Abstract
A biometric system is an amalgamation of algorithms that uses an individual’s unique biological data innate physical features (fingerprints, retina, face, ears, etc.) or behavioural features (signature, voice, keystroke dynamics, etc.) or both to authenticate the individual. This essentially makes a biometric system function as a pattern recognition system that helps an individual in any kind of adversarial environment. Hence, like any conventional authentication system, it is vulnerable to the attacks of malicious adversaries that try to manipulate the data and thus decline the security of the system by compromising its robustness. These possible attacks have not been considered while developing most biometric authentication systems. Our work describes multimodal biometrics, its feature extraction methods, research challenges and focuses on the major security issues in both unimodal and multimodal biometric systems. This paper summarizes some robust multimodal systems, their countermeasures and algorithms that have been devised to tackle these security challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S.G. Bhable, A survey of security of multimodal biometric systems. Int. Journal of Eng. Res. Appl. 5(12), 67–72 (Part—4) (Dec 2015) ISSN: 2248-9622
A.K. Jain, A.A. Ross, K. Nandakumar, Introduction to biometrics. ISBN 978–0–387–77325–4, DOI https://doi.org/10.1007/978-0-387-77326-1, (Springer, New York, Dordrecht, Heidelberg, London)
I.G. Damousis, S. Argyropoulos, Four machine learning algorithms for biometrics fusion: A comparative study. Appl. Comput. Intell. Soft Comput. 2012, Article ID 242401, 7 (2012) https://doi.org/10.1155/2012/242401
M. Hammad, Y. Liu, K. Wang, Multimodal biometric authentication systems using convolution neural network based on different level fusion of ecg and fingerprint. IEEE Access 7, 26527–26542 (2019). https://doi.org/10.1109/ACCESS.2018.2886573
I. Rida, N. Al-Maadeed, S. Al-Maadeed et al., A comprehensive overview of feature representation for biometric recognition. Multimed. Tools Appl. 79, 4867–4890 (2020). https://doi.org/10.1007/s11042-018-6808-5
D. De Ridder, R.P. Duin, J. Kittler J, Texture description by independent components, in Structural, Syntactic, and Statistical Pattern Recognition (Springer, 2002), pp 587–596
J. Wang, Laplacian eigenmaps, in Geometric Structure of High-Dimensional Data and Dimensionality Reduction (Springer, Berlin, Heidelberg, 2012). https://doi.org/10.1007/978-3-642-27497-8_12
S. Bashir, S. Sofi, S. Aggarwal, S. Singhal, Unimodal & multimodal biometric recognition techniques a survey. IJCSN Int. J. Compute. Sci. Netw. 4(1) (Feb 2015)
M.D. Garris, C.I. Watson, C.L. Wilson, Matching performance for the US- Visit IDENT system using flat fingerprints. Technical report, 7110, National Institute of Standards and Technology (NIST) (July 2004)
B. Biggio, Adversarial pattern classification. PhD thesis, University of Cagliari, Cagliari (Italy) (2010)
C. Wilson, A.R. Hicklin, M. Bone, H. Korves, P. Grother, B. Ulery, R. Micheals, M. Zoepfl, S. Otto, C. Watson, Fingerprint vendor technology evaluation 2003: Summary of results and analysis report. Technical Report NISTIR 7123, National Institute of Standards and Technology (NIST) (June 2004)
E. Maiorana, G.E. Hine, P. Campisi, Hill-climbing attacks on multibiometrics recognition systems. IEEE Trans. Inf. Forensics Secur. 10(5), 900–915 (2015)
R. Tolosana, M. Gomez-Barrero, C. Busch, J. Ortega-Garcia, Biometric presentation attack detection: beyond the visible spectrum. IEEE Trans. Inf. Forensics Secur. 15, 1261–1275 (2020)
U. Scherhag et al., Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting, in 2017 International Conference of the Biometrics Special Interest Group (BIOSIG) (Darmstadt, 2017), pp. 1–7
U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt, C. Busch, Face recognition systems under morphing attacks: a survey. IEEE Access 7, 23012–23026 (2019)
M. Gomez-Barrero, J. Galbally, Reversing the irreversible: a survey on inverse biometrics. Comput. Secur. 90, 101700 (2020), ISSN 0167-4048
I. Hazan, O. Margalit, L. Rokach, Securing keystroke dynamics from replay attacks. Appl. Soft Comput. 85, 105798 (2019), ISSN 1568-4946
R.K. Das, H. Li, Instantaneous phase and excitation source features for detection of replay attacks, in 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) (Honolulu, HI, USA, 2018), pp. 1030–1037
J. Galbally, A new Foe in biometrics: A narrative review of side-channel attacks. Comput. Secur. 96, 101902 (2020)
O. Delgado-Mohatar, J. Fierrez, R. Tolosana, R. Vera-Rodriguez, Blockchain and Applications, Vol. 1010, ISBN: 978-3-030-23812-4
M.A. Acquah, N. Chen, J.-S. Pan, H.-M. Yang, B. Yan, Securing fingerprint template using blockchain and distributed storage system. Symmetry 12(6), 951 (2020)
M. Khalil-Hani, M.N. Marsono, R. Bakhteri, Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Gener. Comput. Syst. 29(3), 800–810 (2013), ISSN 0167-739X
E. Martiri, M. Gomez-Barrero, B. Yang, C. Busch, Biometric template protection based on Bloom filters and honey templates. IET Biometrics 6(1), 19–26 (2017). https://doi.org/10.1049/iet-bmt.2015.0111
H. Kaur, P. Khanna, Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed. Tools Appl. 75, 16333–16361 (2016)
S.S. Ali, I.I. Ganapathi, S. Prakash, P. Consul, S. Mahyo, Securing biometric user template using modified minutiae attributes. Pattern Recogn. Letters 129, 263–270 (2020), ISSN 0167-8655
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gayathri, M., Malathy, C., Chandrasekar, H.A., Mathialagan, P. (2022). Multimodal Biometric Systems, its Security Issues, Research Challenges and Countermeasures—Technical Review . In: Ranganathan, G., Fernando, X., Shi, F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_75
Download citation
DOI: https://doi.org/10.1007/978-981-16-5529-6_75
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5528-9
Online ISBN: 978-981-16-5529-6
eBook Packages: EngineeringEngineering (R0)