Skip to main content

Biometric Identification System: Security and Privacy Concern

  • Chapter
  • First Online:
Artificial Intelligence for a Sustainable Industry 4.0

Abstract

Biometric system is rapidly increasing scheme replacing traditional password and manual authentication systems. Security, privacy, and accuracy are the most important aspects to be considered in developing and designing biometric arrangements. In this chapter, a comprehensive study is presented to enlighten the latest development covering aspects of improving security and privacy of biometric system. Current trends and future challenges are also outlined in this chapter. Biometric credentials are becoming popular in all concern areas as a mode of authenticating person due to the broad range advantages with comparison to traditional authentication methods. This authentication method is having the most precious bond between a user and his biometric credentials; besides this biometric system raises some serious privacy and security concerns in case its traits get compromised. This chapter presents the challenging issues that need to be taken care when designing secure and privacy concern biometric authentication protocol. It describes major threats against its security and gives directions on actions to be taken as security measures in order to design secure and privacy preserving biometric identification system. In order to improve the usability of biometric authentication system, we classify and review the current biometric system by focusing on privacy and security concern. This chapter gives overall review and information about biometric system and protects privacy in adequate manner. It discusses personal privacy in terms of adoption of biometric identification system. In present time, we talk more about frauds and insecurity in different sectors as well as the computer technologies to be applied in current trends to ecommerce, banking, etc. There are two conventional ways of identifying individual. The first one is knowledge-based method which is based on different knowledge such as PIN and password to allow user to activate services. The second method is on token-based method. It can be a piece of badge, identification paper, key, etc. Both ways are insecure as password can be forgotten or guessed by others, and in other case, badge id or other identification may be lost or stolen. Biometric attributes are an optional solution with two previous modes. The merit of using biometric features is universal, unique, measurable, and permanent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Bevan, S. Hayday, Attendance Management: A Review of Good Practice, Report 353 (Institute for Employment Studies, 1998)

    Google Scholar 

  2. K. Bredin, Human resource management in project-based organizations. 2008 – Challenges, changes, and capabilities, Doctoral thesis, Department of Management and Engineering, Linköping University, Linköping, 2008

    Google Scholar 

  3. C.S. Chikkerur, Online fingerprint verification system, An MTech thesis, Department of Electrical Engineering, and Faculty of the Graduate School of the State University of New York at Buffalo, 2005

    Google Scholar 

  4. C. Velazco, Android still most popular smartphone OS, iOS holds steady in second place (on-line), (TechCrunch web, 2011), http://techcrunch.com/2011/11/03/android-still-most-popular-os-ios-holds-steady-in-second-place/. 13 January 2013

  5. S. Capoor, Biometrics as a convenience security, Business story 1 December 2006, 48, 50. Retrieved 16 Oct 2012

    Google Scholar 

  6. D. Lauren, C. Shane, Enable a fingerprint scanner for android on the Motorola ATRIX 4G (on-line), (developer.com web, 2011), http://www.developer.com/ws/android/devices/enable-a-fingerprint-scanner-for-android-on-the-motorola-atrix-4g.html. 13 January 2013

  7. D. Robert, Human Resource Management (Heinemann Educational Publisher, 2000)

    Google Scholar 

  8. C. Dubin, Biometrics: Hands down, ID management. Security, 1 February 2011, 52, 54

    Google Scholar 

  9. J.L. Dugelay et al., Recent advantages in biometric person authentication, in ICASSP International Conference on Acoustics, Speech and Signal Processing, (Orlando, Florida, USA, 2002)

    Google Scholar 

  10. A.J. Harris, D.C. Yen, Biometric authentication: Assuring access to information. Inf. Manag. Comput. Secur. 10(1), 12–19 (2002)

    Article  Google Scholar 

  11. L. Jiexun, A. Wang, H. Chen, Identity matching using personal and social identity features. Inf. Syst. Front. 13, 101–113 (2011)

    Article  Google Scholar 

  12. S. Kreimer, Matching the right patient to the right record. Hospitals & Health Networks, November 1, 12 (2010). Retrieved 17 Dec 2011

    Google Scholar 

  13. D.A. McKeehan, Attendance Management Program (The City of Pleasanton, Human Resources, 2002)

    Google Scholar 

  14. B.M. Mehtre, Fingerprint image analysis for automatic identification. Mach. Vis. Appl. 6(2), 124–139 (1993)

    Article  Google Scholar 

  15. NSTCS, Biometrics technologies (National Science and Technology Council Subcommittee on Biometrics, 2006). Retrieved 2 July 2012

    Google Scholar 

  16. G.C. Ononiwu, G.N. Okorafor, Radio frequency identification (RFID) based attendance system with automatic door unit. Acad. Res. Int. 2(2) (March 2012)

    Google Scholar 

  17. J.K. Ravi, B. Raja, K.R. Venugopal, Fingerprint recognition using minutia score matching. Int. J. Eng. Sci. Technol. 1(2), 35–42 (2009)

    Google Scholar 

  18. F. Sandi Rodiyansyah, rsitektur Sistem Operasi Android (online), (ducnologyweb, 2011), http://educnology.web.id/opensource/rodiyansyah/arsitektur-sistem-operasi-android. 14 Januari 2013

  19. V. Shehu, A. Dika, Using real time computer vision algorithms in automatic attendance management systems, in Proceedings of the ITI 2010 32nd International Conference on Information Technology Interfaces, June 21–24, 2010, (Caveat, Croatia, 2011)

    Google Scholar 

  20. O. Shoewu, O.M. Olaniyi, A. Lawson, Embedded computer-based lecture attendance management system. Afr. J. Comput. ICT 4(3), 27–36 (2011)

    Google Scholar 

  21. L. Tyler, AuthenTec releases SDK for fingerprint sensor applications on Android phones (on-line), (Ubergizmo web, 2011), http://www.ubergizmo.com/2011/08/authentec-releases-sdk-for-fingerprint-sensor-applications-on-android-phones/. 13 Januari 2013

  22. Woodward, J.D., et al., Army Biometric Applications: Identifying and Addressing Sociocultural Concerns. 2001

    Google Scholar 

  23. D. Kresimir, M. Grgic, A survey of biometric recognition methods, in International Symposium Electronics in Marine, ELMAR-2004, (2004)

    Google Scholar 

  24. Z. Rui, Y. Zheng, A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE Access 99, 1 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Vikram Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, G., Bhardwaj, G., Singh, S.V., Garg, V. (2021). Biometric Identification System: Security and Privacy Concern. In: Awasthi, S., Travieso-González, C.M., Sanyal, G., Kumar Singh, D. (eds) Artificial Intelligence for a Sustainable Industry 4.0. Springer, Cham. https://doi.org/10.1007/978-3-030-77070-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-77070-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-77069-3

  • Online ISBN: 978-3-030-77070-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics