Skip to main content

Survey of Security and Privacy Issues on Biometric System

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

A biometric system is a high-tech system that uses the data about the individual, already stored in the database to identify the individual. Biometric system is gaining popularity since it provides security and privacy to the data so that no one can misuse the data of the individual. But still, the system is not fully secure because the pattern can be recognized by the third party with the help of the remote application like antireply attacks or liveliness detection over the Internet to access the biometric data. This paper presents a survey of security and privacy issues on the biometric system and discusses the various case studies such as E-passport and Aadhaar identification, followed by the threats and issues. So, in this paper it is concluded that there must be some techniques or protocols that are based on the signal processing and the cryptography mechanism that would protect the biometric data from the intruders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. https://doi.org/10.1109/TCSVT.2003.818349.

    Article  Google Scholar 

  2. Liu, S., & Silverman, M. (2001). Practical guide to biometric security technology. IT Professional, 3(1), 27–32. https://doi.org/10.1109/6294.899930.

    Article  Google Scholar 

  3. Bolle, R. M. (2001). Enhancing security. IBM Systems, 40(3), 614–634. https://doi.org/10.1147/sj.403.0614.

    Article  Google Scholar 

  4. Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security & Privacy Magazine, 1(2), 33–42. https://doi.org/10.1109/MSECP.2003.1193209.

    Article  Google Scholar 

  5. Juels, A., Molnar, D., & Wagner, D. (2005). Security and privacy issues in E-passports. Security and privacy for emerging areas in communications networks, 2005. In SecureComm 2005. First International Conference on (pp. 74–88). https://doi.org/10.1109/securecomm.2005.59

  6. Faundez-Zanuy, M. (2006). Biometric security technology. IEEE Aerospace and Electronic Systems Magazine, 21(6), 15–26. https://doi.org/10.1109/MAES.2006.1662038.

    Article  Google Scholar 

  7. Lai, L., Ho, S. W., & Poor, H. V. (2011). Privacy–Security trade-offs in biometric security systems—Part I: Single use case. IEEE Transactions on Information Forensics and Security, 6(1), 122–139. https://doi.org/10.1109/TIFS.2010.2098872.

    Article  Google Scholar 

  8. Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390–1397. https://doi.org/10.1109/TPDS.2010.206.

    Article  Google Scholar 

  9. Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys and Tutorials, 17(3), 1268–1293. https://doi.org/10.1109/COMST.2014.2386915.

    Article  Google Scholar 

  10. Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., & Yearwood, J. (2016). Protection of privacy in biometric data. IEEE Access, 4, 880–892. https://doi.org/10.1109/ACCESS.2016.2535120.

    Article  Google Scholar 

  11. Memon, N. (2017). How biometric authentication poses new challenges to our security and privacy [in the spotlight]. IEEE Signal Processing Magazine, 34(4), 194–196. https://doi.org/10.1109/MSP.2017.2697179.

    Article  Google Scholar 

  12. Kumar, T., Braeken, A., Liyanage, M., & Ylianttila, M. (2017). Identity privacy preserving biometric based authentication scheme for Naked healthcare environment. IEEE International Conference on Communications. https://doi.org/10.1109/ICC.2017.7996966.

  13. Jaronde, P. W., Muratkar, N. A., Bhoyar, P. P., Gaikwad, S. J., & Nagrale, R. B. (2018). Review on biometric security system for newborn baby. International Journal of Scientific Research in Science and Technology, 4(2), 907–909.

    Google Scholar 

  14. Osadchy, M., & Dunkelman, O. (2018). It is all in the system’s parameters: Privacy and security issues in transforming biometric raw data into binary strings. IEEE Transactions on Dependable and Secure Computing, 5971(c), 1–10. https://doi.org/10.1109/TDSC.2018.2804949.

    Article  Google Scholar 

  15. Srivastava, S., Agarwal, N., & Agarwal, R. (2013). Authenticating Indian E-health system through “Aadhaar” A unique identification. International Journal of Scientific & Engineering Research, 4(6), 2412–2416.

    Google Scholar 

  16. Kataria, A. N., Sharma, A. K., & Zaveri, T. H. (2013). A survey of automated biometric authentication techniques (pp. 1–6).

    Google Scholar 

  17. Hemalatha, T., Krishna, D., Krishna, K. B., & Subhramanyam, V. B. (2014). Aadhar based electronic voting system and providing authentication. International Journal of Engineering and Advanced Technology, 4(2), 237–240.

    Google Scholar 

  18. Dixon, P. (2017). A failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S. Health and Technology, 7(4), 539–567. https://doi.org/10.1007/s12553-017-0202-6.

    Article  Google Scholar 

  19. Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747–1760. https://doi.org/10.1007/s11277-014-2111-6.

    Article  Google Scholar 

  20. Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5. https://doi.org/10.1016/j.jnca.2009.08.001.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shanu Bhardwaj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Datta, P., Bhardwaj, S., Panda, S.N., Tanwar, S., Badotra, S. (2020). Survey of Security and Privacy Issues on Biometric System. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics