Abstract
Biometric system is rapidly increasing scheme replacing traditional password and manual authentication systems. Security, privacy, and accuracy are the most important aspects to be considered in developing and designing biometric arrangements. In this chapter, a comprehensive study is presented to enlighten the latest development covering aspects of improving security and privacy of biometric system. Current trends and future challenges are also outlined in this chapter. Biometric credentials are becoming popular in all concern areas as a mode of authenticating person due to the broad range advantages with comparison to traditional authentication methods. This authentication method is having the most precious bond between a user and his biometric credentials; besides this biometric system raises some serious privacy and security concerns in case its traits get compromised. This chapter presents the challenging issues that need to be taken care when designing secure and privacy concern biometric authentication protocol. It describes major threats against its security and gives directions on actions to be taken as security measures in order to design secure and privacy preserving biometric identification system. In order to improve the usability of biometric authentication system, we classify and review the current biometric system by focusing on privacy and security concern. This chapter gives overall review and information about biometric system and protects privacy in adequate manner. It discusses personal privacy in terms of adoption of biometric identification system. In present time, we talk more about frauds and insecurity in different sectors as well as the computer technologies to be applied in current trends to ecommerce, banking, etc. There are two conventional ways of identifying individual. The first one is knowledge-based method which is based on different knowledge such as PIN and password to allow user to activate services. The second method is on token-based method. It can be a piece of badge, identification paper, key, etc. Both ways are insecure as password can be forgotten or guessed by others, and in other case, badge id or other identification may be lost or stolen. Biometric attributes are an optional solution with two previous modes. The merit of using biometric features is universal, unique, measurable, and permanent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Bevan, S. Hayday, Attendance Management: A Review of Good Practice, Report 353 (Institute for Employment Studies, 1998)
K. Bredin, Human resource management in project-based organizations. 2008 – Challenges, changes, and capabilities, Doctoral thesis, Department of Management and Engineering, Linköping University, Linköping, 2008
C.S. Chikkerur, Online fingerprint verification system, An MTech thesis, Department of Electrical Engineering, and Faculty of the Graduate School of the State University of New York at Buffalo, 2005
C. Velazco, Android still most popular smartphone OS, iOS holds steady in second place (on-line), (TechCrunch web, 2011), http://techcrunch.com/2011/11/03/android-still-most-popular-os-ios-holds-steady-in-second-place/. 13 January 2013
S. Capoor, Biometrics as a convenience security, Business story 1 December 2006, 48, 50. Retrieved 16 Oct 2012
D. Lauren, C. Shane, Enable a fingerprint scanner for android on the Motorola ATRIX 4G (on-line), (developer.com web, 2011), http://www.developer.com/ws/android/devices/enable-a-fingerprint-scanner-for-android-on-the-motorola-atrix-4g.html. 13 January 2013
D. Robert, Human Resource Management (Heinemann Educational Publisher, 2000)
C. Dubin, Biometrics: Hands down, ID management. Security, 1 February 2011, 52, 54
J.L. Dugelay et al., Recent advantages in biometric person authentication, in ICASSP International Conference on Acoustics, Speech and Signal Processing, (Orlando, Florida, USA, 2002)
A.J. Harris, D.C. Yen, Biometric authentication: Assuring access to information. Inf. Manag. Comput. Secur. 10(1), 12–19 (2002)
L. Jiexun, A. Wang, H. Chen, Identity matching using personal and social identity features. Inf. Syst. Front. 13, 101–113 (2011)
S. Kreimer, Matching the right patient to the right record. Hospitals & Health Networks, November 1, 12 (2010). Retrieved 17 Dec 2011
D.A. McKeehan, Attendance Management Program (The City of Pleasanton, Human Resources, 2002)
B.M. Mehtre, Fingerprint image analysis for automatic identification. Mach. Vis. Appl. 6(2), 124–139 (1993)
NSTCS, Biometrics technologies (National Science and Technology Council Subcommittee on Biometrics, 2006). Retrieved 2 July 2012
G.C. Ononiwu, G.N. Okorafor, Radio frequency identification (RFID) based attendance system with automatic door unit. Acad. Res. Int. 2(2) (March 2012)
J.K. Ravi, B. Raja, K.R. Venugopal, Fingerprint recognition using minutia score matching. Int. J. Eng. Sci. Technol. 1(2), 35–42 (2009)
F. Sandi Rodiyansyah, rsitektur Sistem Operasi Android (online), (ducnologyweb, 2011), http://educnology.web.id/opensource/rodiyansyah/arsitektur-sistem-operasi-android. 14 Januari 2013
V. Shehu, A. Dika, Using real time computer vision algorithms in automatic attendance management systems, in Proceedings of the ITI 2010 32nd International Conference on Information Technology Interfaces, June 21–24, 2010, (Caveat, Croatia, 2011)
O. Shoewu, O.M. Olaniyi, A. Lawson, Embedded computer-based lecture attendance management system. Afr. J. Comput. ICT 4(3), 27–36 (2011)
L. Tyler, AuthenTec releases SDK for fingerprint sensor applications on Android phones (on-line), (Ubergizmo web, 2011), http://www.ubergizmo.com/2011/08/authentec-releases-sdk-for-fingerprint-sensor-applications-on-android-phones/. 13 Januari 2013
Woodward, J.D., et al., Army Biometric Applications: Identifying and Addressing Sociocultural Concerns. 2001
D. Kresimir, M. Grgic, A survey of biometric recognition methods, in International Symposium Electronics in Marine, ELMAR-2004, (2004)
Z. Rui, Y. Zheng, A survey on biometric authentication: Toward secure and privacy-preserving identification. IEEE Access 99, 1 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Singh, G., Bhardwaj, G., Singh, S.V., Garg, V. (2021). Biometric Identification System: Security and Privacy Concern. In: Awasthi, S., Travieso-González, C.M., Sanyal, G., Kumar Singh, D. (eds) Artificial Intelligence for a Sustainable Industry 4.0. Springer, Cham. https://doi.org/10.1007/978-3-030-77070-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-77070-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-77069-3
Online ISBN: 978-3-030-77070-9
eBook Packages: Computer ScienceComputer Science (R0)