Biometrics Authentication System: Privacy and Security Associations

Verified

Added on  2024/07/01

|4
|2397
|213
AI Summary
This research paper explores the privacy and security concerns associated with biometric authentication systems. It examines the vulnerabilities of traditional biometric systems and proposes a novel design incorporating RFID tags and live biometric processes to enhance security and privacy. The paper delves into the literature review, highlighting existing solutions and challenges in biometric authentication, including issues related to data storage, transmission, and user authentication. The proposed design aims to address these challenges by implementing a two-step authentication process, utilizing smart cards for biometric data storage, and incorporating voice recognition technology for enhanced security. The paper concludes by emphasizing the importance of robust security measures to protect user privacy and ensure the integrity of biometric authentication systems.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
ITC595 Research Project
Biometrics authentication System: Privacy and

Security Associations

A. Author

ITC595 MIT, School of Computing & Mathematics, Charles Sturt University

author@first-third.edu.au

ABSTRACT
Biometric authentication is a security
procedure that used the Biometric data. Biometric data is a

collection of the human characteristics such as voice, fingerprint,

iris, palm print, face recognition, and so on. This data is unique

for every person. The current organization used the manual

methods for the authentication process, which contained the

security threats. For the resolution, there is designed a biometric

template system that main aim is to provide the security and

privacy in the organization. In this paper, authors are designed a

biometric system with RFID tag and database which is secure

and robust for the authentication purpose (Alves, Cruz, &

Vinhal, 2014).

Keywords
Security, privacy, Biometrics, RFID, authentication, Secret
sharing, Access Control;

Introduction:

INTRODUCTION

Information security designed to defend the availability,

integrity, and confidentiality of the information those with

mischievous intentions. Biometric authentication used Multi-

factor authentication process due to security purpose.

Automated methods used for verifying and identifying the

person according to behavioural and physiological

characteristics. The system used a different type of algorithm

to work on the biometric data. It is better than traditional

methods of the personal recognition because this process

offers security and convenience.

Biometric system faced security issue during the personal

recognize process for example race, Medical Conditions, sex,

and so-on. The system needs a database to store the person

data because each person contained unique and stable data,

which need to store. There is a major concern when the

attackers attack the system database and try to steal the

sensitive information. Several research papers reviewed in the

Literature Evaluation Segment, which based on Biometric

authentication. Illegal data breaching, unauthorized access and

database security are a major issue of the Biometric

authentication. Therefore, in this paper, I have designed a

system with RFID and live biometric system for the

authentication process, which provides the additional level

security.

Figure
1: Biometric system Attack
Showed all possible attacks on the
Biometric system
A.
Research Problem
In the research paper, there focused on the Biometric

authentication issues, which occurred during the

authentication process. Biometric data needs the privacy and

security in the Biometric authentication system. In this

research paper, there will focus on the security issue and

Privacy issue that is related to the real-time system and

authentication process. These issues may affect the

Reliability, and Integrity of the Biometric authentication

system. System versatility decreased due to a security issue,

and Privacy issue. It creates the user authentication process.

The biometric authentication system may recognize the fake

person access in the organization or system. RFID tags and

live biometric process used in this research paper to justified

Biometric authentication Research Problem (Scherhaufl,

Pichler, & Stelzer, 2014).

1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 2: Security level with authentication type
B.
Research Justification
The biometric Matching process mainly focused on the

research paper for the user authentication and verification

procedure. Remote location accesses allowed to the system

user. The user can be accessed by the system anytime, and

anywhere. RFID tags and IoT implemented in the system,

which provides an automated system. This automated system

verified and recognizing the person and things according to

their unique features. Biometric Authentication is major

concerns of the paper. There is a study of the user data, which

collected from the various Biometric Authentication systems.

User data also collected the remote location access system. It

will describe
POSSESSIONS of Biometric fact on the system
during the remote access
and Authentication. This paper will
provide the recommendation for the Biometric system, which

helps in resolving the privacy and security issue
.
Table
1: Issue of biometrics features
Name of

Biometric

Feature

Distingui

shability

Durab

ility

Collect

ability

Perfor

mance

Face
H M H H
Fingerprint
M L M H
IRIS
H H M H
Signature
L M H M
Voice
H H M M
DNA
H H L H
Hand Geometry
M M H M
Odour
H H M L
Palm Print
H H M H
Ear
M H M L
In the above table, H represented high, M represented

medium, and L represent Low. The table contained

information about Name of Biometric Feature,

Distinguishability, Durability, Collectability, and

Performance. It showed the biometrics features issues. With

the help of a table, there is tries to resolve the Biometric

system security and privacy. Two-step authentication and

RFID tags will use to resolve the security issue in the

Biometric system that provides integrity, reliability, and

efficiency in the system. Through the trust system, security

and privacy provided to the system user.

LITERATURE REVIEW

According to the research paper, face Image, Iris Data,

Fingerprints, and face Image are Biometric data, which

collected from the user in the Biometric system. Privacy issue

and security issues occurred in the system due to soft

Biometric features. These issues created during the

authentication procedure. Authors have proposed a technique

to resolve the Gender Classifier issues. It took pictures of the

user as the input and work on the image and provided the

gender attribute Classifier as the output. This technique

analysis the Biometric features which showed in the above

table. It reduces the security issue in the system and provides

an effective and reliable system for the user

verification(Dong, & Woodard, 2011).

According to the research paper, the hashing technique is used

in the biometric system during the user verification. Two-

factor authentication process combined with biometric

verification method that enclosed a secret password with the

biometric factor. It provides a better system after the

implementation process. Hash technique used for the image

biometric feature recreate in the system. it recreated an image

with the help of 1-bit compression outline methods which

provides the security and privacy form the privacy attacks,

and unauthorized user. There used the Secret password and

biometric factor for the reconstructed image. It provides

reliable and trust system that implemented gateway high level

for the security purpose. But the attacker can access the

password during the data sharing and data communication

(Karabat, & Erdogan, 2009).

According to the research paper, secure and privacy needed

during the data transmission and data communication so

Cryptographic used in the Biometric system. Cryptography

key contained 256 bits, which more secure key that is not

easily creaked by any attacker. The cryptographic process

used for decryption and encryption. Key saved in the

Biometric system database, which contained minimal issues

related to security. Sender and receiver used the Cryptography

key for secure data transmission. For the security and privacy

issues resolution, authors implemented cryptography key on

the cancelable fingerprint methodology. Proposed techniques

are known as Steganography techniques that based on the

secret key-based technique. Two-step authentication and

RFID tags are used in the Steganography method to solve the

security and privacy problem in the authentication system

(Kanade, Petrovska-Delacrétaz, & Dorizzi, 2010).

According to the research paper, Privacy and security are

major concerns of the Biometric Systems so authors are

implemented binary Biohash Vector techniques. For the

security purpose, this technique converted the Biometric

parameter and storage in the system. During the fetching

process, parameters again converted into the original features

2
Document Page
which optimization issue in the system. Binary Biohash
Vector encompasses certain isolated Biometric user Features.

Consistency Criteria used by the new vectors which find out

through min Euclidean Distance process. Biohash technique

used a specific and unique function during the user

authentication procedure (Fuksis, Kadikis, & Greitans, 2011)

According to the research paper, Smart city management used

the access control in the Biometrics system, which occurred

the data transmission security and privacy issue. So there is

needed system sever for the Medias meaning access.

Biometric data value saved on the server, which used during

the user authentication. Authors have proposed the system to

resolve the Present Problem of the Biometrics system. There

is implemented the Smart cards and RFID tags to resolve the

access problem and data transmission. The proposed

technique is known as a Palm-print technique that provides

highly reliable system because it works on False Rejection

Rate (FRR) and False Acceptance Rate (FAR)
(Adhinagara,
Agung, & Novi, 2011).

PROPOSED DESIGN

The biometric authentication required the two-step

authentication to provide the better functionality of the

authentication to the customers and customer can work on the

system with this authentication. The concern of the privacy

can solve by the system through the two-step authentication.

The purpose of the proposed design is to get the biometric

data to improve the reliability, efficiency and integrity of the

system. The customer can use a card for the user

authentication purpose, that store the biometric data and this

card known as a smart card. Voice recognition technology is

the next phase that uses for the user authentication purpose or

the way of the secret password can use for this purpose. The

biometric system might decrease the privacy and security of

the system and regarding the data of the system.

Figure
3: Proposed Design
The biometric system is used the proposed design to find a

better solution to implement the user authentication. A

particular image uses the data and image format for the

process of user authentication. After taking the image, it

converts it into the code or the template and stores it. When a

user, use the smart cards in the biometric system with the

insert it, then the system performs the task to check the details

of card and authenticate it with the system. Each smart card

stores a hidden code that checked by the system for

authentication purpose. After successfully match the code

with the system, users will get the access to enter into the

system otherwise it will reject the card.

CONCLUSION

The user can face so many problems during the user

authentication process if the system does not match with a

smart card of a biometric system. Use the approach of user

identification with the biometric system regarding the issues

of security and identity of the user and its system. The schema

of proposed is approved with the research paper, after the

process of user authentication. The research paper reviews

before implementing it with the system, regarding the security

issues or the privacy. As the result of analyzing the biometric

system, it makes better for the process of user authentication.

A critical problem can face regarding the protection issues of

the biometric templates. The user needs to access the template

so provide the security and welfare technologies and explore

the biometric data. The reviewed paper of the research is

working on the issues of privacy, authentication and security

to resolve it because these issues are harmful to the integrity

of the system with the reliability.

Acknowledgement

“Biometrics authentication System: Privacy and Security

Associations” research paper is written by me. Paper designed

according to template and research work. There is used the

APA referencing style

REFERENCES

[1].
Alves, D. D., Cruz, G., & Vinhal, C. (2014, December).
Authentication system using behavioural biometrics through

keystroke dynamics. In
Computational Intelligence in Biometrics
and Identity Management (CIBIM), 2014 IEEE Symposium on
(pp.
181-184). IEEE.

[2].
Dong, Y., & Woodard, D. L. (2011). Eyebrow shape-based
features for biometric recognition and gender classification: A

feasibility study.

[3].
Karabat, C., & Erdogan, H. (2009, September). A cancelable
biometric hashing for the secure biometric verification system.

In
Intelligent Information Hiding and Multimedia Signal
Processing, 2009. IIH-MSP'09. Fifth International Conference

on
(pp. 1082-1085). IEEE.
3
Document Page
[4]. Kanade, S., Petrovska-Delacrétaz, D., & Dorizzi, B. (2010,
September). Generating and sharing biometrics based session keys

for secure cryptographic applications. In
Biometrics: Theory
Applications and Systems (BTAS), 2010 Fourth IEEE International

Conference on
(pp. 1-7). IEEE.
[5].
Fuksis, R., Kadikis, A., & Greitans, M. (2011, November).
Biohashing and fusion of palmprint and palm vein biometric data.

In
Hand-Based Biometrics (ICHB), 2011 International Conference
on
(pp. 1-6). IEEE.
[6].
Adhinagara, Y., Agung, B. T., & Novi, D. R. (2011, July).
Implementation of multimodal biometrics recognition system

combined palm print and palm geometry features. In
Electrical
Engineering and Informatics (ICEEI), 2011 International

Conference on
(pp. 1-5). IEEE.
[7].
Scherhaufl, M., Pichler, M., & Stelzer, A. (2014, April).
Localization of passive UHF RFID tags based on inverse synthetic

apertures. In
RFID (IEEE RFID), 2014 IEEE International
Conference on
(pp. 82-88). IEEE.
4
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]