Skip to main content

Reliable Biometric Authentication with Privacy Protection

  • Conference paper
  • First Online:
Advances in Communication, Devices and Networking

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 902))

Abstract

Objectives To study and compare different types of biometric systems and to obtain the result for the same, this paper has discussed the need of biometrics, ways of performing it and the best type of biometrics that should be implemented. Methods and findings: We used various statistics, graphical and tabular representations for showing data studied from different papers and reviewing them. Instances of infringements of right to privacy and protection of personal data are proliferating. Biometric systems are identity authentication systems for information assurance and protection via biological traits since they are unique. Technology is rapidly advancing in every field and choosing passwords are not enough. Biometric systems are the best approach to keep data safe, and it also makes the accessing of data simple. Everything has its own pros and cons so; we will be discussing the pros and cons of various biometric technologies in order to determine the best among them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alqahtani A (2016) Evaluation of the reliability of iris recognition biometric authentication systems. In: 2016 international conference on computational science and computational intelligence (CSCI). IEEE

    Google Scholar 

  2. Bilge L et al (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web. ACM

    Google Scholar 

  3. Boatwright M, Luo X (2007) What do we know about biometrics authentication? In: Proceedings of the 4th annual conference on Information security curriculum development. ACM

    Google Scholar 

  4. Kang BJ, Park KR (2005) A study on iris image restoration. In: Audio-and video-based biometric person authentication. Springer, pp 31–40

    Google Scholar 

  5. Chitte PP, Rana JG, Taware S (2012) Iris recognition based security system using RFID. In: Proceedings of the CUBE international information technology conference. ACM

    Google Scholar 

  6. Chowhan SS, Shinde GN (2008) Iris biometrics recognition application in security management. Image and signal processing, 2008. Congress on CISP'08, vol 1. IEEE

    Google Scholar 

  7. Duarte T et al (2016) Biometric access control systems: a review on technologies to improve their efficiency. In: 2016 IEEE international power electronics and motion control conference (PEMC). IEEE

    Google Scholar 

  8. Hämmerle-Uhl J, Raab K, Uhl A (2011) Robust watermarking in iris recognition: application scenarios and impact on recognition performance. ACM SIGAPP Appl Comput Rev 11(3):6–18

    Article  Google Scholar 

  9. Fujimasa, Chinzei T, Saito I (2000) Converting far infrared image information to other physiological data. Eng Med Biol Mag 19:71–76

    Google Scholar 

  10. Jagadeesh N, Chandrasekhar M, Patil (2017) Conceptual view of the iris recognition systems in the biometric world using image processing techniques. In: 2017 international conference on computing methodologies and communication (ICCMC). IEEE

    Google Scholar 

  11. Anil J, Hong L, Sharath P (2000) Biometric identification. Commun ACM 43(2):90–98

    Google Scholar 

  12. Daugman J (2004) How iris recognition works. IEEE Trans Circ Syst Video Technol 14(1):21–30

    Article  Google Scholar 

  13. Lai K, Steven S, Yanushkevich SN (2014) “Multi-spectral facial biometrics in access control. In: 2014 IEEE symposium on computational intelligence in biometrics and identity management (CIBIM). IEEE

    Google Scholar 

  14. Salganicoff M, Zhang GH (1999) Method of measuring the focus of close-up images of eyes. US Patent 5953440

    Google Scholar 

  15. Mock K et al (2012) Real-time continuous iris recognition for authentication using an eye tracker. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM

    Google Scholar 

  16. Kalka ND, Zuo J, Schmid NA, Cukic B (2006) Image quality assessment for iris biometric

    Google Scholar 

  17. Li P, Ma H (2012) Iris recognition in nonideal imaging conditions. Pattern Recognit Lett 33(8):1012–1018

    Google Scholar 

  18. Sharma, Shilpi, and J. S. Sodhi. “Implementation of biometric techniques in social networking sites.“ International Journal of Security and Its applications 8.6 (2014): 51–60.

    Google Scholar 

  19. Sheela SV, P. A. Vijaya."Iris recognition methods-survey." International Journal of Computer Applications 3.5 (2010): 19Snelick, Robert, et al (2005) Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Trans Pattern Anal Mach Intell 27(3):450–455

    Google Scholar 

  20. Solanke, Sarika B., and Ratnadeep R. Deshmukh. ““Biometrics—Iris recognition system” A study of promising approaches for secured authentication.“ Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on.IEEE, 2016.

    Google Scholar 

  21. Verma P et al (2012) Daughman’s algorithm method for iris recognition—a biometric approach. Int J Emerg Technol Adv Eng 2(6):177–185

    Google Scholar 

  22. Chen Y, Dass SC, Jain AK (2005) Localized iris image quality using 2-d wavelets. In: Advances in biometrics. Springer, Berlin, pp 373–381

    Google Scholar 

  23. Yadav V, Monika V, Kaushik VD (2016) A biometric approach to secure big data. In: 2016 international conference on innovation and challenges in cyber security (ICICCS-INBUSH). IEEE

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soumya Ranjan Nayak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, S.B., Dhall, I., Nayak, S.R., Chatterjee, P. (2023). Reliable Biometric Authentication with Privacy Protection. In: Dhar, S., Do, DT., Sur, S.N., Liu, H.CM. (eds) Advances in Communication, Devices and Networking. Lecture Notes in Electrical Engineering, vol 902. Springer, Singapore. https://doi.org/10.1007/978-981-19-2004-2_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-2004-2_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-2003-5

  • Online ISBN: 978-981-19-2004-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics