logo

Biometrics for Authentication: Security and Privacy Implications

   

Added on  2022-11-25

3 Pages2227 Words66 Views
Biometrics for Authentication: Security and Privacy
Implications
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT
Keywords Biometric Systems, Covert
recognition
INTRODUCTION
Biometric authentication is defined as the process of the
verification of the identity of an individual. This kind of
technique for verification ensures the verifying of identity of an
individual by focusing over several unique characteristics.
These systems meant for identifying the unique characteristics
of individuals would be able to capture the data, store them in
secure database servers and then confirm and match the data
(Haghighat, Zonouz & Abdel-Mottaleb, 2015). Based on a
perfect match over the two samples of data, the authentication
would be confirmed. In a typical process, the process of
biometric authentication could be used for the management of
access criteria to different digital and physical resources that
includes rooms, buildings and various computing devices.
The discussion in this report focuses over the ways in which
different techniques based on biometric authentication would
be useful for securing of resources. The various challenges or
problems faced by biometric authentication have also been
discussed within the report (Ghayoumi, 2015). The report also
present the future direction based on proposing some benefits
and recommendations for suing the technology.
A. Research Problem
The research focuses over the problems that are
faced by biometric authentication in dealing with
the issues of security and privacy.
B. Research Justification
The research based on the discussion over the biometric
authentication techniques could be justified by focusing over
the implications made by the technique over various areas.
LITERATURE REVIEW
Biometric Systems
A biometric system can be defined as a pattern
recognition system that has the capability to
recognize an individual based on making use of a
feature vector. This would be further derived from
the behavioral or psychological characteristic that
is possessed by the person (Ali et al., 2015). This
kind of authentication technique helps in relying
over the different forms of unique characteristics
over an individual. Depending on the type of
application context, the biometric system would
be able to operate in two different modes such as:
identification and verification.
In the identification mode, the biometric system
would be able to recognize an individual based on
searching over a particular database template for
finding a particular match (RADZI, HANI &
Bakhteri, 2016). This system then conducts a one-
to-many comparison within the database and thus
establishes the identity of the individual (Ngo,
Teoh & Hu, 2015). The main purpose of any
negative recognition is based on preventing any
authorized person to make use of multiple
identities.
On the other hand, in the verification mode, the
biometric system would be able to validate a
person based on the identification by comparing
the characteristic of the captured biometric with
the pre-stored result in the database.
(Figure 1: Block diagrams for enrolling,
verifying and identifying of samples)
(Source: Haghighat, Zonouz & Abdel-Mottaleb,
2015)
The above figure depicts the system of
biometric verification system along with an
identification system. Both of these systems are
highly needed for the task of performing user
enrollment. The enrollment module that is used
within a biometric identification system contains

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security: Biometric Authentication
|12
|3063
|323

Biometric for Authentication
|7
|3210
|268

Biometrics: Security and Privacy Implications
|8
|1780
|86

Research Project - Assignment PDF
|7
|1519
|75

Biometric Authentication: Technologies, Applications, and Recommendations
|12
|2659
|322

Fingerprinting Authentication: Methods, Matching Techniques, and Performance Evaluation
|13
|967
|462