ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Biometrics for Authentication: Security and Privacy Implications

Verified

Added on  2024/05/21

|4
|3167
|381
AI Summary
This research paper investigates the security and privacy implications of biometric authentication systems. It explores the challenges posed by advanced technology attacks and the need for robust security measures to protect sensitive user data. The paper proposes a two-step authentication process that combines biometric recognition with voice recognition or a secret password, aiming to enhance the security and reliability of biometric systems. It also examines various techniques for data protection, including cryptography, steganography, and smart card implementation. The research highlights the importance of addressing privacy concerns related to biometric data collection and storage, emphasizing the need for secure data transmission and access control mechanisms. The paper concludes by presenting a proposed design for a more secure and privacy-aware biometric authentication system.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
ITC595 Research Project
Biometrics for authentication: Security and
Privacy Implications
ABSTRACT Biometric is a system that is work on the personal
recognition structures that are either determine or confirm the
personal identity of the individual requesting services. Current time,
Biometric system has a number of authentications challenge due to
advanced technology attacks which affect the reliability and
integrity of whole Biometric Systems. Many Organization is used the
Biometric systems for the Verifications process that is beneficially
for the organization compare than traditional systems. In the
traditional systems, the system is used Password and Identification
card for the organization information security But currently, the
organization uses the Biometric system that is access Individual
person for the authentication purpose. The research paper main
purpose is to search the Biometric System Authentication process
with Privacy and Security that are Implications in the real time.
Paper also focuses on two-step authentication process for a
biometric system which helps the resolved security issues that are
existing biometric system and provide the secure authentication
process for the organization (Ross et al., 2004).
Keywords identification, Biometrics, verification, Encryption Algorithm,
multimodal biometrics, recognition
INTRODUCTION
Biometric system is a system that is used advanced technology
with human information such as biological organism to
recognize the particular human. It is easily the person because
each person has unique biological traits. For the identification
process, Biometric system used the algorithms to work on the
data. It offers the convenience and security against the
personal recognition traditional methods. Traditional methods
use Password based mechanism for the user authentication.
But the Biometric systems are used advanced technology that
fasts discovery of the person and producing authentication
system that is secure.
Biometric system is faced security problem because it
discloses user sensitive information such as sex, Medical
Conditions, or race. Each person personalities are unique and
permanent so Biometric data of the person is unique and
permanent which are stored in the Biometric system. If
someone is stolen the Biometric data details, then they are
able to access the user sensitive information. So there are
needed to protect the Biometric data otherwise it created the
major issue in the organization. In the Literature Evaluation
Segment, there are review the serval paper which is
concerned about the Biometric Systems security modification.
Research paper purpose is offered correct user Identification
and resolved the finger detection and vein based security
issue. Biometric System is also working with IoT to resolve
securities problems such as unauthorized access to the
secured areas and illegal data breaching. Illegal data breaching
occurs in the Biometric System when data is transferred from
one system to another for storing purpose. It is a Biometric
Security concerns (Chellappa et al., 2015).
Figure 1: Possible attack point of the Biometric system
According to (Chellappa et al., 2015), figure1 is shown all
possible attack on Biometric system which affects the system
security and privacy.
A. Research Problem
This research paper is focused on the Biometric system
authentication problem. During the authentication
process, Biometric system needs the Security and Privacy
suggestion that gives Biometric data security. The research
paper will be focused on the security issue which is related
authentication process and real-time system. Privacy issue
may affect the Integrity, and Reliability of the Biometric
system. Privacy and security issue is decreased system
versatility and create a problem during user
authentication. There is a chance identity fake person
through the Biometric system. The research paper is
justified Biometric research Problem which is reviewing
with the help of two-step authentication process. This
process is included the voice recognition process and
password in the biometric factor. Research gap is analysis
through the fake person identify rate.
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Figure 2: Fingerprint Accuracy and Fake Positive rate
B. Research Justification
The research paper is mainly focused on the Biometric
Matching process in the user authentication process.
Biometric system allows the user remote access. It helps to
user to access the data anywhere anytime. IoT (Internet of
Things) are implemented in the Biometric system. IoT
implemented Biometric system manage the remote user
through the automated system because it helps in the
reorganizations process in the Biometric system. Paper is the
main focus on the Biometric Authentication. It also studies the
data storing during Biometric Authentication with user remote
location. It will discuss effects of Biometric data on the system
during the Authentication and remote access. This research
paper will be given the suggestion for the Biometric that help
in resolving the security issue.
Table 1: Issue of biometrics features
Biomet
ric
Feature
ID
Durabil
ity
Distinguisha
bility
Performa
nce
Collectab
ility
Fingerp
rint
High Medium High Medium
Signatu
re
Mediu
m
Low Medium High
DNA High High High Low
Odour High High Low Medium
Ear High Medium Low Medium
Palm
Print
High High High Medium
Hand
Geomet
ry
Mediu
m
Medium Medium High
Voice High High Medium Medium
IRIS High High High Medium
Face Mediu
m
High High High
In the above table, the research paper will be focused on the
Biometric Feature ID with Durability, Distinguishability,
Performance, and Collectability. It represents the Issue of
biometrics features which are high, Low, Medium. This table
would help to search the finest technique that can give
security and privacy in the Biometric system. It gives a two-
step authentication process for the Biometric system that
offered efficiency, reliability, and integrity without a common
security issue. This authentication process makes the trust
system for the user.
LITERATURE REVIEW
In the paper, Biometric system has collected the user
Biometric data such as voice, face Image, Fingerprints, and Iris
Data for the user recognition. According to the paper,
Biometric model is Extract the soft Biometric features that are
enhancing the privacy issue in the system during the
authentication process. There are designed a technique that
helps in the understanding the face image that is able to
understand the user gender through the Gender Classifier. It
does not affect the face matcher attribute. The proposed
technique takes an image as input, and processed the image
and gave the output as gender attribute Classifier. The
following process did not affect the Biometric matching
technique. Proposed technique also used Experimental
Procedure that makes a special efficient plan that would be
able to handle Gender Privacy issues. Biometric system
analysis user Biometric features which are shown in the table
1 content. In the table, there are used the biometric ID which
reduces the process of the system and gave the reliable and
effective method that can easily recognize the user during the
process (Verschae, Ruiz-del-Solar, & Correa,2006).
In the research paper, there are designed a Biometric hashing
technique that is used for the biometric verification in the
previous year. biometric verification method is combined with
two-factor authentication procedure which contained a
hidden password with any factor of biometric that could be
able to implement a better biometric system and also make a
better authentication for the Biometric system
implementation. In the research paper, there are used four
methods that are used in image biometric feature reconstruct
with the help hash technique and another technique. These
techniques are able to fetch biometric data from the system
database. During the image feathers reconstruction, there
used two methods which used 1-bit compression outline
because image Reconstruction is used the sensing signal. It
worked on the privacy attacks which occur during the
reconstructed image from the innovative image and also
protected from an unauthorized user. Reconstructed image
used the Secret password with a biometric factor that created
a trust and reliable system that are implemented at the high
level in the system. A proposed technique designed a system
which is not able to log in if there are any missing or wrong
authentication factors. But there is an issue in the proposed
with a hidden password when it stored one place to another
place in the system because the attacker is intercepted and
access the password (Cappelli, Maio, Lumini, & Maltoni, 2007).
2
Document Page
In the research paper, Biometric system needs a method for
the secure data transmission that gives an effective solution
for the system so there is used the Cryptographic with an
important entity of process. Cryptography key is used in the
process which is 256 bits that are hard to creak by an attacker.
There are used encryption and decryption for the
Cryptographic process. The cryptographic key is stored in the
system database where security issues are minimal. It used by
the receiver and sender during the communication process in
the Biometric system. It must be kept the private otherwise
create the security issue. It resolved the data line security
issue during the communication process from source to
destination in the Biometric authentication process. It gave a
secure communication on the system. In the research paper,
there is introduced a new technique that is able creating a
cryptography key which works on cancelable fingerprint
methodology. It gave a template for the sender and receiver
(work as communicating parties in the system). It used
Steganography technique which is a key-based technique.
Through the Steganography technique, an image is produced
with the help of key based encryption which is able to
generate an effective system for authentication of the user. It
can be used in our proposed design. Steganography method is
used with two-step authentication which will be able to design
the effective system. It will help the resolve the privacy and
security concerns of the Biometric system (Uludag, Pankanti,
Prabhakar, S., & Jain, 2004).
Biometric Systems need a method implementation that are
resolved the Privacy and security Implications because it is a
critical issue in the Biometric Systems. In the research paper,
there is proposed a designed such as binary Biohash Vector for
the given subject. It is able to convert the parameter to a
nearby estimate that helped in presenting the original features
of the system that are used for the Biometric process because
it could be able recovered original features and resolve
optimization problem. Biometric database is also stored the
unrelated data of Biometric features which are the individual
resolution of Optimization. binary Biohash Vector contains
some isolated Biometric Features ( stored in the database).
The proposed approach will be searched the vector feature of
the system that will be able searched min Euclidean Distance
between new vectors through consistency Criteria. A hash
function is used by the Biohash technique which gave a unique
and specific function for each user authentication process in
the Biometric Systems which would be able to design a
Biometric Systems that is energy efficient at the high level.
There are shown two graphs. One is between energy
distribution and PCA Coefficients and second is between
Frequency Distribution and PCA Coefficients (Teoh, Kuan, &
Lee,2008)..
.
Biometrics system also works on the access control that gave a
solution for Smart city management. There is also occur the
issue during the data transmission because user needed the
medias meaning access which are provided by the system
sever. the Server is stored the Biometric data value which
needed for user authentication. When the user stored the
data on Biometric System during the registration process. In
the research paper, there is a proposed an approach for
Biometrics system to resolve the Current Problem of the
system. Smart-cards can be implemented in the system which
helps the resolving data transmission and access problem in
the system. The proposed system used the Palm-print
technique for the user Identifying process because it is a long-
term authentication technique that gives a highly reliable
result for the system. The proposed design used some
approaches such as False Acceptance Rate (FAR) and False
Rejection Rate (FRR) (Lu, Zhang, & Wang, 2003). These are
enhancing the translation process during the palm-codes
matching (left, Up, Right, and Down). these approaches give
significant results for the system. Proposed designed are use
Acceptance Threshold Verification approach for the data
storage on the smart-card because it decreased the execution
time and achieved the low level for the FAR and FRR. It
enhanced the system performance. There are shown the basic
process on the smart-card that discovers the data and stored
in the system. In the proposed system, first of all, Image or
data are Acquainted. After that, there are retrieved the
Biometric details with the help of the Template or HashCode.
In the end, the retrieved information is stored on the Smart
Card. It resolved the data transmission and storing issue in the
Biometric system (L Doyle, Hind, & Peters, 2002).
Figure 3: a smart card with Biometrics system
Figure 4: Threshold result with FAR and FRR
PROPOSED DESIGN
In this research paper, two-step authentication is proposed for
the Biometric authentication that gives a better authentication
for the user and also works on the system Privacy concern and
will be able to resolve these concerns form the system. The
proposed design will be worked on obtaining biometric data
3
Document Page
which is able to enhance the system efficiency, Integrity, and
Reliability. There will be used the smart card during the user
authentication because it is stored the obtaining biometric
data. Afterward Phase, Biometric authentication system will
be using the Voice Recognition system or Secret Password for
the authentication process because it can be found the legit
user for the system. There will be designed a better Biometric
Authentication system through this Implementation schema.
The whole procedure might support in decreasing the basic
security and Privacy concern for the Biometric system and
their Data. The proposed design will be tried to eliminate the
Biometric system research gaps that are found during the
previous research of the system
Figure 5: Proposed design
Figure 6:
The proposed design will be the solution for user
authentication that is implemented on the Biometric System. It
is acquiring the Biometric data and image for particular image.
After the converted and Extracted data, it will be changed into
template and code and saved the data. When person enters
their smart card in the biometric system then there will be
checked the information and compare the system and card
information. In the end, there is asked a hidden password. If the
password match user is allowed the access and otherwise not
allowed.
CONCLUSION
Biometric system has faced the trouble in the user
authentication process when the user put wrong hand on the
Biometric system because it is not able not to detect the
Biometric data and the user also faces the problem. Biometric
system is work on the unique Identification of user approach
but there are some security and identity-related serious
concern for the user. In the research paper, proposed a
schema which through user authentication is made more legit.
Furthermore, the research paper is reviewed papers to
purpose a system for the Biometric authentication that is
more secure, and offer privacy. So there is an analysis the
current Biometric authentication system for the better system.
Biometric templates are also faced protection issue which is a
critical problem. It needs the protection through the welfare
and biometric technologies and also makes sure that system is
accessed only authorized users. The sometime
unauthenticated user is tried to access the system and
eavesdropped or explored Biometric system data. The
reviewed paper is worked on the security, privacy, and
authentication issues in the Biometric system. But still, there
are some security issues which are able to harm the Biometric
systems Integrity, Reliability, and security.
ACKNOWLEDGMENT
Here, I have written the research paper on the “Biometrics for
authentication: security and privacy implications”. I have work
according to give a template and with original research work.
In the end, I used the APA referencing style for the research
paper.
REFERENCES
[1]. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to
biometric recognition. IEEE Transactions on circuits and systems for
video technology, 14(1), 4-20.
[2]. Chellappa, R , Patel, V. M., &.Ratha, N. K., (2015). Cancelable
biometrics: A review. IEEE Signal Processing Magazine, 32(5), 54-
65.
[3]. Lu, G., Zhang, D., & Wang, K. (2003). Palmprint recognition using
eigenpalms features. Pattern Recognition Letters, 24(9-10), 1463-
1467.
[4]. Doyle, R., Hind, J., & Peters, M. (2002). U.S. Patent Application No.
09/764,844.
[5]. Teoh, A. B., Kuan, Y. W., & Lee, S. (2008). Cancellable biometrics
and annotations on biohash. Pattern recognition, 41(6), 2034-2044.
[6]. Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K. (2004).
Biometric cryptosystems: issues and challenges. Proceedings of the
IEEE, 92(6), 948-960.
[7]. Cappelli, R., Maio, D., Lumini, A., & Maltoni, D. (2007). Fingerprint
image reconstruction from standard templates. IEEE transactions
on pattern analysis and machine intelligence, 29(9).
[8]. Verschae, R., Ruiz-del-Solar, J., & Correa, M. (2006), Gender
classification of faces using adaboost. In Iberoamerican Congress
on Pattern Recognition (pp. 68-78).
4
1 out of 4
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]