Security And Privacy Implications Of Biometric Authentication

Biometric System

Disucss about the security and privacy implications.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

In recent times human being basically recognize each other by the means of the face and their manner to deliver speech or the voice. The recognition system in the concept of the computer has been based traditionally on the basis of key and magnetic cards. The main disadvantage which is faced in this sector is that the cards or the key may be lost or forgotten by the users. To achieve a more reliable concept of recognition or purpose of identification the concept of biometric came into invention. The concept of biometric offers a method which is automated which is related to the identification purpose or verification on the principle of measurable physiological or characteristics which are unique and measurable (Boriev, Sokolov & Nyrkov, 2015). There are different types of biometric techniques which can be implemented according to the requirement of the sector and this implemented should be done according to the need and the purpose and the area of implementation.  

The main aim of the report is to take into consideration the different aspects which are related to the concept of the biometric and take into consideration the different security aspects which can be related to the concept. On the other hand the advantage sector of the technology are also discussed in a way which makes the life of the people more simple and easy.

The technology which is related to the biometric has a main focus point to provide authentication mechanism related to the human being. The system of biometric can be used in basically two types of scenario, the first being when the user claims enrolled already into the system (presents a login name or an ID name) this aspect is known as verification. In this type of system the data which is obtained from the user is verified with the data which is stored in the biometric database and then the access is given to that individual system. On the other hand the second type is when an identification aspect is taken into consideration. The main focus point which is related to the identification is that when a user is not priory known. In this cases the entire database is searched but the record of the individual are not found in any place. The subsequent searching are done on a particular method which is done in a small subset only (Boriev, Sokolov & Nyrkov, 2015). This technique directly increase the efficiency and the accuracy which is related to the search. Before any of the user is given access through a biometric system the record of the individual should be present in the database. The data of the user are generally captured, processed and stored. In order to increase the authentication aspect of the user and since the data being very much crucial the data in the biometric system are stored in a user master template. This type of registration which is related to the user’s data within the concept of the biometric is termed as enrolment. 

Measures

The most significant difference which is stated between the biometric system and the traditional system it can be stated that biometric system can be considered one of the most authenticated mechanism which can be related to the concept of the identification of the person. In most of the traditional system simply the password “abcd” or “1234” would not be sufficient in order to get the authentication purpose successful. The concept of the biometric can be directly divided into 2 major categories which are stated below:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

System based on characteristics of behavioural of a person (for example signature dynamics)

Devices based on the characteristics of the person.

The concept of the biometric can be considered to be very much authenticated and are more accurate and reliable. This is due to the fact that the psychological characteristics are very much easier to be identified and these type of characteristics are not affected by any means of stress or illness. There is a possibility of building a system which can be generated 100% matching each time there is a access. Yet it can be stated that this type of system would be practically useless due to the factor that the area of rejection would be very much high in these type of system. Most of the user would be rejected in the system due to the factor that the measurement results are not always same. The focus point taking into consideration the scenario which is stated there should be a variability relating to the data of the biometric so that there would not be any rejection related to the process. The variability in this context can be termed as a (security) threshold or a (security) level. If the level of vulnerability is high there would be a threshold level which would be very high and if we allow a sector of greater vulnerability then the threshold related to the security or the level of security would be low (Lu et al., 2015).

There are different types of biometric system which are available in recent times according to the requirement and specification. Few of the technology are in research stage and are yet to be implemented such as the odor analysis, on the other hand some of the technology are implemented and playing a vital role in the life of the common people. Some of the techniques which can be related to the biometric are stated below: 

Biometric Techniques

Fingerprint technology: The technology which is related to the biometric can be termed as one of the oldest form of technology which is related to the biometric. In old china the technology was implemented long time back basically to verify the author of a document. The usage of the finger print technology in the sector of law enforcement are also playing a vital role which directly lead to the enforcement of the finger print crime. Taking into consideration all the aspects it can be stated that the biometric technology can be considered as one of the most authenticated forms of technology which is playing a very vital role in recent times and would be also playing a dominating role in the future (Boriev, Sokolov & Nyrkov, 2015).

Fingerprint scanner: The traditional form of printer print technology uses the ink to get the image of the user and then the finger print is scanned using the concept of the traditional scanner. This type of method is very much less used in recent times due to the problem which is associated with the authenticity of the finger print. In most of the cases live finger print scanners are used which can be considered to be more authenticated and genuine. The technology which are related to the live scanner can be in the sector of the thermal, optical, ultrasonic and silicon principles (Tamilchelvi & Kumar, 2014). The most common form of technology which is used relating to the aspect is the optical finger print scanner. They are directly based upon the concept of the reflection changes at the spot where the finger papillary lines touch the surface of the reader. The size which is related to the optical fingerprint reader is generally around 10*10*5 centimeters. They are very much difficult to reduce in size due to the factor of source of light, light sensor and reflection surface.

Finger print processing: The concept of the fingerprint are not usually stored in the concept of the bitmaps. The concept of finger print matching can be subdivided into two sections which are majorly minutiae point and the correlation based. The concept of the minutiae is based on the concept of finding the minutiae point first and them mapping their relative placement on the finger. The concept of the minutiae are very much unique in a way that there are specific characteristics which are related to the ridge ending, divergences, bifurcation and dots or islands. In the recent times it can be stated that the concept of the minutiae are widely used in the concept of achieving the greater level of authentication. One of the problem which can be related to the concept of the minutiae is that it is very much difficult to accurately identify the finger print if the quality of the fingerprint is not good enough. It can be stated here that the concept does not take into consideration the aspects which are related to the furrow and the ridges (Alpar, 2017). In order to overcome the problem the concept of the correlation method was taken into consideration which helps in overcoming the aspects which are related to the concept of the minutiae based system. The concept which is applied by the correlation technique is based upon the aspect of gathering a precise location of the point of registration and are directly related to the concept of image rotation and translation.

Iris: The iris can be considered as a part of the colored ring of the textured tissue that basically surrounds the pupil of the eyes. It can be stated that each and every individual have a different pattern of iris, even the twins have a different iris patter. This aspect which is related to the iris pattern was taken into consideration in the aspect of the biometric authentication. It can be stated that research work have stated that the concept of the iris pattern would be more effective in the identification of person more than the concept of the DNA. The iris pattern of a human being is taken by a special grey scale camera taking into consideration a distance of about 10-40 cm from the camera (earlier methods which were related to the concept had to take into consideration closer eye position of area). The camera is located behind a mirror, the user directly looks into the camera and would be able to directly see his eyes (Mishra et al., 2014). Ones the eye is stable (very much fixed) and the camera is focused properly, the image of the eyes is captured. 

It can be stated here that there are more than ten technology which can be implemented in the concept of the biometric and few of the technology are at a stage of research. The main question which can arise in most of the cases is that what are the criteria which have to be fulfiller or biological measure should be obtained to become a biometric. Some of the point of consideration which should be taken into consideration are stated below:

Uniqueness: it can be stated here that no two person should have the same characteristics which are related to the biometric characteristics. The fingerprints can be considered of having high discrimination rate and probability of two person with the iris which are same us estimated to be low as 1: 10 52. On the other hand it can be stated that twins can be very much difficult to be discriminated in the terms of DNA and face recognition.

Universality: the aspect can be directly be related to that every person should have some different characteristics. It can be considered to be very much difficult to get a 100% coverage. There can be different scenarios which can be faced for example people who do not have fingers, mute people and people with injured eyes. All these aspects should be well managed in the aspect of the biometric authentication.

Collectability: this means that the characteristics should be very much measured quantatively and obtaining of the characteristics should be very much easy. The system which is related to the face recognition cannot be termed as intrusive and obtaining of the concept of the face image is not an easy task in hand. In contrast it can be stated that the concept of the DNA analysis can be considered to be having a requirement of blood or other samples of the body. The retina scan can be considered to rather intrusive (Boriev, Sokolov & Nyrkov, 2015). 

The concept of cryptography can be considered to be very much relatively success without the concept of the biometric over the past few years. To put in simple it can be stated that cryptographic concept is basically key based approach. The secure of the storage of the keys is very much crucial in the aspect of non-trial task. The key management often can be considered as one of the weakest point in the scenario. Indeed it can be stated here that the most advantageous sector which can be involved in the concept of the biometric is the secret key protection. In most of the cases it is seen that the data of the user is taken into consideration by another person who is not actually that person. This can lead to problem related to authentication as a result of which the undignified user would be taking the identify of another person and would be involving in some sort of authentically process or activity. The authentication aspect in these cases are majorly a concern area were the data of the user should be kept secured and no one should have the direct access to the data other than the authorized person. The false rejection concept in the recent research has also be proven to be removed due to the implementation of higher level of database access which is related to the linking of the data of the user with the actual identity of the user. In most of the cases link failure can be considered as a problem in this aspect which can remove the security which is related to the access of the person (Meng et al., 2015).

Conclusion

At the end of the report it can be stated that the biometric can be considered one of the technology which resolves many of the problem which is related to the authentication of a person. In most of the cases it is seen that biometric implementation are done in highly secured area were only authorized person are allowed for access. These serves the desired need which is related to the authentication of the user. the biometric system or the technology are in a way of undergoing a research by which there would be improvement in the concept of the concept of the functionality so as to make the process more authenticated than before. There are some security issue which are related to the working of the concept and some of the issue related to the identification which can be considered as one of the few sectors were the technology is lagging behind other technology. 

References

Alpar, O. (2017). Frequency spectrograms for biometric keystroke authentication using neural network based classifier. Knowledge-Based Systems, 116, 163-171.

Boriev, Z. V., Sokolov, S. S., & Nyrkov, A. P. (2015). Review of modern biometric user authentication and their development prospects. In IOP Conference Series: Materials Science and Engineering (Vol. 91, No. 1, p. 012063). IOP Publishing.

Chaudhry, S. A., Naqvi, H., & Khan, M. K. (2018). An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimedia Tools and Applications, 77(5), 5503-5524.

Choi, Y., Lee, Y., & Won, D. (2016). Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction. International Journal of Distributed Sensor Networks, 12(1), 8572410.

Kumar, T., Braeken, A., Liyanage, M., & Ylianttila, M. (2017, May). Identity privacy preserving biometric based authentication scheme for Naked healthcare environment. In Communications (ICC), 2017 IEEE International Conference on (pp. 1-7). IEEE.

Lu, Y., Li, L., Peng, H., & Yang, Y. (2015). An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. Journal of medical systems, 39(3), 32.

Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. IEEE Communications Surveys & Tutorials, 17(3), 1268-1293.

Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., & Khan, M. K. (2014). Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems. Journal of medical systems, 38(6), 24.

Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., & Chaturvedi, A. (2014). Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. Journal of medical systems, 38(5), 41.

Reddy, A. G., Das, A. K., Odelu, V., & Yoo, K. Y. (2016). An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography. PloS one, 11(5), e0154308.

Tamilchelvi, S. S., & Kumar, N. M. (2014). Year of Publication: 2014. Trans. Syst. Man Cybern.-Part b: Cybern, 38(5), 1294-1301.

Tolosana, R., Vera-Rodriguez, R., Ortega-Garcia, J., & Fierrez, J. (2015, May). Optimal feature selection and inter-operability compensation for on-line biometric signature authentication. In Biometrics (ICB), 2015 International Conference on (pp. 163-168). IEEE