

REDEFINING SECURITY- BIOMETRIC AUTHENTICATION SYSTEM
Abstract
Biometric security has developed into a cutting- edge technology in security enhancement, particularly excelling in authentication and access control within the banking, healthcare, and government sectors. This innovative approach utilizes unique anatomical and behavioural characteristics, biometric imprints, facial analysis, iris patterns, and voice processing, rendering it more effective and practical than traditional password systems. The ongoing study focuses to assess the fundamental principles underlying security using biometric systems and examine their effectiveness in preventing unauthorized access and identity theft while facilitating user authentication. Additionally, it addresses critical concerns related to privacy, the necessity for data protection, and the risks posed by spoofing attacks. The discussion includes countermeasures against these threats, highlighting recent advancements in encryption, multimodal biometrics, and artificial intelligence. Furthermore, it explores emerging trends in the development of security using biometric systems as a foundational element of contemporary cybersecurity outlines.
References
Aboalsamh, H.A. (2011) ‘A multibiometric system using combined vein and fingerprint identification’, International Journal of Circuits, System and Signal Processing, Vol. 5, No. 1,
pp.29–36, Springer.
Al-Waisy, A.S., Qahwaji, R., Ipson, S. and Al- Fahdawi, S. (2017) ‘A multimodal biometric system for personal identification based on deep learning approaches’, Seventh IEEE International
Conference on Emerging Security Technologies (EST), Canterbury, UK, 6–8 September,
pp.163–168.
Bahrampour, S. and Nasrabadi, N.M. (2016) ‘Multimodal task-driven dictionary learning for
image classification’, IEEE Transactions on Image Processing, January, Vol. 25, No. 1, pp.1–15.
Besbes, F., Trichili, H. and Solaiman, B. (2008) ‘Multimodal biometric system based on fingerprint
and iris recognition’, in the Proceeding of the 3rd IEEE International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, Syria, 7–11 April, pp.1–5.
Boles, W.W. and Boashash, B. (1998) ‘A human identification technique using images of the iris
and wavelet transform’, IEEE Transaction on Signal Processing, April, Vol. 46, No. 4, pp.1185–1188.
Brunelli, R. and Falavigna, D. (1995) ‘Person identification using multiple cues’, IEEE Transactions on Pattern Analysis and Machine Intelligence, October, Vol. 17, No. 10, pp.955–966.
Burr, W.E., Dodson, D.F. and Polk,
W.T. (2006) Information Security: Electronic Authentication
Guideline, Technical Special Report 800-63, NIST, April 2006.
Campbell, W.M., Reynolds, D.A. and Campbell, J.P. (2004) ‘Fusing discriminative and generative
methods for speaker recognition: experiments on switchboard and NFI/TNO field data’, in the Proceeding of the Speaker and Language Recognition Workshop, Toledo, Spain, ISCA, 31 May – 3 June, pp.41–44.
Cappelli, R., Lumini, A., Maio, D. and Maltoni,
D. (2007) ‘Fingerprint image reconstruction from
standard templates’, IEEE Transaction on Pattern Analysis and Machine Intelligence, September, Vol. 29, No. 9, pp.1489–1503.
Cavoukian, A. and Stoianov, A. (2007) Biometric Encryption: A Positive-sum Technology that
achieves Strong Authentication, Security and Privacy, Technical Report, Office of the Information and Privacy Commissioner of Ontario, March.
Refbacks
- There are currently no refbacks.