on. This data is unique
for every person. The current organization used the manual
methods for the authentication process, which contained the
security threats. For the resolution, there is designed a biometric
template system that main aim is to provide the security and
privacy in the organization. In this paper, authors are designed a
biometric system with RFID tag and database which is secure
and robust for the authentication purpose (Alves, Cruz, &
Vinhal, 2014).
Keywords— Security, privacy, Biometrics, RFID, authentication, Secret
sharing, Access Control;
Introduction:
INTRODUCTION
Information security designed to defend the availability,
integrity, and confidentiality of the information those with
mischievous intentions. Biometric authentication used Multi-
factor authentication process due to security purpose.
Automated methods used for verifying and identifying the
person according to behavioural and physiological
characteristics. The system used a different type of algorithm
to work on the biometric data. It is better than traditional
methods of the personal recognition because this process
offers security and convenience.
Biometric system faced security issue during the personal
recognize process for example race, Medical Conditions, sex,
and so-on. The system needs a database to store the person
data because each person contained unique and stable data,
which need to store. There is a major concern when the
attackers attack the system database and try to steal the
sensitive information. Several research papers reviewed in the
Literature Evaluation Segment, which based on Biometric
authentication. Illegal data breaching, unauthorized access and
database security are a major issue of the Biometric
authentication. Therefore, in this paper, I have designed a
system with RFID and live biometric system for the
authentication process, which provides the additional level
security.
Figure 1: Biometric system Attack
Showed all possible attacks on the Biometric system
A. Research Problem
In the research paper, there focused on the Biometric
authentication issues, which occurred during the
authentication process. Biometric data needs the privacy and
security in the Biometric authentication system. In this
research paper, there will focus on the security issue and
Privacy issue that is related to the real-time system and
authentication process. These issues may affect the
Reliability, and Integrity of the Biometric authentication
system. System versatility decreased due to a security issue,
and Privacy issue. It creates the user authentication process.
The biometric authentication system may recognize the fake
person access in the organization or system. RFID tags and
live biometric process used in this research paper to justified
Biometric authentication Research Problem (Scherhaufl,
Pichler, & Stelzer, 2014).
1
Biometrics authentication System: Privacy and
Security Associations
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT – Biometric authentication is a security
procedure that used the Biometric data. Biometric data is a
collection of the human characteristics such as voice, fingerprint,
iris, palm print, face recognition, and so on. This data is unique
for every person. The current organization used the manual
methods for the authentication process, which contained the
security threats. For the resolution, there is designed a biometric
template system that main aim is to provide the security and
privacy in the organization. In this paper, authors are designed a
biometric system with RFID tag and database which is secure
and robust for the authentication purpose (Alves, Cruz, &
Vinhal, 2014).
Keywords— Security, privacy, Biometrics, RFID, authentication, Secret
sharing, Access Control;
Introduction:
INTRODUCTION
Information security designed to defend the availability,
integrity, and confidentiality of the information those with
mischievous intentions. Biometric authentication used Multi-
factor authentication process due to security purpose.
Automated methods used for verifying and identifying the
person according to behavioural and physiological
characteristics. The system used a different type of algorithm
to work on the biometric data. It is better than traditional
methods of the personal recognition because this process
offers security and convenience.
Biometric system faced security issue during the personal
recognize process for example race, Medical Conditions, sex,
and so-on. The system needs a database to store the person
data because each person contained unique and stable data,
which need to store. There is a major concern when the
attackers attack the system database and try to steal the
sensitive information. Several research papers reviewed in the
Literature Evaluation Segment, which based on Biometric
authentication. Illegal data breaching, unauthorized access and
database security are a major issue of the Biometric
authentication. Therefore, in this paper, I have designed a
system with RFID and live biometric system for the
authentication process, which provides the additional level
security.
Figure 1: Biometric system Attack
Showed all possible attacks on the Biometric system
A. Research Problem
In the research paper, there focused on the Biometric
authentication issues, which occurred during the
authentication process. Biometric data needs the privacy and
security in the Biometric authentication system. In this
research paper, there will focus on the security issue and
Privacy issue that is related to the real-time system and
authentication process. These issues may affect the
Reliability, and Integrity of the Biometric authentication
system. System versatility decreased due to a security issue,
and Privacy issue. It creates the user authentication process.
The biometric authentication system may recognize the fake
person access in the organization or system. RFID tags and
live biometric process used in this research paper to justified
Biometric authentication Research Problem (Scherhaufl,
Pichler, & Stelzer, 2014).
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Figure 2: Security level with authentication type
B. Research Justification
The biometric Matching process mainly focused on the
research paper for the user authentication and verification
procedure. Remote location accesses allowed to the system
user. The user can be accessed by the system anytime, and
anywhere. RFID tags and IoT implemented in the system,
which provides an automated system. This automated system
verified and recognizing the person and things according to
their unique features. Biometric Authentication is major
concerns of the paper. There is a study of the user data, which
collected from the various Biometric Authentication systems.
User data also collected the remote location access system. It
will describe POSSESSIONS of Biometric fact on the system
during the remote access and Authentication. This paper will
provide the recommendation for the Biometric system, which
helps in resolving the privacy and security issue.
Table 1: Issue of biometrics features
Name of
Biometric
Feature
Distingui
shability
Durab
ility
Collect
ability
Perfor
mance
Face H M H H
Fingerprint M L M H
IRIS H H M H
Signature L M H M
Voice H H M M
DNA H H L H
Hand Geometry M M H M
Odour H H M L
Palm Print H H M H
Ear M H M L
In the above table, H represented high, M represented
medium, and L represent Low. The table contained
information about Name of Biometric Feature,
Distinguishability, Durability, Collectability, and
Performance. It showed the biometrics features issues. With
the help of a table, there is tries to resolve the Biometric
system security and privacy. Two-step authentication and
RFID tags will use to resolve the security issue in the
Biometric system that provides integrity, reliability, and
efficiency in the system. Through the trust system, security
and privacy provided to the system user.
LITERATURE REVIEW
According to the research paper, face Image, Iris Data,
Fingerprints, and face Image are Biometric data, which
collected from the user in the Biometric system. Privacy issue
and security issues occurred in the system due to soft
Biometric features. These issues created during the
authentication procedure. Authors have proposed a technique
to resolve the Gender Classifier issues. It took pictures of the
user as the input and work on the image and provided the
gender attribute Classifier as the output. This technique
analysis the Biometric features which showed in the above
table. It reduces the security issue in the system and provides
an effective and reliable system for the user
verification(Dong, & Woodard, 2011).
According to the research paper, the hashing technique is used
in the biometric system during the user verification. Two-
factor authentication process combined with biometric
verification method that enclosed a secret password with the
biometric factor. It provides a better system after the
implementation process. Hash technique used for the image
biometric feature recreate in the system. it recreated an image
with the help of 1-bit compression outline methods which
provides the security and privacy form the privacy attacks,
and unauthorized user. There used the Secret password and
biometric factor for the reconstructed image. It provides
reliable and trust system that implemented gateway high level
for the security purpose. But the attacker can access the
password during the data sharing and data communication
(Karabat, & Erdogan, 2009).
According to the research paper, secure and privacy needed
during the data transmission and data communication so
Cryptographic used in the Biometric system. Cryptography
key contained 256 bits, which more secure key that is not
easily creaked by any attacker. The cryptographic process
used for decryption and encryption. Key saved in the
Biometric system database, which contained minimal issues
related to security. Sender and receiver used the Cryptography
key for secure data transmission. For the security and privacy
issues resolution, authors implemented cryptography key on
the cancelable fingerprint methodology. Proposed techniques
are known as Steganography techniques that based on the
secret key-based technique. Two-step authentication and
RFID tags are used in the Steganography method to solve the
security and privacy problem in the authentication system
(Kanade, Petrovska-Delacrétaz, & Dorizzi, 2010).
According to the research paper, Privacy and security are
major concerns of the Biometric Systems so authors are
implemented binary Biohash Vector techniques. For the
security purpose, this technique converted the Biometric
parameter and storage in the system. During the fetching
process, parameters again converted into the original features
2
B. Research Justification
The biometric Matching process mainly focused on the
research paper for the user authentication and verification
procedure. Remote location accesses allowed to the system
user. The user can be accessed by the system anytime, and
anywhere. RFID tags and IoT implemented in the system,
which provides an automated system. This automated system
verified and recognizing the person and things according to
their unique features. Biometric Authentication is major
concerns of the paper. There is a study of the user data, which
collected from the various Biometric Authentication systems.
User data also collected the remote location access system. It
will describe POSSESSIONS of Biometric fact on the system
during the remote access and Authentication. This paper will
provide the recommendation for the Biometric system, which
helps in resolving the privacy and security issue.
Table 1: Issue of biometrics features
Name of
Biometric
Feature
Distingui
shability
Durab
ility
Collect
ability
Perfor
mance
Face H M H H
Fingerprint M L M H
IRIS H H M H
Signature L M H M
Voice H H M M
DNA H H L H
Hand Geometry M M H M
Odour H H M L
Palm Print H H M H
Ear M H M L
In the above table, H represented high, M represented
medium, and L represent Low. The table contained
information about Name of Biometric Feature,
Distinguishability, Durability, Collectability, and
Performance. It showed the biometrics features issues. With
the help of a table, there is tries to resolve the Biometric
system security and privacy. Two-step authentication and
RFID tags will use to resolve the security issue in the
Biometric system that provides integrity, reliability, and
efficiency in the system. Through the trust system, security
and privacy provided to the system user.
LITERATURE REVIEW
According to the research paper, face Image, Iris Data,
Fingerprints, and face Image are Biometric data, which
collected from the user in the Biometric system. Privacy issue
and security issues occurred in the system due to soft
Biometric features. These issues created during the
authentication procedure. Authors have proposed a technique
to resolve the Gender Classifier issues. It took pictures of the
user as the input and work on the image and provided the
gender attribute Classifier as the output. This technique
analysis the Biometric features which showed in the above
table. It reduces the security issue in the system and provides
an effective and reliable system for the user
verification(Dong, & Woodard, 2011).
According to the research paper, the hashing technique is used
in the biometric system during the user verification. Two-
factor authentication process combined with biometric
verification method that enclosed a secret password with the
biometric factor. It provides a better system after the
implementation process. Hash technique used for the image
biometric feature recreate in the system. it recreated an image
with the help of 1-bit compression outline methods which
provides the security and privacy form the privacy attacks,
and unauthorized user. There used the Secret password and
biometric factor for the reconstructed image. It provides
reliable and trust system that implemented gateway high level
for the security purpose. But the attacker can access the
password during the data sharing and data communication
(Karabat, & Erdogan, 2009).
According to the research paper, secure and privacy needed
during the data transmission and data communication so
Cryptographic used in the Biometric system. Cryptography
key contained 256 bits, which more secure key that is not
easily creaked by any attacker. The cryptographic process
used for decryption and encryption. Key saved in the
Biometric system database, which contained minimal issues
related to security. Sender and receiver used the Cryptography
key for secure data transmission. For the security and privacy
issues resolution, authors implemented cryptography key on
the cancelable fingerprint methodology. Proposed techniques
are known as Steganography techniques that based on the
secret key-based technique. Two-step authentication and
RFID tags are used in the Steganography method to solve the
security and privacy problem in the authentication system
(Kanade, Petrovska-Delacrétaz, & Dorizzi, 2010).
According to the research paper, Privacy and security are
major concerns of the Biometric Systems so authors are
implemented binary Biohash Vector techniques. For the
security purpose, this technique converted the Biometric
parameter and storage in the system. During the fetching
process, parameters again converted into the original features
2
which optimization issue in the system. Binary Biohash
Vector encompasses certain isolated Biometric user Features.
Consistency Criteria used by the new vectors which find out
through min Euclidean Distance process. Biohash technique
used a specific and unique function during the user
authentication procedure (Fuksis, Kadikis, & Greitans, 2011)
According to the research paper, Smart city management used
the access control in the Biometrics system, which occurred
the data transmission security and privacy issue. So there is
needed system sever for the Medias meaning access.
Biometric data value saved on the server, which used during
the user authentication. Authors have proposed the system to
resolve the Present Problem of the Biometrics system. There
is implemented the Smart cards and RFID tags to resolve the
access problem and data transmission. The proposed
technique is known as a Palm-print technique that provides
highly reliable system because it works on False Rejection
Rate (FRR) and False Acceptance Rate (FAR) (Adhinagara,
Agung, & Novi, 2011).
PROPOSED DESIGN
The biometric authentication required the two-step
authentication to provide the better functionality of the
authentication to the customers and customer can work on the
system with this authentication. The concern of the privacy
can solve by the system through the two-step authentication.
The purpose of the proposed design is to get the biometric
data to improve the reliability, efficiency and integrity of the
system. The customer can use a card for the user
authentication purpose, that store the biometric data and this
card known as a smart card. Voice recognition technology is
the next phase that uses for the user authentication purpose or
the way of the secret password can use for this purpose. The
biometric system might decrease the privacy and security of
the system and regarding the data of the system.
Figure 3: Proposed Design
The biometric system is used the proposed design to find a
better solution to implement the user authentication. A
particular image uses the data and image format for the
process of user authentication. After taking the image, it
converts it into the code or the template and stores it. When a
user, use the smart cards in the biometric system with the
insert it, then the system performs the task to check the details
of card and authenticate it with the system. Each smart card
stores a hidden code that checked by the system for
authentication purpose. After successfully match the code
with the system, users will get the access to enter into the
system otherwise it will reject the card.
CONCLUSION
The user can face so many problems during the user
authentication process if the system does not match with a
smart card of a biometric system. Use the approach of user
identification with the biometric system regarding the issues
of security and identity of the user and its system. The schema
of proposed is approved with the research paper, after the
process of user authentication. The research paper reviews
before implementing it with the system, regarding the security
issues or the privacy. As the result of analyzing the biometric
system, it makes better for the process of user authentication.
A critical problem can face regarding the protection issues of
the biometric templates. The user needs to access the template
so provide the security and welfare technologies and explore
the biometric data. The reviewed paper of the research is
working on the issues of privacy, authentication and security
to resolve it because these issues are harmful to the integrity
of the system with the reliability.
Acknowledgement
“Biometrics authentication System: Privacy and Security
Associations” research paper is written by me. Paper designed
according to template and research work. There is used the
APA referencing style
REFERENCES
[1]. Alves, D. D., Cruz, G., & Vinhal, C. (2014, December).
Authentication system using behavioural biometrics through
keystroke dynamics. In Computational Intelligence in Biometrics
and Identity Management (CIBIM), 2014 IEEE Symposium on (pp.
181-184). IEEE.
[2]. Dong, Y., & Woodard, D. L. (2011). Eyebrow shape-based
features for biometric recognition and gender classification: A
feasibility study.
[3]. Karabat, C., & Erdogan, H. (2009, September). A cancelable
biometric hashing for the secure biometric verification system.
In Intelligent Information Hiding and Multimedia Signal
Processing, 2009. IIH-MSP'09. Fifth International Conference
on (pp. 1082-1085). IEEE.
3
Vector encompasses certain isolated Biometric user Features.
Consistency Criteria used by the new vectors which find out
through min Euclidean Distance process. Biohash technique
used a specific and unique function during the user
authentication procedure (Fuksis, Kadikis, & Greitans, 2011)
According to the research paper, Smart city management used
the access control in the Biometrics system, which occurred
the data transmission security and privacy issue. So there is
needed system sever for the Medias meaning access.
Biometric data value saved on the server, which used during
the user authentication. Authors have proposed the system to
resolve the Present Problem of the Biometrics system. There
is implemented the Smart cards and RFID tags to resolve the
access problem and data transmission. The proposed
technique is known as a Palm-print technique that provides
highly reliable system because it works on False Rejection
Rate (FRR) and False Acceptance Rate (FAR) (Adhinagara,
Agung, & Novi, 2011).
PROPOSED DESIGN
The biometric authentication required the two-step
authentication to provide the better functionality of the
authentication to the customers and customer can work on the
system with this authentication. The concern of the privacy
can solve by the system through the two-step authentication.
The purpose of the proposed design is to get the biometric
data to improve the reliability, efficiency and integrity of the
system. The customer can use a card for the user
authentication purpose, that store the biometric data and this
card known as a smart card. Voice recognition technology is
the next phase that uses for the user authentication purpose or
the way of the secret password can use for this purpose. The
biometric system might decrease the privacy and security of
the system and regarding the data of the system.
Figure 3: Proposed Design
The biometric system is used the proposed design to find a
better solution to implement the user authentication. A
particular image uses the data and image format for the
process of user authentication. After taking the image, it
converts it into the code or the template and stores it. When a
user, use the smart cards in the biometric system with the
insert it, then the system performs the task to check the details
of card and authenticate it with the system. Each smart card
stores a hidden code that checked by the system for
authentication purpose. After successfully match the code
with the system, users will get the access to enter into the
system otherwise it will reject the card.
CONCLUSION
The user can face so many problems during the user
authentication process if the system does not match with a
smart card of a biometric system. Use the approach of user
identification with the biometric system regarding the issues
of security and identity of the user and its system. The schema
of proposed is approved with the research paper, after the
process of user authentication. The research paper reviews
before implementing it with the system, regarding the security
issues or the privacy. As the result of analyzing the biometric
system, it makes better for the process of user authentication.
A critical problem can face regarding the protection issues of
the biometric templates. The user needs to access the template
so provide the security and welfare technologies and explore
the biometric data. The reviewed paper of the research is
working on the issues of privacy, authentication and security
to resolve it because these issues are harmful to the integrity
of the system with the reliability.
Acknowledgement
“Biometrics authentication System: Privacy and Security
Associations” research paper is written by me. Paper designed
according to template and research work. There is used the
APA referencing style
REFERENCES
[1]. Alves, D. D., Cruz, G., & Vinhal, C. (2014, December).
Authentication system using behavioural biometrics through
keystroke dynamics. In Computational Intelligence in Biometrics
and Identity Management (CIBIM), 2014 IEEE Symposium on (pp.
181-184). IEEE.
[2]. Dong, Y., & Woodard, D. L. (2011). Eyebrow shape-based
features for biometric recognition and gender classification: A
feasibility study.
[3]. Karabat, C., & Erdogan, H. (2009, September). A cancelable
biometric hashing for the secure biometric verification system.
In Intelligent Information Hiding and Multimedia Signal
Processing, 2009. IIH-MSP'09. Fifth International Conference
on (pp. 1082-1085). IEEE.
3
[4]. Kanade, S., Petrovska-Delacrétaz, D., & Dorizzi, B. (2010,
September). Generating and sharing biometrics based session keys
for secure cryptographic applications. In Biometrics: Theory
Applications and Systems (BTAS), 2010 Fourth IEEE International
Conference on (pp. 1-7). IEEE.
[5]. Fuksis, R., Kadikis, A., & Greitans, M. (2011, November).
Biohashing and fusion of palmprint and palm vein biometric data.
In Hand-Based Biometrics (ICHB), 2011 International Conference
on (pp. 1-6). IEEE.
[6]. Adhinagara, Y., Agung, B. T., & Novi, D. R. (2011, July).
Implementation of multimodal biometrics recognition system
combined palm print and palm geometry features. In Electrical
Engineering and Informatics (ICEEI), 2011 International
Conference on (pp. 1-5). IEEE.
[7]. Scherhaufl, M., Pichler, M., & Stelzer, A. (2014, April).
Localization of passive UHF RFID tags based on inverse synthetic
apertures. In RFID (IEEE RFID), 2014 IEEE International
Conference on (pp. 82-88). IEEE.
4
September). Generating and sharing biometrics based session keys
for secure cryptographic applications. In Biometrics: Theory
Applications and Systems (BTAS), 2010 Fourth IEEE International
Conference on (pp. 1-7). IEEE.
[5]. Fuksis, R., Kadikis, A., & Greitans, M. (2011, November).
Biohashing and fusion of palmprint and palm vein biometric data.
In Hand-Based Biometrics (ICHB), 2011 International Conference
on (pp. 1-6). IEEE.
[6]. Adhinagara, Y., Agung, B. T., & Novi, D. R. (2011, July).
Implementation of multimodal biometrics recognition system
combined palm print and palm geometry features. In Electrical
Engineering and Informatics (ICEEI), 2011 International
Conference on (pp. 1-5). IEEE.
[7]. Scherhaufl, M., Pichler, M., & Stelzer, A. (2014, April).
Localization of passive UHF RFID tags based on inverse synthetic
apertures. In RFID (IEEE RFID), 2014 IEEE International
Conference on (pp. 82-88). IEEE.
4
1 out of 4
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.