Skip to main content

Multimodal Biometric Systems, its Security Issues, Research Challenges and Countermeasures—Technical Review

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 311))

Abstract

A biometric system is an amalgamation of algorithms that uses an individual’s unique biological data innate physical features (fingerprints, retina, face, ears, etc.) or behavioural features (signature, voice, keystroke dynamics, etc.) or both to authenticate the individual. This essentially makes a biometric system function as a pattern recognition system that helps an individual in any kind of adversarial environment. Hence, like any conventional authentication system, it is vulnerable to the attacks of malicious adversaries that try to manipulate the data and thus decline the security of the system by compromising its robustness. These possible attacks have not been considered while developing most biometric authentication systems. Our work describes multimodal biometrics, its feature extraction methods, research challenges and focuses on the major security issues in both unimodal and multimodal biometric systems. This paper summarizes some robust multimodal systems, their countermeasures and algorithms that have been devised to tackle these security challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S.G. Bhable, A survey of security of multimodal biometric systems. Int. Journal of Eng. Res. Appl. 5(12), 67–72 (Part—4) (Dec 2015) ISSN: 2248-9622

    Google Scholar 

  2. A.K. Jain, A.A. Ross, K. Nandakumar, Introduction to biometrics. ISBN 978–0–387–77325–4, DOI https://doi.org/10.1007/978-0-387-77326-1, (Springer, New York, Dordrecht, Heidelberg, London)

  3. I.G. Damousis, S. Argyropoulos, Four machine learning algorithms for biometrics fusion: A comparative study. Appl. Comput. Intell. Soft Comput. 2012, Article ID 242401, 7 (2012) https://doi.org/10.1155/2012/242401

  4. M. Hammad, Y. Liu, K. Wang, Multimodal biometric authentication systems using convolution neural network based on different level fusion of ecg and fingerprint. IEEE Access 7, 26527–26542 (2019). https://doi.org/10.1109/ACCESS.2018.2886573

    Article  Google Scholar 

  5. I. Rida, N. Al-Maadeed, S. Al-Maadeed et al., A comprehensive overview of feature representation for biometric recognition. Multimed. Tools Appl. 79, 4867–4890 (2020). https://doi.org/10.1007/s11042-018-6808-5

    Article  Google Scholar 

  6. D. De Ridder, R.P. Duin, J. Kittler J, Texture description by independent components, in Structural, Syntactic, and Statistical Pattern Recognition (Springer, 2002), pp 587–596

    Google Scholar 

  7. J. Wang, Laplacian eigenmaps, in Geometric Structure of High-Dimensional Data and Dimensionality Reduction (Springer, Berlin, Heidelberg, 2012). https://doi.org/10.1007/978-3-642-27497-8_12

  8. S. Bashir, S. Sofi, S. Aggarwal, S. Singhal, Unimodal & multimodal biometric recognition techniques a survey. IJCSN Int. J. Compute. Sci. Netw. 4(1) (Feb 2015)

    Google Scholar 

  9. M.D. Garris, C.I. Watson, C.L. Wilson, Matching performance for the US- Visit IDENT system using flat fingerprints. Technical report, 7110, National Institute of Standards and Technology (NIST) (July 2004)

    Google Scholar 

  10. B. Biggio, Adversarial pattern classification. PhD thesis, University of Cagliari, Cagliari (Italy) (2010)

    Google Scholar 

  11. C. Wilson, A.R. Hicklin, M. Bone, H. Korves, P. Grother, B. Ulery, R. Micheals, M. Zoepfl, S. Otto, C. Watson, Fingerprint vendor technology evaluation 2003: Summary of results and analysis report. Technical Report NISTIR 7123, National Institute of Standards and Technology (NIST) (June 2004)

    Google Scholar 

  12. E. Maiorana, G.E. Hine, P. Campisi, Hill-climbing attacks on multibiometrics recognition systems. IEEE Trans. Inf. Forensics Secur. 10(5), 900–915 (2015)

    Article  Google Scholar 

  13. R. Tolosana, M. Gomez-Barrero, C. Busch, J. Ortega-Garcia, Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans. Inf. Forensics Secur. 15, 1261–1275 (2020)

    Article  Google Scholar 

  14. U. Scherhag et al., Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting, in 2017 International Conference of the Biometrics Special Interest Group (BIOSIG) (Darmstadt, 2017), pp. 1–7

    Google Scholar 

  15. U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt, C. Busch, Face recognition systems under morphing attacks: a survey. IEEE Access 7, 23012–23026 (2019)

    Article  Google Scholar 

  16. M. Gomez-Barrero, J. Galbally, Reversing the irreversible: a survey on inverse biometrics. Comput. Secur. 90, 101700 (2020), ISSN 0167-4048

    Google Scholar 

  17. I. Hazan, O. Margalit, L. Rokach, Securing keystroke dynamics from replay attacks. Appl. Soft Comput. 85, 105798 (2019), ISSN 1568-4946

    Google Scholar 

  18. R.K. Das, H. Li, Instantaneous phase and excitation source features for detection of replay attacks, in 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) (Honolulu, HI, USA, 2018), pp. 1030–1037

    Google Scholar 

  19. J. Galbally, A new Foe in biometrics: A narrative review of side-channel attacks. Comput. Secur. 96, 101902 (2020)

    Google Scholar 

  20. O. Delgado-Mohatar, J. Fierrez, R. Tolosana, R. Vera-Rodriguez, Blockchain and Applications, Vol. 1010, ISBN: 978-3-030-23812-4

    Google Scholar 

  21. M.A. Acquah, N. Chen, J.-S. Pan, H.-M. Yang, B. Yan, Securing fingerprint template using blockchain and distributed storage system. Symmetry 12(6), 951 (2020)

    Article  Google Scholar 

  22. M. Khalil-Hani, M.N. Marsono, R. Bakhteri, Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Gener. Comput. Syst. 29(3), 800–810 (2013), ISSN 0167-739X

    Google Scholar 

  23. E. Martiri, M. Gomez-Barrero, B. Yang, C. Busch, Biometric template protection based on Bloom filters and honey templates. IET Biometrics 6(1), 19–26 (2017). https://doi.org/10.1049/iet-bmt.2015.0111

  24. H. Kaur, P. Khanna, Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed. Tools Appl. 75, 16333–16361 (2016)

    Article  Google Scholar 

  25. S.S. Ali, I.I. Ganapathi, S. Prakash, P. Consul, S. Mahyo, Securing biometric user template using modified minutiae attributes. Pattern Recogn. Letters 129, 263–270 (2020), ISSN 0167-8655

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Gayathri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gayathri, M., Malathy, C., Chandrasekar, H.A., Mathialagan, P. (2022). Multimodal Biometric Systems, its Security Issues, Research Challenges and Countermeasures—Technical Review . In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_75

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-5529-6_75

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-5528-9

  • Online ISBN: 978-981-16-5529-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics