712 research outputs found

    Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

    Full text link
    This paper conducts an extensive review of biometric user authentication literature, addressing three primary research questions: (1) commonly used biometric traits and their suitability for specific applications, (2) performance factors such as security, convenience, and robustness, and potential countermeasures against cyberattacks, and (3) factors affecting biometric system accuracy and po-tential improvements. Our analysis delves into physiological and behavioral traits, exploring their pros and cons. We discuss factors influencing biometric system effectiveness and highlight areas for enhancement. Our study differs from previous surveys by extensively examining biometric traits, exploring various application domains, and analyzing measures to mitigate cyberattacks. This paper aims to inform researchers and practitioners about the biometric authentication landscape and guide future advancements

    Future Security Approaches and Biometrics

    Get PDF
    Threats to information security are proliferating rapidly, placing demanding requirements on protecting tangible and intangible business and individual assets. Biometrics can improve security by replacing or complementing traditional security technologies. This tutorial discusses the strengths and weaknesses of biometrics and traditional security approaches, current and future applications of biometrics, performance evaluation measures of biometric systems, and privacy issues surrounding the new technology

    Biometrics for internet‐of‐things security: A review

    Get PDF
    The large number of Internet‐of‐Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric‐based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric‐cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state‐of‐the‐art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward‐looking issues and future research directions

    Evaluation of a Vein Biometric Recognition System on an Ordinary Smartphone

    Get PDF
    Nowadays, biometrics based on vein patterns as a trait is a promising technique. Vein patterns satisfy universality, distinctiveness, permanence, performance, and protection against circumvention. However, collectability and acceptability are not completely satisfied. These two properties are directly related to acquisition methods. The acquisition of vein images is usually based on the absorption of near-infrared (NIR) light by the hemoglobin inside the veins, which is higher than in the surrounding tissues. Typically, specific devices are designed to improve the quality of the vein images. However, such devices increase collectability costs and reduce acceptability. This paper focuses on using commercial smartphones with ordinary cameras as potential devices to improve collectability and acceptability. In particular, we use smartphone applications (apps), mainly employed for medical purposes, to acquire images with the smartphone camera and improve the contrast of superficial veins, as if using infrared LEDs. A recognition system has been developed that employs the free IRVeinViewer App to acquire images from wrists and dorsal hands and a feature extraction algorithm based on SIFT (scale-invariant feature transform) with adequate pre- and post-processing stages. The recognition performance has been evaluated with a database composed of 1000 vein images associated to five samples from 20 wrists and 20 dorsal hands, acquired at different times of day, from people of different ages and genders, under five different environmental conditions: day outdoor, indoor with natural light, indoor with natural light and dark homogeneous background, indoor with artificial light, and darkness. The variability of the images acquired in different sessions and under different ambient conditions has a large influence on the recognition rates, such that our results are similar to other systems from the literature that employ specific smartphones and additional light sources. Since reported quality assessment algorithms do not help to reject poorly acquired images, we have evaluated a solution at enrollment and matching that acquires several images subsequently, computes their similarity, and accepts only the samples whose similarity is greater than a threshold. This improves the recognition, and it is practical since our implemented system in Android works in real-time and the usability of the acquisition app is high.MCIN/AEI/ 10.13039/50110001103 Grant PDC2021-121589-I00Fondo Europeo de Desarrollo Regional (FEDER) and ConsejerĂ­a de TransformaciĂłn EconĂłmica, Industria, Conocimiento y Universidades de la Junta de AndalucĂ­a Grant US-126514

    Biometrics : An exploration and analysis of user acceptance issues

    Get PDF
    The security industry has undergone dramatic growth over the last twenty years due to a burgeoning of demand for security products and services. The protection of people, assets and information has been prominent among the concerns of business, industry and the broader community. Crimes against domestic, commercial, and industrial premises, small and large, are a commonplace occurrence and security has therefore become an essential component of any facility\u27s continual operation. The security industry has been quick to respond to these concerns through the rapid development of a wide range of products and services. Growth in security as an academic discipline has paralleled these recent concerns. However. the discipline of security lacks format tools that can be used by security managers, consultants and employees when attempting to create effective security. This is because of security\u27s relative age as a discipline - theories and tools are still being developed. Biometrics is the science of using a measurable physical characteristic or behavioural trait to recognise the identity, or verify the claimed identity, of a person through automated means. When used in conjunction with an access control system, a very high level of security can be achieved. Biometric access control technologies emerged in the late 1950s. The use of biometrics has been repeatedly forecast to dramatically increase, however these predictions have not been realised. The reason for the low growth in biometric technology use has been attributed, in part, to user acceptance problems. The aim of this study was to contribute to the security discipline by exploring and analysing the concept of user acceptance for biometric access control technologies. The study set out to define user acceptance, identify and discuss user acceptance issues, and develop frameworks for the identification and treatment of user acceptance issues. Researching the area of user acceptance, and then testing people\u27s attitudes towards user acceptance issues achieved this. The results of the testing process demonstrated an acknowledgement by the eighty respondents to the Likert test that user acceptance is indeed an issue for biometric technologies. The respondents identified hygiene, ease of use and user reticence as low magnitude user acceptance issues. The intrusiveness of the data collection method, enrolment time, system failure, speed and throughput rate, system control, and biometrics versus other technologies were all identified as issues of high magnitude. This study developed a range of outcomes that can be used for the definition, identification and treatment of user acceptance problems. A definition of user acceptance issues for biometric technologies was developed. A total of nine user acceptance dimensions were identified and described in detail. A framework for the identification of user acceptance issues for any biometric application was created. A framework for the treatment of user acceptance issues was also developed. This study sought to compile a comprehensive picture of user acceptance issues for biometric access control technologies. The growth of biometric technologies will almost certainly depend on an understanding of user acceptance issues. This study has provided a series of tools for that understanding to be accomplished

    Exploring Mobile Biometric Performance through Identification of Core Factors and Relationships

    Get PDF
    Biometrics, as a form of authentication, has existed for several decades and shows no signs of slowing down. Extensive research has been carried out into enhancing systems either by improving error rates or ease of adoption by examining barriers to use. In this paper, we investigate factors of a biometric system that is likely to affect performance, in particular, focusing on mobile device implementation. By surveying the area, we have identified seven core factors that help to form a clearer understanding of what changes the performance of a system. These seven factors are Users, Modality, Environments, Diversity of Scenarios, System Constraints, Hardware and Algorithms and form ‘The Core Factors Affecting Mobile Biometric Performance’. We utilise these factors to illustrate the practicalities of mobile implementations and indicate future considerations to explore future performance enhancements and provide an informative overview to developers, implementers and testers of biometrics systems, enabling the binning of performance alterations within one of these factors

    Voice Recognition Systems for The Disabled Electorate: Critical Review on Architectures and Authentication Strategies

    Get PDF
    An inevitable factor that makes the concept of electronic voting irresistible is the fact that it offers the possibility of exceeding the manual voting process in terms of convenience, widespread participation, and consideration for People Living with Disabilities. The underlying voting technology and ballot design can determine the credibility of election results, influence how voters felt about their ability to exercise their right to vote, and their willingness to accept the legitimacy of electoral results. However, the adoption of e-voting systems has unveiled a new set of problems such as security threats, trust, and reliability of voting systems and the electoral process itself. This paper presents a critical literature review on concepts, architectures, and existing authentication strategies in voice recognition systems for the e-voting system for the disabled electorate. Consequently, in this paper, an intelligent yet secure scheme for electronic voting systems specifically for people living with disabilities is presented

    Envisioning technology through discourse: a case study of biometrics in the National Identity Scheme in the United Kingdom

    Get PDF
    Around the globe, governments are pursuing policies that depend on information technology (IT). The United Kingdom’s National Identity Scheme was a government proposal for a national identity system, based on biometrics. These proposals for biometrics provide us with an opportunity to explore the diverse and shifting discourses that accompany the attempted diffusion of a controversial IT innovation. This thesis offers a longitudinal case study of these visionary discourses. I begin with a critical review of the literature on biometrics, drawing attention to the lack of in-depth studies that explore the discursive and organizational dynamics accompanying their implementation on a national scale. I then devise a theoretical framework to study these speculative and future-directed discourses based on concepts and ideas from organizing visions theory, the sociology of expectations, and critical approaches to studying the public’s understanding of technology. A methodological discussion ensues in which I explain my research approach and methods for data collection and analysis, including techniques for critical discourse analysis. After briefly introducing the case study, I proceed to the two-part analysis. First is an analysis of government actors’ discourses on biometrics, revolving around formal policy communications; second is an analysis of media discourses and parliamentary debates around certain critical moments for biometrics in the Scheme. The analysis reveals how the uncertain concept of biometrics provided a strategic rhetorical device whereby government spokespeople were able to offer a flexible yet incomplete vision for the technology. I contend that, despite being distinctive and offering some practical value to the proposals for national identity cards, the government’s discourses on biometrics remained insufficiently intelligible, uninformative, and implausible. The concluding discussion explains the unraveling visions for biometrics in the case, offers a theoretical contribution based on the case analysis, and provides insights about discourses on the ‘publics’ of new technology such as biometrics
    • 

    corecore