logo

Biometrics Authentication System: Privacy and Security Associations

   

Added on  2024-07-01

4 Pages2397 Words213 Views
 | 
 | 
 | 
ITC595 Research Project
Biometrics authentication System: Privacy and
Security Associations
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT Biometric authentication is a security
procedure that used the Biometric data. Biometric data is a
collection of the human characteristics such as voice, fingerprint,
iris, palm print, face recognition, and so on. This data is unique
for every person. The current organization used the manual
methods for the authentication process, which contained the
security threats. For the resolution, there is designed a biometric
template system that main aim is to provide the security and
privacy in the organization. In this paper, authors are designed a
biometric system with RFID tag and database which is secure
and robust for the authentication purpose (Alves, Cruz, &
Vinhal, 2014).
Keywords Security, privacy, Biometrics, RFID, authentication, Secret
sharing, Access Control;
Introduction:
INTRODUCTION
Information security designed to defend the availability,
integrity, and confidentiality of the information those with
mischievous intentions. Biometric authentication used Multi-
factor authentication process due to security purpose.
Automated methods used for verifying and identifying the
person according to behavioural and physiological
characteristics. The system used a different type of algorithm
to work on the biometric data. It is better than traditional
methods of the personal recognition because this process
offers security and convenience.
Biometric system faced security issue during the personal
recognize process for example race, Medical Conditions, sex,
and so-on. The system needs a database to store the person
data because each person contained unique and stable data,
which need to store. There is a major concern when the
attackers attack the system database and try to steal the
sensitive information. Several research papers reviewed in the
Literature Evaluation Segment, which based on Biometric
authentication. Illegal data breaching, unauthorized access and
database security are a major issue of the Biometric
authentication. Therefore, in this paper, I have designed a
system with RFID and live biometric system for the
authentication process, which provides the additional level
security.
Figure 1: Biometric system Attack
Showed all possible attacks on the Biometric system
A. Research Problem
In the research paper, there focused on the Biometric
authentication issues, which occurred during the
authentication process. Biometric data needs the privacy and
security in the Biometric authentication system. In this
research paper, there will focus on the security issue and
Privacy issue that is related to the real-time system and
authentication process. These issues may affect the
Reliability, and Integrity of the Biometric authentication
system. System versatility decreased due to a security issue,
and Privacy issue. It creates the user authentication process.
The biometric authentication system may recognize the fake
person access in the organization or system. RFID tags and
live biometric process used in this research paper to justified
Biometric authentication Research Problem (Scherhaufl,
Pichler, & Stelzer, 2014).
1
Biometrics Authentication System: Privacy and Security Associations_1

Figure 2: Security level with authentication type
B. Research Justification
The biometric Matching process mainly focused on the
research paper for the user authentication and verification
procedure. Remote location accesses allowed to the system
user. The user can be accessed by the system anytime, and
anywhere. RFID tags and IoT implemented in the system,
which provides an automated system. This automated system
verified and recognizing the person and things according to
their unique features. Biometric Authentication is major
concerns of the paper. There is a study of the user data, which
collected from the various Biometric Authentication systems.
User data also collected the remote location access system. It
will describe POSSESSIONS of Biometric fact on the system
during the remote access and Authentication. This paper will
provide the recommendation for the Biometric system, which
helps in resolving the privacy and security issue.
Table 1: Issue of biometrics features
Name of
Biometric
Feature
Distingui
shability
Durab
ility
Collect
ability
Perfor
mance
Face H M H H
Fingerprint M L M H
IRIS H H M H
Signature L M H M
Voice H H M M
DNA H H L H
Hand Geometry M M H M
Odour H H M L
Palm Print H H M H
Ear M H M L
In the above table, H represented high, M represented
medium, and L represent Low. The table contained
information about Name of Biometric Feature,
Distinguishability, Durability, Collectability, and
Performance. It showed the biometrics features issues. With
the help of a table, there is tries to resolve the Biometric
system security and privacy. Two-step authentication and
RFID tags will use to resolve the security issue in the
Biometric system that provides integrity, reliability, and
efficiency in the system. Through the trust system, security
and privacy provided to the system user.
LITERATURE REVIEW
According to the research paper, face Image, Iris Data,
Fingerprints, and face Image are Biometric data, which
collected from the user in the Biometric system. Privacy issue
and security issues occurred in the system due to soft
Biometric features. These issues created during the
authentication procedure. Authors have proposed a technique
to resolve the Gender Classifier issues. It took pictures of the
user as the input and work on the image and provided the
gender attribute Classifier as the output. This technique
analysis the Biometric features which showed in the above
table. It reduces the security issue in the system and provides
an effective and reliable system for the user
verification(Dong, & Woodard, 2011).
According to the research paper, the hashing technique is used
in the biometric system during the user verification. Two-
factor authentication process combined with biometric
verification method that enclosed a secret password with the
biometric factor. It provides a better system after the
implementation process. Hash technique used for the image
biometric feature recreate in the system. it recreated an image
with the help of 1-bit compression outline methods which
provides the security and privacy form the privacy attacks,
and unauthorized user. There used the Secret password and
biometric factor for the reconstructed image. It provides
reliable and trust system that implemented gateway high level
for the security purpose. But the attacker can access the
password during the data sharing and data communication
(Karabat, & Erdogan, 2009).
According to the research paper, secure and privacy needed
during the data transmission and data communication so
Cryptographic used in the Biometric system. Cryptography
key contained 256 bits, which more secure key that is not
easily creaked by any attacker. The cryptographic process
used for decryption and encryption. Key saved in the
Biometric system database, which contained minimal issues
related to security. Sender and receiver used the Cryptography
key for secure data transmission. For the security and privacy
issues resolution, authors implemented cryptography key on
the cancelable fingerprint methodology. Proposed techniques
are known as Steganography techniques that based on the
secret key-based technique. Two-step authentication and
RFID tags are used in the Steganography method to solve the
security and privacy problem in the authentication system
(Kanade, Petrovska-Delacrétaz, & Dorizzi, 2010).
According to the research paper, Privacy and security are
major concerns of the Biometric Systems so authors are
implemented binary Biohash Vector techniques. For the
security purpose, this technique converted the Biometric
parameter and storage in the system. During the fetching
process, parameters again converted into the original features
2
Biometrics Authentication System: Privacy and Security Associations_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Biometric Authentication: System Security & Privacy
|6
|3012
|32

Biometric for Authentication
|7
|3210
|268

ITC595 Information Security - Doc
|4
|4949
|221

Enhanced Biometric Authentication for Secure Access Control
|4
|628
|304

Biometrics for Authentication: Security and Privacy Implications
|4
|3167
|381

Biometrics for authentication: security and privacy implications
|10
|2310
|472