6 research outputs found
Development of secured algorithm to enhance the privacy and security template of biometric technology
A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of
Doctor of Philosophy in Mathematical and Computer Science and Engineering
of the Nelson Mandela African Institution of Science and TechnologyThe security of information and personal privacy are the growing concerns in today’s human
life worldwide. The storage of biometric data in the database has raised the prospect of
compromising the database leading to grave risks and misuse of the person’s privacy such as
growth in terrorism and identity fraud. When a person’s biometric data stored is revealed,
their security and privacy are being compromised. This research described a detailed
evaluation on several outbreaks and threats associated with the biometric technology. It
analyzed the user’s fear and intimidations to the biometric technology alongside the
protection steps for securing the biometric data template in the database. It is known that,
when somebody’s biometric data template is compromised from the database that
consequently might indicate proof of identity robbery of that person. Mixed method to
compute and articulate the results as well as a new tactic of encryption-decryption algorithm
with a design pattern of Model View Template (MVT) are used for securing the biometric
data template in the database. The model managed information logically, the view indicated
the visualization of the data, and the template directed the data migration into pattern object.
Factors influencing fear of biometric technology such as an exposer of personal information,
improper data transfer, and data misuse are found. Strong knowledge of the ideal technology
like the private skills of the biometric technology, data secrecy and perceived helpfulness are
established. The fears and attacks along the technology like a counterfeit of documents and
brute-force attack are known. The designed algorithm based on the cryptographic module of
the Fernet keys instance are utilized. The Fernet keys are combined to generate a multiFernet
key, integrated with biometric data to produce two encrypted files (byte and text file). These
files are incorporated with Twilio message and firmly stored in the database. The storage
database has security measures that guard against an impostor’s attack. The database system
can block the attacker from unauthorized access. Thus, significantly increased individual data
privacy and integrity
A study of users’ compliance and satisfied utilization of biometric application system
This research article published by Taylor & Francis Online, 2020Currently, the adoption rate of biometric technology has speedily grown in all applications. The technology is considered as an effective measure for the protection against crime. However, there is a concern that it violates the privacy and rights of the individuals. For instance, the possibility of fraud, identity theft, civil liberty violations, and inaccuracy of data. As a result, create the conflicts between service provider and public as they may be accused of a crime or become a victim of discrimination. This study constitutes exploratory research and is restricted to the usage of the biometric application system within the passport. It aims at discovering the substantial acceptance of users in implementing the biometric application for the East African passport (Uganda). Factor influencing users’ opinions regarding the acceptance of the biometric application, User willingness, trust and techniques for securing the biometric information are presented. Strategies aimed at regulating the protection of biometric data on the usage of the application are explained. The findings suggested encryption techniques as the most favorable tactic of protecting the biometric data application. Therefore, best practices such as individual desirability, practical accurateness, and eagerness are required
Developing an Algorithm for Securing the Biometric Data Template in the Database
This research article published by the International Journal of Advanced Computer Science and Applications, Vol. 10, No. 10, 2019In the current technology advancement, biometric
template provides a dependable solution to the problem of user
verification in an identity control system. The template is saved
in the database during the enrollment and compared with query
information in the verification stage. Serious security and
privacy concerns can arise, if raw, unprotected data template is
saved in the database. An attacker can hack the template
information in the database to gain illicit access. A novel
approach of encryption-decryption algorithm utilizing a design
pattern of Model View Template (MVT) is developed to secure
the biometric data template. The model manages information
logically, the view shows the visualization of the data, and the
template addresses the data migration into pattern object. The
established algorithm is based on the cryptographic module of
the Fernet key instance. The Fernet keys are combined to
generate a multiFernet key to produce two encrypted files (byte
and text file). These files are incorporated with Twilio message
and securely preserved in the database. In the event where an
attacker tries to access the biometric data template in the
database, the system alerts the user and stops the attacker from
unauthorized access, and cross-verify the impersonator based on
the validation of the ownership. Thus, helps inform the users and
the authority of, how secure the individual biometric data
template is, and provided a high level of the security pertaining
the individual data privac
Assessment of vulnerabilities of the biometric template protection mechanism
Research Article published by International Journal of Advanced Technology and Engineering Exploration, Vol 5(45)In the ever-changing world of global data transmission, the security of data and individual privacy are the growing fears in today’s human life worldwide. The major concerns are the protection of the biometric templates in the biometric identification and authentication process. Storage of the biometric template in the database raises the chance of compromising it, hence lead to serious threats and abuse of the person’s identity. When an individual’s registered biometric data is disclosed, their security and privacy can be compromised. Therefore, public acceptance of biometrics will depend on the system designer’s ability to demonstrate that the systems are robust, with low error rates, and tamper proof. If someone’s biometric template inside the database is compromised, that consequently might imply identification robbery of that individual. In the recent past, a considerable number of methods for biometric template protection have been published. This article explains, a thorough valuation on numerous attacks and threats associated with the biometric system alongside the biometric template protection, elucidating the measures anticipated to address the threats, to the performance gap and establish the status quo of the current biometric template protection for public acceptance
Assessment of How Users Perceive the Usage of Biometric Technology Applications
This book chapter was published by IntechOpen Journal, 2022Biometrics applications are progressively widespread as a means of authenticating end-users owing to the extensive range of benefits over traditional authentication (token-base-authentication). However, the transaction involves taking into account the perceptions and responses of end-users. If end-users are fearful, hesitant about these biometric technology-applications, misuse and implementation-complications can surely overshadow. The goal of this study is to sightsee the user’s-motivation, understanding, consciousness and acceptance towards utilization of biometric technology-applications. A 300-person survey was conducted to evaluate public-opinion on the use and adoption of biometrics. Stratified sample technique was used to administer the surveys. The results presented that perceived ease-of-use, user-motivation and attitude are more important-factors when deciding whether to accept new technology-applications. Although many end-users have become more familiar with biometric technology-applications (e.g., Fingerprints or facial-recognition), many individuals still have a negative-perception of the technology. Concerns regarding confidentiality and security i.e., storing and protecting personal-identification data, the fear of intruding into a person’s daily-life and disclosing personal-information remain a major problem. Some end-users claim that despite the potential resilience to biometrics, designers must mentally and psychologically prepare the general public for the new use of biometric technology. This will make it possible to transform negative user-perceptions into a positive-experience. Thus, this study can help end-users and companies understand and make the right decisions to promote the use of biometric-applications and services. The study is expected to be an important research-discovery that will greatly contribute to Uganda’s digital-economy
Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems
The increase in terrorism and identity fraud has forced governments worldwide to make a combined effort to enhance the security of national borders. Biometric passports are the emergent identity travel document deployed in guaranteeing the safekeeping of the entry point of the border and limiting the usage of counterfeit documents. This study analyzes users’ concerns and threats to the biometric passport delivery system in Uganda, where the first biometric passports are planned for rollout in 2019. We used a mixed approach to compute and articulate the results. Factors impacting fear of technology like disclosure of personal data, improper data transmission, and data abuse were determined. Relevance knowledge of preferred technology such as the personal experience of the technology, data privacy awareness and perceived usefulness was confirmed. Threats and attacks on the technology such as counterfeit and brute-force were identified. It is important for policymakers and security expertise to understand that biometric technologies evoke fears of privacy and public liberties infringements. Therefore, end user’s acceptance of biometric passports will be dependent on the degree of trust in the technology itself and in those operating the applications