Skip to main content

Social Impact of Biometric Technology: Myth and Implications of Biometrics: Issues and Challenges

Abstract

Biometric system which is based on human physical and behavioral traits is implemented in a versatile field especially national security, wage control, access control, intruder detection and verification, forensic science, etc. Biometrics is more reliable and capable than conventional methods like PIN, token system, etc. because of its unique identity whether physical or behavioral trait verification of each and every person. In recent times, the awareness of biometrics for common man had been limited to its use in spy thrillers or fear instilling instruments of state of corporate surveillance in speculative fiction, forensic or as investigative tools; and was supposed to be ultimate in areas where it was applied. There has been a drastic change in areas where biometrics can be applied. A good biometrics is characterized by use of a feature that is highly unique, so that the chance of any two people having the same characteristic will be minimal; is stable, so that the feature does not change over time; and can be easily captured, in order to provide convenience to the user and prevent misrepresentation of the feature. Biometric identifications are harder to steal than other traditional traits.

Every innovation faces social, cultural, and legal constraints. These constraints influence the acceptance of system by clients, its throughput, or the decision to utilize biometrics as a primary security tool. Therefore, these constraints are especially considered to design framework. Effectiveness and acceptability of biometrics depend upon the social and cultural values of users’ population. Innovators, designers, or manufacturers try to make a system user-friendly and user acceptable; also it is considered to minimize the effect of constraints. Both acceptability and effectiveness of system can be improved by analyzing and by delivering social and legal issues properly. Consideration of vulnerability determines the integrity and reliability. The present chapter deals with the myths and misrepresentations, vulnerability points, and major concerns of biometrics and challenges, difficulties, and issues of various biometric systems.

Keywords

  • Myths
  • Vulnerability
  • Susceptibility points
  • Impediments
  • Multimodal biometrics

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-30436-2_7
  • Chapter length: 27 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   84.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-30436-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   109.99
Price excludes VAT (USA)
Hardcover Book
USD   129.99
Price excludes VAT (USA)
Fig. 7.1

References

  1. Z.M. Noh, A.R. Ramli, M. Iqbal Saripan, M. Hanafi, Overview and challenges of palm vein biometric system. Int. J. Biom. 8(1) (2016), https://doi.org/10.1504/IJBM.2016.077102.

    CrossRef  Google Scholar 

  2. S. Asha, C. Chellappan, Biometrics: an overview of the technology, issues and applications. Int. J. Comput. Appl. 39(10), 35–52 (2012)

    Google Scholar 

  3. R. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha, A.W. Senior, Guide to biometrics (Springer, New York, 2004)

    CrossRef  Google Scholar 

  4. A.K. Jain, J. Feng, Latent finger print matching. IEEE Trans. Patt. Anal. Mac. Intel. 33(1), 88–100 (2010)

    CrossRef  Google Scholar 

  5. A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video. Technol. 14(1), 4–20 (2004)

    CrossRef  Google Scholar 

  6. N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    CrossRef  Google Scholar 

  7. B. Schneier, The uses and abuses of biometrics. Commun. ACM 42(8), 136 (1999)

    CrossRef  Google Scholar 

  8. N.K. Ratha, R.M. Bolle, Smart card based authentication, in Biometrics: Personal Identification in Networked Society, ed. by A. K. Jain, R. M. Bolle, S. Pankanti, (Kluwer Academic Press, Boston, 1999), pp. 369–384

    CrossRef  Google Scholar 

  9. B. Schneier, in Security Pitfalls in Cryptography, Proceedings of the CardTech/SecureTech Conference, CardTech/SecureTech, (Bethesda, 1998), pp. 621–626

    Google Scholar 

  10. T. Sabhanayagam, V.P. Venkatesan, K. Senthamaraikannan, A comprehensive survey on various biometric systems, Int. J. Appl. Eng. Res 13(5), 2276–2297 (2018) ISSN 0973-4562.

    Google Scholar 

  11. U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE. 92, 948–960 (2004)

    CrossRef  Google Scholar 

  12. P. Campisi, Security and privacy in biometrics: towards a holistic approach, in Security and privacy in biometrics, (Springer London, 2013), pp. 1–23

    Google Scholar 

  13. A. Adler, R. Carppelli, Template Security in: Encyclopedia of Biometrics, (Springer, 2009), pp. 1322–1327

    Google Scholar 

  14. D.C.L. Ngo, A.B.J. Teoh, J. Hu, Biometric security (Cambridge Scholars Publishing, England, 2015)

    Google Scholar 

  15. K. Jain, K. Nandakumar, A. Ross, 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern. Recog. Let. 79, 80–105 (2016)

    CrossRef  Google Scholar 

  16. K. Nandakumar, A. Jain, Biometric template protection: bridging the performance gap between theory and practice. IEEE Sig. Proc. Mag. 32, 88–100 (2015)

    CrossRef  Google Scholar 

  17. N. Bartlow, B.Cukic, The vulnerabilities of biometric systems – an integrated look at old and new ideas. Technical Report (West Virginia University, 2005)

    Google Scholar 

  18. K. Jain, K. Nandakumar, A. Nagar, Biometric template security, EURASIP J. Adv. Sig. Proc. 2008, 1–17, 579416 (2008), https://doi.org/10.1155/2008/579416.

    CrossRef  Google Scholar 

  19. S. Tiwari, J.N. Chourasia, V.S. Chourasia, A review of advancements in biometric systems, Int. J. Innov. Res. Adv. Eng. (IJRAE). 2(1) 2015, ISSN 2349–2163

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Verify currency and authenticity via CrossMark

Cite this chapter

Thakur, K., Vyas, P. (2019). Social Impact of Biometric Technology: Myth and Implications of Biometrics: Issues and Challenges. In: Sinha, G. (eds) Advances in Biometrics. Springer, Cham. https://doi.org/10.1007/978-3-030-30436-2_7

Download citation