Biometric Verification, Security Concerns and Related Issues - A Comprehensive Study

Full Text (PDF, 511KB), PP.42-51

Views: 0 Downloads: 0

Author(s)

Sheela Shankar 1,* V.R Udupi 2 Rahul Dasharath Gavas 3

1. Department of Electronics & Communication Engg, KLE Dr. M. S. Sheshgiri CET, Belgaum, India

2. Department of Electronics and Communication Engg, Gogte Institute of Technology, Belgaum, India

3. Department of Computer Science and Engineering, KLE Dr. M.S. Sheshgiri CET, Belgaum, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2016.04.06

Received: 17 Jun. 2015 / Revised: 3 Oct. 2015 / Accepted: 11 Dec. 2015 / Published: 8 Apr. 2016

Index Terms

Authentication, Biometric Systems, Biometric Techniques, Security

Abstract

There has been many attempts to make authentication processes more robust. Biometric techniques are one among them. Biometrics is unique to an individual and hence their usage can overcome most of the issues in conventional authentication process. This paper makes a scrutinizing study of the existing biometric techniques, their usage and limitations pertaining to their deployment in real time cases. It also deals with the motivation behind adapting biometrics in present day scenarios. The paper also makes an attempt to throw light on the technical and security related issues pertaining to biometric systems.

Cite This Paper

Sheela Shankar, V.R Udupi, Rahul Dasharath Gavas, "Biometric Verification, Security Concerns and Related Issues - A Comprehensive Study", International Journal of Information Technology and Computer Science(IJITCS), Vol.8, No.4, pp.42-51, 2016. DOI:10.5815/ijitcs.2016.04.06

Reference

[1]Yang, Wen-Her, and Shiuh-Pyng Shieh. "Password authentication schemes with smart cards." Computers & Security 18, no. 8 (1999): 727-733.

[2]Yeom, Seul-Ki, Heung-Il Suk, and Seong-Whan Lee. "Person authentication from neural activity of face-specific visual self-representation." Pattern Recognition 46, no. 4 (2013): 1159-1169.

[3]Jain, A. K., Ross, A., & Prabhakar, S. 2004. An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14, 4–20.

[4]Iannarelli, A. "Ear Identification, Forensic Identification series, Fremont."Paramont Publishing, Calif, ISBN 10 (1989): 0962317802.

[5]Hurley, David J., Mark S. Nixon, and John N. Carter. "Force field energy functionals for image feature extraction." Image and Vision computing 20, no. 5 (2002): 311-317.

[6]Nanni, Loris, and Alessandra Lumini. "A multi-matcher for ear authentication." Pattern Recognition Letters 28, no. 16 (2007): 2219-2226.

[7]Han, Chin-Chuan, Hsu-Liang Cheng, Chih-Lung Lin, and Kuo-Chin Fan. "Personal authentication using palm-print features." Pattern Recognition 36, no. 2 (2003): 371-381.

[8]Han, Chin-Chuan. "A hand-based personal authentication using a coarse-to-fine strategy." Image and Vision Computing 22, no. 11 (2004): 909-918.

[9]J.E. Cutting and L.T. Kozlowski, “Recognition of friends by their walk”, Bull.of the Psychonomic Soc., vol. 9, pp. 353-356, 1977.

[10]Niyogi, Sourabh A., and Edward H. Adelson. "Analysing gait with spatiotemporal surfaces." In Motion of Non-Rigid and Articulated Objects, 1994, Proceedings of the 1994 IEEE Workshop on, pp. 64-69. IEEE, 1994.

[11]Xin Zhang and GuoliangFan, “Dual gait generative models for human motion estimation from a single camera”, IEEE Transactions on Systems, Man, And Cybernetics—Part B: Cybernetics, vol. 40, no. 4, pp. 1034-1049, Aug. 2010.

[12]Konstantinos Moustakas, Dimitrios Tzovaras, and Georgios Stavropoulos, “Gait recognition using geometric features and soft biometrics”, IEEE Signal Processing Letters, vol. 17, no. 4, pp. 367-370, Apr. 2010.

[13]Zongyi Liu and SudeepSarkar, “Improved gait recognition by gait dynamics normalization”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 6, pp. 863-876, Jun. 2006.

[14]Monrose, Fabian, and Aviel D. Rubin. "Keystroke dynamics as a biometric for authentication." Future Generation computer systems 16, no. 4 (2000): 351-359.

[15]B. Schneier, The uses and abuses of biometrics, Commun. ACM 42 (8) (1999) 136.

[16]Maio, Dario, Davide Maltoni, Raffaele Cappelli, James L. Wayman, and Anil K. Jain. "FVC2000: Fingerprint verification competition." Pattern Analysis and Machine Intelligence, IEEE Transactions on 24, no. 3 (2002): 402-412.

[17]Doddington, George, Walter Liggett, Alvin Martin, Mark Przybocki, and Douglas Reynolds. Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. NATIONAL INST OF STANDARDS AND TECHNOLOGY GAITHERSBURG MD, 1998. 

[18]Ortega-Garcia, Javier, Josef Bigun, Douglas Reynolds, and Joaquin Gonzalez-Rodriguez. "Authentication gets personal with biometrics." Signal Processing Magazine, IEEE 21, no. 2 (2004): 50-62.

[19]Rodwell, P. M., S. M. Furnell, and Paul L. Reynolds. "A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head." Computers & Security 26, no. 7 (2007): 468-478.

[20]Ross, Arun, Anil Jain, and James Reisman. "A hybrid fingerprint matcher." Pattern Recognition 36, no. 7 (2003): 1661-1673.

[21]Wildes, Richard P., Jane C. Asmuth, Gilbert L. Green, Steven C. Hsu, Raymond J. Kolczynski, James R. Matey, and Sterling E. McBride. "A machine-vision system for iris recognition." Machine vision and Applications 9, no. 1 (1996): 1-8.

[22]Gibbs, Martin D. "Biometrics: body odor authentication perception and acceptance." ACM SIGCAS Computers and Society 40, no. 4 (2010): 16-24.

[23]Liu, Simon, and Mark Silverman. "A practical guide to biometric security technology." IT Professional 3, no. 1 (2001): 27-32.

[24]Varga, Andrew, and Herman JM Steeneken. "Assessment for automatic speech recognition: II. NOISEX-92: A database and an experiment to study the effect of additive noise on speech recognition systems." Speech communication 12, no. 3 (1993): 247-251.

[25]Han, Chin-Chuan, Hsu-Liang Cheng, Chih-Lung Lin, and Kuo-Chin Fan. "Personal authentication using palm-print features." Pattern Recognition 36, no. 2 (2003): 371-381.

[26]Zhao, Wenyi, Rama Chellappa, P. Jonathon Phillips, and Azriel Rosenfeld. "Face recognition: A literature survey." Acm Computing Surveys (CSUR) 35, no. 4 (2003): 399-458.

[27]Bolle, Ruud M., Jonathan H. Connell, and Nalini K. Ratha. "Biometric perils and patches." Pattern Recognition 35, no. 12 (2002): 2727-2738.

[28]Shankar, Sheela, and V. R. Udupi. "A Dynamic Security Protocol for Face Recognition Systems Using Seismic Waves." (2015).

[29]Navalyal, Geeta U., and Rahul D. Gavas. "A dynamic attention assessment and enhancement tool using computer graphics." Human-centric Computing and Information Sciences 4.1 (2014): 1-7.

[30]Geeta, N., and Rahul Dasharath Gavas. "Enhanced Learning with Abacus and its Analysis Using BCI Technology." International Journal of Modern Education and Computer Science (IJMECS) 6.9 (2014): 22.