logo

(PDF) Biometric Authentication: A Review

   

Added on  2021-05-30

7 Pages1404 Words100 Views
 | 
 | 
 | 
Running Head: BIOMETRICS FOR AUNTHENTICATION 1Biometrics for Authentication: Security and Privacy ImplicationsNAMECOURSEUNIVERSITY/AFFILIATION
(PDF) Biometric Authentication: A Review_1

BIOMETRICS FOR AUNTHENTICATION 2Abstract Biometric is associated with human body parts such as the eyes. These parts are used to protect biometric systems against attacks and unauthorized access. Examples of biometric technology include fingerprint scanning and voice recognition. However, biometric technology isvulnerable to attacks. For instance, an attacker can retrieve the photos of the users of the system from the social media that can be used as credentials of gaining access to the system without the knowledge of the user. Besides, an attacker can log in to the biometric systems using the videos which are taken by the camera. Consequently, Ratha developed a fingerprint template that’s usedto reduce the vulnerability of biometric systems. Introduction Security is the process of protecting information and data against attacks and unauthorized access while privacy is associated with some sort of freedom that one is given to carry out his/her own activities. Currently, protecting a system against attacks has become a big issue because of the development in technology. There are three ways of protecting information against attacks which include encryption, authorization and authentication. Authentication is used to identify the correct user of the system by matching the information provided with the ones that have already been saved in the database. On the other hand, authorization is the processof controlling the type of information or files that a certain user can access. This paper will focusmuch on authentication using biometrics. Basically, biometric as a method of data authenticationis associated with the parts of human body. Fingerprint scanning, retina and voice recognition aresome of the examples of biometrics Kumar et al (2017). The aim of this paper is to discuss how biometric technology has enhanced privacy and security in modern systems. Besides, it also discusses the security issues that are associated with biometric technology.
(PDF) Biometric Authentication: A Review_2

BIOMETRICS FOR AUNTHENTICATION 3Security IssuesFace Recognition Attacks The intruder can provide incorrect information to the system with an aim of gaining access to the system without the knowledge of the user. This is referred to as spoofing attack. This is very common to the systems that uses face recognition for authentication. The intruder can obtain the photos of the user of the system from social media platforms such as WhatsApp, Facebook and Instagram Kumar et al (2017). The photos can also be retrieved from the videos. These videos can be taken by the intruder using the camera. Video attacks is one of the most developed form of face spooning attacks. These photos can then be used by the intruder as credentials of gaining access to the system. Similarly, face recognition is also vulnerable to 3D mask attacks though it’s not very common. In this type of attack, the intruder creates a series of masks of the user’s photos making it hard for the system to differentiate the real photos from the faked photos ,Kumar et al (2017).Literature Review There have been some investigations going on regarding biometric technology attacks for the past 15 years, Kumar et al (2017). These investigations focused much on the ways that should be used to protect biometric systems from attacks and the time taken by a biometric system to verify a user. In addition, these investigations also concentrated on the way of developing biometric systems. Three methods that were used during the research include sensor based, features based, and score based, Kumar et al (2017). There was an introduction to an algorithm that was extremely sensitive to examine user’s credentials such as photos in 2006. Thisalgorithm was described by Gang Pan Et al. [36]. Webcam was the only tool that was used to
(PDF) Biometric Authentication: A Review_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Assignment on Evaluating Biometrics in Security
|9
|1957
|23

Smart home automation by bio metrics
|8
|2308
|26

Biometrics Authentication System: Privacy and Security Associations
|4
|2397
|213

The Concept Of Biometric Authentication
|35
|10751
|12

Enhanced Biometric Authentication for Secure Access Control
|4
|628
|304

Biometrics for authentication: security and privacy implications
|10
|2310
|472