Abstract
This chapter focuses on the biometric authentication process which helps to prevent unauthorized access to computing resources. This chapter focuses on the biometric authentication process which helps to prevent unauthorized access to computing resources. First, biometric authentication steps are discussed, and then the performance of each biometric modality is illustrated. Next sections provide details of physiological and behavioral biometrics along with the available applications where these authentication techniques are in wide used. The last section of the chapter discusses different known attacks of biometric systems along with possible remedies for each of them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The International Biometric Society website. http://www.biometricsociety.org/
Ricanek K (2013) The next biometric challenge: medical alterations. Computer 46:94–96. doi:10.1109/MC.2013.329
Ashbourn J (2014) Biometrics: advanced identity verification: the complete guide. Springer, Berlin
Jain AK (2008) Biometric authentication. Scholarpedia 3(6):3716
Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer Science & Business Media, Berlin
Vielhauer C (2005) Biometric user authentication for IT security from fundamentals to handwriting, vol 18. Springer, Berlin (2005)
Johnson B, Maillart T, Chuang J (2014) My thoughts are not your thoughts. In: proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, Adjunct Publication, ACM, pp 1329–1338
Ruiz-Blondet MV, Jin Z, Laszlo S (2016) CEREBRE: a novel method for very high accuracy event-related potential biometric identification. IEEE Trans Inf Foren Secur 11(7):1618–1629
Lucas BD, Kanade T (1981) An iterative image registration technique with an application to stereo vision. IJCAI 81:674–679
Bowyer KW, Chang KI, Yan P, Flynn PJ, Hansley E, Sarkar S (2006) Multi-modal biometrics: an overview. In second workshop on multi-modal user authentication, vol 105
Woodward JD, Orlans NM, Higgins PT (2003) Biometrics. McGraw-Hill/Osborne ISBN: 0-07-223030-4
Lipowicz A (2012) NIST tests accuracy in iris recognition for identification. Date accessed 1 Jan 2017. Url: https://fcw.com/articles/2012/04/23/nist-iris-recognition.aspx
Bartlow N (2009) Keystroke recognition. In: Encyclopedia of biometrics. Springer, US, pp 877–882
Bartlow N, Cukic B (2006) Evaluating the reliability of credential hardening through keystroke dynamics. In: null, IEEE, pp 117–126
BenAbdelkader C, Cutler R, Nanda H, Davis L (2001) Eigengait: motion-based recognition of people using image self-similarity. In: audio-and video-based biometric person authentication, Springer, Berlin, Heidelberg, pp 284–294
Ng H, Ton HL, Tan WH, Yap TTV, Chong PF, Abdullah J (2011) Human identification based on extracted gait features. Int J New Comput Architect Appl (IJNCAA) 1(2) 358–370
Blum RS, Liu Z (eds) (2005) Multi-sensor image fusion and its applications. CRC press
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4–20
Golfarelli M, Maio D, Malton D (1997) On the error-reject trade-off in biometric verification systems. IEEE Trans Pattern Anal Mach Intell 19(7):786–796
den Os E, Jongebloed H, Stijsiger A, Boves (1999) Speaker verification as a user-friendly access for the visually impaired. In: EUROSPEECH
Harrison WR (1981) Suspect documents, their scientific examination. Nelson-Hall, Chicago, IL
Eriksson A, Wretling P (1997) How flexible is the human voice?–a case study of mimicry. Target 30(43.20):29–90
Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002) Impact of artificial gummy fingers on fingerprint systems. In: Electronic imaging. International Society for Optics and Photonics, pp 275–289
Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In audio-and video-based biometric person authentication, Springer, Berlin, Heidelbergpp, pp 223–228.
Ambalakat P (2005) Security of biometric authentication systems. In: 21st computer science seminar, SA1-T1, pp 1–7
Matyáš V, ŘÃha Z (2010) Security of biometric authentication systems. In: international conference on computer information systems and industrial management applications (CISIM), IEEE, pp 19–28
Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Machine Intell 25(11):1494–1498
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Waldmann U, Scheuermann D, Eckert C (2004) Protected transmission of biometric user authentication data for oncard-matching. In: Proceedings of the ACM symposium on applied computing, ACM, pp 425–430
Ross A, Jain AK (2004) Multimodal biometrics: an overview. In: 2004 12th European Conference on Signal Processing, IEEE, pp 1221–1224
Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer Science & Business Media, Berlin
Zhang DD (2013) Automated biometrics: technologies and systems, vol 7. Springer Science & Business Media, Berlin
Mansfield AJ, Wayman JL (2002) Best practices in testing and reporting performance of biometric devices. Centre for Mathematics and Scientific Computing, National Physical Laboratory, Teddington, Middlesex, UK
Jain AK, Chen Y, Demirkus M (2007) Pores and ridges: High-resolution fingerprint matching using level 3 features. IEEE Trans Pattern Anal Mach Intell 29(1):15–27
The thin blue line. http://www.policensw.com/info/fingerprints/finger06.html. Oct 2006
Nieuwendijk HVD (2006) Fingerprints. http://www.xs4all.nl/~dacty/minu.htm. Oct 2006
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inform Secur 1:1–25
Author information
Authors and Affiliations
Corresponding author
Appendices
Review Questions
Descriptive Questions
Q1: State four reasons to choose biometric-based authentication system.
Q2: Describe the taxonomy of biometric traits.
Q3: Difference between physiological and behavioral biometrics.
Q4: Describe the biometric authentication process.
Q5: What are different performance metrics used for biometric authentication? What is the most dominant error rate in biometrics?
Q6: Describe a few applications that use biometric-based authentication.
Q7: What are the drawbacks of a biometric system? Describe any two of them.
Q8: What are the possible attack points of a biometric authentication system? Illustrate with diagram.
Q9: What is liveness? Describe a process of liveness detection mechanism for biometric systems.
Q10: Distinguish between the following:
-
(a)
Behavioral and Physiological biometric
-
(b)
Soft biometrics and actual biometric
-
(c)
Liveness detection and watermarking technique
-
(d)
Unimodal biometric and multimodal biometric.
Multiple Choice Questions
Question 1:
A company is looking into adding biometric scanners to their building for added security. Which option would NOT be a good idea?
-
A.
Facial recognition
-
B.
Weight recognition
-
C.
Gait recognition
-
D.
None of the above
Question 2:
Which of the following does not use behavioral characteristics of users for authentication?
-
A.
Voice
-
B.
Signature
-
C.
Veins
-
D.
Keystrokes
Question 3:
Jason is the type of person who does not like to give out his personal information and is overly suspicious of other people. What would be the best authentication type for Jason?
-
A.
Cognitive-based Authentication
-
B.
Token-based Authentication
-
C.
Biometric-based Authentication
-
D.
Any of the above
Question 4:
What is true for equal error rate?
-
A.
Lower the error rate, higher the accuracy
-
B.
Higher false positive make lower equal error rate.
-
C.
Lower false negative make higher equal error rate.
-
D.
None of the above.
Question 5:
In which of the following biometrics, will the most sophisticated camera be used to capture the biometrics?
-
A.
Face recognition
-
B.
Fingerprint recognition.
-
C.
Iris recognition
-
D.
Retina recognition
Question 6:
Which biometric has higher universality?
-
A.
Face recognition
-
B.
Hand Geometry
-
C.
Signature
-
D.
Voice
Question 7:
Which biometric has lower distinctiveness?
-
A.
Face
-
B.
Hand Geometry
-
C.
Iris
-
D.
Fingerprint
Question 8:
Which biometric has higher performance?
-
A.
Face
-
B.
Hand Geometry
-
C.
Iris
-
D.
Signature
Question 9:
Which biometric has higher acceptability?
-
A.
Face
-
B.
Fingerprint
-
C.
Iris
-
D.
Hand Geometry
Question 10:
Which biometric has lower circumvention?
-
A.
Iris
-
B.
Face
-
C.
Fingerprint
-
D.
Signature
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Dasgupta, D., Roy, A., Nag, A. (2017). Biometric Authentication. In: Advances in User Authentication. Infosys Science Foundation Series(). Springer, Cham. https://doi.org/10.1007/978-3-319-58808-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-58808-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-58806-3
Online ISBN: 978-3-319-58808-7
eBook Packages: Computer ScienceComputer Science (R0)