Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 800))

  • 1669 Accesses

Abstract

The concept of biometric authentication is popular in the research industry. Biometric authentication refers to the measurement and statistical analysis of a human’s biological and behavioral features. Biometric technology is mainly used for authentication and identifying individuals based on their biological traits. Regarding biometric applications, security is the key issue that has a lot of remaining challenges. To succeed in this domain, this paper gives a background on the fingerprint matching algorithm steps. Moreover, the paper presents a brief overview of different attacks and threats that affect the privacy and security of the biometric system. Then we discuss the common schemes that have been used to secure biometric systems. Finally, findings and direction for further research about biometric system security are explored.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hahn, C., Hur, J.: Efficient and privacy-preserving biometric identification in cloud. ICT Exp. 2(3), 135–139 (2016). Special Issue on ICT Convergence in the Internet of Things (IoT)

    Google Scholar 

  2. Gupta, P., Gupta, P.: An accurate slap fingerprint based verification system. Neurocomputing 188, 178–189 (2016). Advanced Intelligent Computing Methodologies and Applications

    Google Scholar 

  3. Asha, S., Chellappan, C.: Biometrics: an overview of the technology, issues and applications. Int. J. Comput. Appl. 39, 35–52 (2012). Full text available

    Google Scholar 

  4. Tian, Y., Gofman, M., Villa, M.: Biometrics in cloud computing and big data (Chapter 8). In: Mitra, S., Gofman, M. (eds.) Biometrics in a Data Driven World: Trends, Technologies, and Challenges, pp. 245–262. CRC Press, Boca Raton (2016)

    Chapter  Google Scholar 

  5. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process 2008, 113:1–113:17 (2008)

    Google Scholar 

  6. Duncan, A., Creese, S., Goldsmith, M., Quinton, J.S.: Cloud computing: insider attacks on virtual machines during migration. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 493–500, July 2013

    Google Scholar 

  7. Kumar, P.R., Raj, P.H., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Proc. Comput. Sci. 125, 691–697 (2018). The 6th International Conference on Smart Computing and Communications

    Google Scholar 

  8. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)

    Article  Google Scholar 

  9. Thangavel, M., Varalakshmi, P., Sridhar, S.: An analysis of privacy preservation schemes in cloud computing. In: 2016 IEEE International Conference on Engineering and Technology (ICETECH), pp. 146–151, Mar 2016

    Google Scholar 

  10. AlZain, M.A., Pardede, E., Soh, B., Thom, J.A.: Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii International Conference on System Sciences, pp. 5490–5499, Jan 2012

    Google Scholar 

  11. Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable fingerprint biotokens: accuracy and security analysis. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8, June 2007

    Google Scholar 

  12. Li, S.Z., Jain, A.K. (eds.) Encyclopedia of Biometrics. Springer US, Boston (2015)

    Google Scholar 

  13. Kaur, H., Khanna, P.: Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed. Tools Appl. 75, 16333–16361 (2016)

    Article  Google Scholar 

  14. Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In; 2007 Biometrics Symposium, pp. 1–6, Sept 2007

    Google Scholar 

  15. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In; Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS ’99, New York, NY, USA, pp. 28–36. ACM (1999)

    Google Scholar 

  16. Alberto Torres, W.A., Bhattacharjee, N., Srinivasan, B.: Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int. J. Pervasive Comput. Commun. 11, 151–168 (2015)

    Article  Google Scholar 

  17. Jain, A.K., Nandakumar, K., Ross, A.: 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognit. Lett. 79, 80–105 (20160

    Google Scholar 

  18. Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, R., Janet, S., Ko, K.: User’s Guide to NIST Biometric Image Software (NBIS). Department of Commerce, National Institute of Standards and Technology, Gaithersburg (2007)

    Google Scholar 

  19. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, London (2009)

    Book  Google Scholar 

  20. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2255 (2004)

    Article  Google Scholar 

  21. Tulyakov, S., Farooq, F., Govindaraju, V.: Symmetric hash functions for fingerprint minutiae. In: Singh, S., Singh, M., Apte, C., Perner, P. (eds.) Pattern Recognition and Image Analysis, pp. 30–38. Springer, Berlin/Heidelberg (2005)

    Chapter  Google Scholar 

  22. Álvarez Mariño, R., Álvarez, F.H., Encinas, L.H.: A crypto-biometric scheme based on iris-templates with fuzzy extractors. Inf. Sci. 195, 91–102 (2012)

    Article  Google Scholar 

  23. Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptogr. 38, 237–257 (2006)

    Article  MathSciNet  Google Scholar 

  24. Scheirer, W.J., Boult, T.E.: Bipartite biotokens: definition, implementation, and analysis. In: Tistarelli, M., Nixon, M.S. (eds.) Advances in Biometrics, pp. 775–785. Springer, Berlin/Heidelberg (2009)

    Chapter  Google Scholar 

  25. Wu, Z., Tian, L., Li, P., Wu, T., Jiang, M., Wu, C.: Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf. Sci. 433434, 431–447 (2018)

    Article  Google Scholar 

  26. Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, MM&Sec ’10, New York, NY, USA, pp. 231–240. ACM (2010)

    Google Scholar 

  27. Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford, CA, USA (2009). AAI3382729.

    Google Scholar 

  28. Sussman, A., Trost, J., Maurer, A., Kohlwey, E.: Leveraging the cloud for big data biometrics: meeting the performance requirements of the next generation biometric systems. In: 2011 IEEE World Congress on Services (SERVICES 2011), vol. 00, pp. 597–601 (2011)

    Google Scholar 

  29. Apache hadoop. [Online]. Available: http://hadoop.apache.org/

  30. Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation – Volume 6, OSDI’04, Berkeley, CA, USA, pp. 10–10. USENIX Association (2004)

    Google Scholar 

  31. Apache zookeeper. [Online]. Available: http://zookeeper.apache.org/

  32. Apache hbase. [Online]. Available: http://hbase.apache.org/

  33. Shelly, Raghava, N.S.: Iris recognition on hadoop: a biometrics system implementation on cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 482–485, Sept 2011

    Google Scholar 

  34. Alsolami, F.J.: Toward secure sensitive data in the cloud. Ph.D. thesis, University of Colorado at Colorado Springs (2015)

    Google Scholar 

  35. Alsolami, F., Alzahrani, B., Boult, T.: Cloud-id-screen: secure fingerprint data in the cloud. In: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1–8, Jan 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fahad Alsolami .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alzahrani, B., Alsolami, F. (2019). Biometric System: Security Challenges and Solutions. In: Latifi, S. (eds) 16th International Conference on Information Technology-New Generations (ITNG 2019). Advances in Intelligent Systems and Computing, vol 800. Springer, Cham. https://doi.org/10.1007/978-3-030-14070-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-14070-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-14069-4

  • Online ISBN: 978-3-030-14070-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics