Skip to main content

Biometric Authentication

Authentication through human characteristics

  • Chapter
  • First Online:
Advances in User Authentication

Part of the book series: Infosys Science Foundation Series ((ISFSASE))

Abstract

This chapter focuses on the biometric authentication process which helps to prevent unauthorized access to computing resources. This chapter focuses on the biometric authentication process which helps to prevent unauthorized access to computing resources. First, biometric authentication steps are discussed, and then the performance of each biometric modality is illustrated. Next sections provide details of physiological and behavioral biometrics along with the available applications where these authentication techniques are in wide used. The last section of the chapter discusses different known attacks of biometric systems along with possible remedies for each of them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The International Biometric Society website. http://www.biometricsociety.org/

  2. Ricanek K (2013) The next biometric challenge: medical alterations. Computer 46:94–96. doi:10.1109/MC.2013.329

  3. Ashbourn J (2014) Biometrics: advanced identity verification: the complete guide. Springer, Berlin

    Google Scholar 

  4. Jain AK (2008) Biometric authentication. Scholarpedia 3(6):3716

    Google Scholar 

  5. Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer Science & Business Media, Berlin

    Google Scholar 

  6. Vielhauer C (2005) Biometric user authentication for IT security from fundamentals to handwriting, vol 18. Springer, Berlin (2005)

    Google Scholar 

  7. Johnson B, Maillart T, Chuang J (2014) My thoughts are not your thoughts. In: proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, Adjunct Publication, ACM, pp 1329–1338

    Google Scholar 

  8. Ruiz-Blondet MV, Jin Z, Laszlo S (2016) CEREBRE: a novel method for very high accuracy event-related potential biometric identification. IEEE Trans Inf Foren Secur 11(7):1618–1629

    Google Scholar 

  9. Lucas BD, Kanade T (1981) An iterative image registration technique with an application to stereo vision. IJCAI 81:674–679

    Google Scholar 

  10. Bowyer KW, Chang KI, Yan P, Flynn PJ, Hansley E, Sarkar S (2006) Multi-modal biometrics: an overview. In second workshop on multi-modal user authentication, vol 105

    Google Scholar 

  11. Woodward JD, Orlans NM, Higgins PT (2003) Biometrics. McGraw-Hill/Osborne ISBN: 0-07-223030-4

    Google Scholar 

  12. Lipowicz A (2012) NIST tests accuracy in iris recognition for identification. Date accessed 1 Jan 2017. Url: https://fcw.com/articles/2012/04/23/nist-iris-recognition.aspx

  13. Bartlow N (2009) Keystroke recognition. In: Encyclopedia of biometrics. Springer, US, pp 877–882

    Google Scholar 

  14. Bartlow N, Cukic B (2006) Evaluating the reliability of credential hardening through keystroke dynamics. In: null, IEEE, pp 117–126

    Google Scholar 

  15. BenAbdelkader C, Cutler R, Nanda H, Davis L (2001) Eigengait: motion-based recognition of people using image self-similarity. In: audio-and video-based biometric person authentication, Springer, Berlin, Heidelberg, pp 284–294

    Google Scholar 

  16. Ng H, Ton HL, Tan WH, Yap TTV, Chong PF, Abdullah J (2011) Human identification based on extracted gait features. Int J New Comput Architect Appl (IJNCAA) 1(2) 358–370

    Google Scholar 

  17. Blum RS, Liu Z (eds) (2005) Multi-sensor image fusion and its applications. CRC press

    Google Scholar 

  18. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circ Syst Video Technol 14(1):4–20

    Google Scholar 

  19. Golfarelli M, Maio D, Malton D (1997) On the error-reject trade-off in biometric verification systems. IEEE Trans Pattern Anal Mach Intell 19(7):786–796

    Google Scholar 

  20. den Os E, Jongebloed H, Stijsiger A, Boves (1999) Speaker verification as a user-friendly access for the visually impaired. In: EUROSPEECH

    Google Scholar 

  21. Harrison WR (1981) Suspect documents, their scientific examination. Nelson-Hall, Chicago, IL

    Google Scholar 

  22. Eriksson A, Wretling P (1997) How flexible is the human voice?–a case study of mimicry. Target 30(43.20):29–90

    Google Scholar 

  23. Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002) Impact of artificial gummy fingers on fingerprint systems. In: Electronic imaging. International Society for Optics and Photonics, pp 275–289

    Google Scholar 

  24. Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In audio-and video-based biometric person authentication, Springer, Berlin, Heidelbergpp, pp 223–228.

    Google Scholar 

  25. Ambalakat P (2005) Security of biometric authentication systems. In: 21st computer science seminar, SA1-T1, pp 1–7

    Google Scholar 

  26. Matyáš V, Říha Z (2010) Security of biometric authentication systems. In: international conference on computer information systems and industrial management applications (CISIM), IEEE, pp 19–28

    Google Scholar 

  27. Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Machine Intell 25(11):1494–1498

    Google Scholar 

  28. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Google Scholar 

  29. Waldmann U, Scheuermann D, Eckert C (2004) Protected transmission of biometric user authentication data for oncard-matching. In: Proceedings of the ACM symposium on applied computing, ACM, pp 425–430

    Google Scholar 

  30. Ross A, Jain AK (2004) Multimodal biometrics: an overview. In: 2004 12th European Conference on Signal Processing, IEEE, pp 1221–1224

    Google Scholar 

  31. Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer Science & Business Media, Berlin

    Google Scholar 

  32. Zhang DD (2013) Automated biometrics: technologies and systems, vol 7. Springer Science & Business Media, Berlin

    Google Scholar 

  33. Mansfield AJ, Wayman JL (2002) Best practices in testing and reporting performance of biometric devices. Centre for Mathematics and Scientific Computing, National Physical Laboratory, Teddington, Middlesex, UK

    Google Scholar 

  34. Jain AK, Chen Y, Demirkus M (2007) Pores and ridges: High-resolution fingerprint matching using level 3 features. IEEE Trans Pattern Anal Mach Intell 29(1):15–27

    Google Scholar 

  35. The thin blue line. http://www.policensw.com/info/fingerprints/finger06.html. Oct 2006

  36. Nieuwendijk HVD (2006) Fingerprints. http://www.xs4all.nl/~dacty/minu.htm. Oct 2006

  37. Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inform Secur 1:1–25

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipankar Dasgupta .

Appendices

Review Questions

Descriptive Questions

Q1: State four reasons to choose biometric-based authentication system.

Q2: Describe the taxonomy of biometric traits.

Q3: Difference between physiological and behavioral biometrics.

Q4: Describe the biometric authentication process.

Q5: What are different performance metrics used for biometric authentication? What is the most dominant error rate in biometrics?

Q6: Describe a few applications that use biometric-based authentication.

Q7: What are the drawbacks of a biometric system? Describe any two of them.

Q8: What are the possible attack points of a biometric authentication system? Illustrate with diagram.

Q9: What is liveness? Describe a process of liveness detection mechanism for biometric systems.

Q10: Distinguish between the following:

  1. (a)

    Behavioral and Physiological biometric

  2. (b)

    Soft biometrics and actual biometric

  3. (c)

    Liveness detection and watermarking technique

  4. (d)

    Unimodal biometric and multimodal biometric.

Multiple Choice Questions

Question 1:

A company is looking into adding biometric scanners to their building for added security. Which option would NOT be a good idea?

  1. A.

    Facial recognition

  2. B.

    Weight recognition

  3. C.

    Gait recognition

  4. D.

    None of the above

Question 2:

Which of the following does not use behavioral characteristics of users for authentication?

  1. A.

    Voice

  2. B.

    Signature

  3. C.

    Veins

  4. D.

    Keystrokes

Question 3:

Jason is the type of person who does not like to give out his personal information and is overly suspicious of other people. What would be the best authentication type for Jason?

  1. A.

    Cognitive-based Authentication

  2. B.

    Token-based Authentication

  3. C.

    Biometric-based Authentication

  4. D.

    Any of the above

Question 4:

What is true for equal error rate?

  1. A.

    Lower the error rate, higher the accuracy

  2. B.

    Higher false positive make lower equal error rate.

  3. C.

    Lower false negative make higher equal error rate.

  4. D.

    None of the above.

Question 5:

In which of the following biometrics, will the most sophisticated camera be used to capture the biometrics?

  1. A.

    Face recognition

  2. B.

    Fingerprint recognition.

  3. C.

    Iris recognition

  4. D.

    Retina recognition

Question 6:

Which biometric has higher universality?

  1. A.

    Face recognition

  2. B.

    Hand Geometry

  3. C.

    Signature

  4. D.

    Voice

Question 7:

Which biometric has lower distinctiveness?

  1. A.

    Face

  2. B.

    Hand Geometry

  3. C.

    Iris

  4. D.

    Fingerprint

Question 8:

Which biometric has higher performance?

  1. A.

    Face

  2. B.

    Hand Geometry

  3. C.

    Iris

  4. D.

    Signature

Question 9:

Which biometric has higher acceptability?

  1. A.

    Face

  2. B.

    Fingerprint

  3. C.

    Iris

  4. D.

    Hand Geometry

Question 10:

Which biometric has lower circumvention?

  1. A.

    Iris

  2. B.

    Face

  3. C.

    Fingerprint

  4. D.

    Signature

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Dasgupta, D., Roy, A., Nag, A. (2017). Biometric Authentication. In: Advances in User Authentication. Infosys Science Foundation Series(). Springer, Cham. https://doi.org/10.1007/978-3-319-58808-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58808-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58806-3

  • Online ISBN: 978-3-319-58808-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics