Abstract
A biometric system is a high-tech system that uses the data about the individual, already stored in the database to identify the individual. Biometric system is gaining popularity since it provides security and privacy to the data so that no one can misuse the data of the individual. But still, the system is not fully secure because the pattern can be recognized by the third party with the help of the remote application like antireply attacks or liveliness detection over the Internet to access the biometric data. This paper presents a survey of security and privacy issues on the biometric system and discusses the various case studies such as E-passport and Aadhaar identification, followed by the threats and issues. So, in this paper it is concluded that there must be some techniques or protocols that are based on the signal processing and the cryptography mechanism that would protect the biometric data from the intruders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. https://doi.org/10.1109/TCSVT.2003.818349.
Liu, S., & Silverman, M. (2001). Practical guide to biometric security technology. IT Professional, 3(1), 27–32. https://doi.org/10.1109/6294.899930.
Bolle, R. M. (2001). Enhancing security. IBM Systems, 40(3), 614–634. https://doi.org/10.1147/sj.403.0614.
Prabhakar, S., Pankanti, S., & Jain, A. K. (2003). Biometric recognition: Security and privacy concerns. IEEE Security & Privacy Magazine, 1(2), 33–42. https://doi.org/10.1109/MSECP.2003.1193209.
Juels, A., Molnar, D., & Wagner, D. (2005). Security and privacy issues in E-passports. Security and privacy for emerging areas in communications networks, 2005. In SecureComm 2005. First International Conference on (pp. 74–88). https://doi.org/10.1109/securecomm.2005.59
Faundez-Zanuy, M. (2006). Biometric security technology. IEEE Aerospace and Electronic Systems Magazine, 21(6), 15–26. https://doi.org/10.1109/MAES.2006.1662038.
Lai, L., Ho, S. W., & Poor, H. V. (2011). Privacy–Security trade-offs in biometric security systems—Part I: Single use case. IEEE Transactions on Information Forensics and Security, 6(1), 122–139. https://doi.org/10.1109/TIFS.2010.2098872.
Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390–1397. https://doi.org/10.1109/TPDS.2010.206.
Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys and Tutorials, 17(3), 1268–1293. https://doi.org/10.1109/COMST.2014.2386915.
Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., & Yearwood, J. (2016). Protection of privacy in biometric data. IEEE Access, 4, 880–892. https://doi.org/10.1109/ACCESS.2016.2535120.
Memon, N. (2017). How biometric authentication poses new challenges to our security and privacy [in the spotlight]. IEEE Signal Processing Magazine, 34(4), 194–196. https://doi.org/10.1109/MSP.2017.2697179.
Kumar, T., Braeken, A., Liyanage, M., & Ylianttila, M. (2017). Identity privacy preserving biometric based authentication scheme for Naked healthcare environment. IEEE International Conference on Communications. https://doi.org/10.1109/ICC.2017.7996966.
Jaronde, P. W., Muratkar, N. A., Bhoyar, P. P., Gaikwad, S. J., & Nagrale, R. B. (2018). Review on biometric security system for newborn baby. International Journal of Scientific Research in Science and Technology, 4(2), 907–909.
Osadchy, M., & Dunkelman, O. (2018). It is all in the system’s parameters: Privacy and security issues in transforming biometric raw data into binary strings. IEEE Transactions on Dependable and Secure Computing, 5971(c), 1–10. https://doi.org/10.1109/TDSC.2018.2804949.
Srivastava, S., Agarwal, N., & Agarwal, R. (2013). Authenticating Indian E-health system through “Aadhaar” A unique identification. International Journal of Scientific & Engineering Research, 4(6), 2412–2416.
Kataria, A. N., Sharma, A. K., & Zaveri, T. H. (2013). A survey of automated biometric authentication techniques (pp. 1–6).
Hemalatha, T., Krishna, D., Krishna, K. B., & Subhramanyam, V. B. (2014). Aadhar based electronic voting system and providing authentication. International Journal of Engineering and Advanced Technology, 4(2), 237–240.
Dixon, P. (2017). A failure to “Do No Harm” -- India’s Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S. Health and Technology, 7(4), 539–567. https://doi.org/10.1007/s12553-017-0202-6.
Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747–1760. https://doi.org/10.1007/s11277-014-2111-6.
Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1–5. https://doi.org/10.1016/j.jnca.2009.08.001.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Datta, P., Bhardwaj, S., Panda, S.N., Tanwar, S., Badotra, S. (2020). Survey of Security and Privacy Issues on Biometric System. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)