Abstract
The concept of biometric authentication is popular in the research industry. Biometric authentication refers to the measurement and statistical analysis of a human’s biological and behavioral features. Biometric technology is mainly used for authentication and identifying individuals based on their biological traits. Regarding biometric applications, security is the key issue that has a lot of remaining challenges. To succeed in this domain, this paper gives a background on the fingerprint matching algorithm steps. Moreover, the paper presents a brief overview of different attacks and threats that affect the privacy and security of the biometric system. Then we discuss the common schemes that have been used to secure biometric systems. Finally, findings and direction for further research about biometric system security are explored.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hahn, C., Hur, J.: Efficient and privacy-preserving biometric identification in cloud. ICT Exp. 2(3), 135–139 (2016). Special Issue on ICT Convergence in the Internet of Things (IoT)
Gupta, P., Gupta, P.: An accurate slap fingerprint based verification system. Neurocomputing 188, 178–189 (2016). Advanced Intelligent Computing Methodologies and Applications
Asha, S., Chellappan, C.: Biometrics: an overview of the technology, issues and applications. Int. J. Comput. Appl. 39, 35–52 (2012). Full text available
Tian, Y., Gofman, M., Villa, M.: Biometrics in cloud computing and big data (Chapter 8). In: Mitra, S., Gofman, M. (eds.) Biometrics in a Data Driven World: Trends, Technologies, and Challenges, pp. 245–262. CRC Press, Boca Raton (2016)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process 2008, 113:1–113:17 (2008)
Duncan, A., Creese, S., Goldsmith, M., Quinton, J.S.: Cloud computing: insider attacks on virtual machines during migration. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 493–500, July 2013
Kumar, P.R., Raj, P.H., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Proc. Comput. Sci. 125, 691–697 (2018). The 6th International Conference on Smart Computing and Communications
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)
Thangavel, M., Varalakshmi, P., Sridhar, S.: An analysis of privacy preservation schemes in cloud computing. In: 2016 IEEE International Conference on Engineering and Technology (ICETECH), pp. 146–151, Mar 2016
AlZain, M.A., Pardede, E., Soh, B., Thom, J.A.: Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii International Conference on System Sciences, pp. 5490–5499, Jan 2012
Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable fingerprint biotokens: accuracy and security analysis. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8, June 2007
Li, S.Z., Jain, A.K. (eds.) Encyclopedia of Biometrics. Springer US, Boston (2015)
Kaur, H., Khanna, P.: Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed. Tools Appl. 75, 16333–16361 (2016)
Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In; 2007 Biometrics Symposium, pp. 1–6, Sept 2007
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In; Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS ’99, New York, NY, USA, pp. 28–36. ACM (1999)
Alberto Torres, W.A., Bhattacharjee, N., Srinivasan, B.: Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int. J. Pervasive Comput. Commun. 11, 151–168 (2015)
Jain, A.K., Nandakumar, K., Ross, A.: 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognit. Lett. 79, 80–105 (20160
Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, R., Janet, S., Ko, K.: User’s Guide to NIST Biometric Image Software (NBIS). Department of Commerce, National Institute of Standards and Technology, Gaithersburg (2007)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, London (2009)
Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2255 (2004)
Tulyakov, S., Farooq, F., Govindaraju, V.: Symmetric hash functions for fingerprint minutiae. In: Singh, S., Singh, M., Apte, C., Perner, P. (eds.) Pattern Recognition and Image Analysis, pp. 30–38. Springer, Berlin/Heidelberg (2005)
Álvarez Mariño, R., Álvarez, F.H., Encinas, L.H.: A crypto-biometric scheme based on iris-templates with fuzzy extractors. Inf. Sci. 195, 91–102 (2012)
Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptogr. 38, 237–257 (2006)
Scheirer, W.J., Boult, T.E.: Bipartite biotokens: definition, implementation, and analysis. In: Tistarelli, M., Nixon, M.S. (eds.) Advances in Biometrics, pp. 775–785. Springer, Berlin/Heidelberg (2009)
Wu, Z., Tian, L., Li, P., Wu, T., Jiang, M., Wu, C.: Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf. Sci. 433–434, 431–447 (2018)
Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, MM&Sec ’10, New York, NY, USA, pp. 231–240. ACM (2010)
Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford, CA, USA (2009). AAI3382729.
Sussman, A., Trost, J., Maurer, A., Kohlwey, E.: Leveraging the cloud for big data biometrics: meeting the performance requirements of the next generation biometric systems. In: 2011 IEEE World Congress on Services (SERVICES 2011), vol. 00, pp. 597–601 (2011)
Apache hadoop. [Online]. Available: http://hadoop.apache.org/
Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation – Volume 6, OSDI’04, Berkeley, CA, USA, pp. 10–10. USENIX Association (2004)
Apache zookeeper. [Online]. Available: http://zookeeper.apache.org/
Apache hbase. [Online]. Available: http://hbase.apache.org/
Shelly, Raghava, N.S.: Iris recognition on hadoop: a biometrics system implementation on cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 482–485, Sept 2011
Alsolami, F.J.: Toward secure sensitive data in the cloud. Ph.D. thesis, University of Colorado at Colorado Springs (2015)
Alsolami, F., Alzahrani, B., Boult, T.: Cloud-id-screen: secure fingerprint data in the cloud. In: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1–8, Jan 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Alzahrani, B., Alsolami, F. (2019). Biometric System: Security Challenges and Solutions. In: Latifi, S. (eds) 16th International Conference on Information Technology-New Generations (ITNG 2019). Advances in Intelligent Systems and Computing, vol 800. Springer, Cham. https://doi.org/10.1007/978-3-030-14070-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-14070-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14069-4
Online ISBN: 978-3-030-14070-0
eBook Packages: EngineeringEngineering (R0)