Skip to main content
Top

2019 | OriginalPaper | Chapter

17. Biometric System: Security Challenges and Solutions

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The concept of biometric authentication is popular in the research industry. Biometric authentication refers to the measurement and statistical analysis of a human’s biological and behavioral features. Biometric technology is mainly used for authentication and identifying individuals based on their biological traits. Regarding biometric applications, security is the key issue that has a lot of remaining challenges. To succeed in this domain, this paper gives a background on the fingerprint matching algorithm steps. Moreover, the paper presents a brief overview of different attacks and threats that affect the privacy and security of the biometric system. Then we discuss the common schemes that have been used to secure biometric systems. Finally, findings and direction for further research about biometric system security are explored.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hahn, C., Hur, J.: Efficient and privacy-preserving biometric identification in cloud. ICT Exp. 2(3), 135–139 (2016). Special Issue on ICT Convergence in the Internet of Things (IoT) Hahn, C., Hur, J.: Efficient and privacy-preserving biometric identification in cloud. ICT Exp. 2(3), 135–139 (2016). Special Issue on ICT Convergence in the Internet of Things (IoT)
2.
go back to reference Gupta, P., Gupta, P.: An accurate slap fingerprint based verification system. Neurocomputing 188, 178–189 (2016). Advanced Intelligent Computing Methodologies and Applications Gupta, P., Gupta, P.: An accurate slap fingerprint based verification system. Neurocomputing 188, 178–189 (2016). Advanced Intelligent Computing Methodologies and Applications
3.
go back to reference Asha, S., Chellappan, C.: Biometrics: an overview of the technology, issues and applications. Int. J. Comput. Appl. 39, 35–52 (2012). Full text available Asha, S., Chellappan, C.: Biometrics: an overview of the technology, issues and applications. Int. J. Comput. Appl. 39, 35–52 (2012). Full text available
4.
go back to reference Tian, Y., Gofman, M., Villa, M.: Biometrics in cloud computing and big data (Chapter 8). In: Mitra, S., Gofman, M. (eds.) Biometrics in a Data Driven World: Trends, Technologies, and Challenges, pp. 245–262. CRC Press, Boca Raton (2016)CrossRef Tian, Y., Gofman, M., Villa, M.: Biometrics in cloud computing and big data (Chapter 8). In: Mitra, S., Gofman, M. (eds.) Biometrics in a Data Driven World: Trends, Technologies, and Challenges, pp. 245–262. CRC Press, Boca Raton (2016)CrossRef
5.
go back to reference Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process 2008, 113:1–113:17 (2008) Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process 2008, 113:1–113:17 (2008)
6.
go back to reference Duncan, A., Creese, S., Goldsmith, M., Quinton, J.S.: Cloud computing: insider attacks on virtual machines during migration. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 493–500, July 2013 Duncan, A., Creese, S., Goldsmith, M., Quinton, J.S.: Cloud computing: insider attacks on virtual machines during migration. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 493–500, July 2013
7.
go back to reference Kumar, P.R., Raj, P.H., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Proc. Comput. Sci. 125, 691–697 (2018). The 6th International Conference on Smart Computing and Communications Kumar, P.R., Raj, P.H., Jelciana, P.: Exploring data security issues and solutions in cloud computing. Proc. Comput. Sci. 125, 691–697 (2018). The 6th International Conference on Smart Computing and Communications
8.
go back to reference Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)CrossRef
9.
go back to reference Thangavel, M., Varalakshmi, P., Sridhar, S.: An analysis of privacy preservation schemes in cloud computing. In: 2016 IEEE International Conference on Engineering and Technology (ICETECH), pp. 146–151, Mar 2016 Thangavel, M., Varalakshmi, P., Sridhar, S.: An analysis of privacy preservation schemes in cloud computing. In: 2016 IEEE International Conference on Engineering and Technology (ICETECH), pp. 146–151, Mar 2016
10.
go back to reference AlZain, M.A., Pardede, E., Soh, B., Thom, J.A.: Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii International Conference on System Sciences, pp. 5490–5499, Jan 2012 AlZain, M.A., Pardede, E., Soh, B., Thom, J.A.: Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii International Conference on System Sciences, pp. 5490–5499, Jan 2012
11.
go back to reference Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable fingerprint biotokens: accuracy and security analysis. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8, June 2007 Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable fingerprint biotokens: accuracy and security analysis. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–8, June 2007
12.
go back to reference Li, S.Z., Jain, A.K. (eds.) Encyclopedia of Biometrics. Springer US, Boston (2015) Li, S.Z., Jain, A.K. (eds.) Encyclopedia of Biometrics. Springer US, Boston (2015)
13.
go back to reference Kaur, H., Khanna, P.: Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed. Tools Appl. 75, 16333–16361 (2016)CrossRef Kaur, H., Khanna, P.: Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed. Tools Appl. 75, 16333–16361 (2016)CrossRef
14.
go back to reference Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In; 2007 Biometrics Symposium, pp. 1–6, Sept 2007 Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In; 2007 Biometrics Symposium, pp. 1–6, Sept 2007
15.
go back to reference Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In; Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS ’99, New York, NY, USA, pp. 28–36. ACM (1999) Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In; Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS ’99, New York, NY, USA, pp. 28–36. ACM (1999)
16.
go back to reference Alberto Torres, W.A., Bhattacharjee, N., Srinivasan, B.: Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int. J. Pervasive Comput. Commun. 11, 151–168 (2015)CrossRef Alberto Torres, W.A., Bhattacharjee, N., Srinivasan, B.: Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int. J. Pervasive Comput. Commun. 11, 151–168 (2015)CrossRef
17.
go back to reference Jain, A.K., Nandakumar, K., Ross, A.: 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognit. Lett. 79, 80–105 (20160 Jain, A.K., Nandakumar, K., Ross, A.: 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognit. Lett. 79, 80–105 (20160
18.
go back to reference Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, R., Janet, S., Ko, K.: User’s Guide to NIST Biometric Image Software (NBIS). Department of Commerce, National Institute of Standards and Technology, Gaithersburg (2007) Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, R., Janet, S., Ko, K.: User’s Guide to NIST Biometric Image Software (NBIS). Department of Commerce, National Institute of Standards and Technology, Gaithersburg (2007)
19.
go back to reference Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, London (2009)CrossRef Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, London (2009)CrossRef
20.
go back to reference Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2255 (2004)CrossRef Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2255 (2004)CrossRef
21.
go back to reference Tulyakov, S., Farooq, F., Govindaraju, V.: Symmetric hash functions for fingerprint minutiae. In: Singh, S., Singh, M., Apte, C., Perner, P. (eds.) Pattern Recognition and Image Analysis, pp. 30–38. Springer, Berlin/Heidelberg (2005)CrossRef Tulyakov, S., Farooq, F., Govindaraju, V.: Symmetric hash functions for fingerprint minutiae. In: Singh, S., Singh, M., Apte, C., Perner, P. (eds.) Pattern Recognition and Image Analysis, pp. 30–38. Springer, Berlin/Heidelberg (2005)CrossRef
22.
go back to reference Álvarez Mariño, R., Álvarez, F.H., Encinas, L.H.: A crypto-biometric scheme based on iris-templates with fuzzy extractors. Inf. Sci. 195, 91–102 (2012)CrossRef Álvarez Mariño, R., Álvarez, F.H., Encinas, L.H.: A crypto-biometric scheme based on iris-templates with fuzzy extractors. Inf. Sci. 195, 91–102 (2012)CrossRef
24.
go back to reference Scheirer, W.J., Boult, T.E.: Bipartite biotokens: definition, implementation, and analysis. In: Tistarelli, M., Nixon, M.S. (eds.) Advances in Biometrics, pp. 775–785. Springer, Berlin/Heidelberg (2009)CrossRef Scheirer, W.J., Boult, T.E.: Bipartite biotokens: definition, implementation, and analysis. In: Tistarelli, M., Nixon, M.S. (eds.) Advances in Biometrics, pp. 775–785. Springer, Berlin/Heidelberg (2009)CrossRef
25.
go back to reference Wu, Z., Tian, L., Li, P., Wu, T., Jiang, M., Wu, C.: Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf. Sci. 433–434, 431–447 (2018)CrossRef Wu, Z., Tian, L., Li, P., Wu, T., Jiang, M., Wu, C.: Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf. Sci. 433434, 431–447 (2018)CrossRef
26.
go back to reference Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, MM&Sec ’10, New York, NY, USA, pp. 231–240. ACM (2010) Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: Privacy-preserving fingercode authentication. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, MM&Sec ’10, New York, NY, USA, pp. 231–240. ACM (2010)
27.
go back to reference Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford, CA, USA (2009). AAI3382729. Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford, CA, USA (2009). AAI3382729.
28.
go back to reference Sussman, A., Trost, J., Maurer, A., Kohlwey, E.: Leveraging the cloud for big data biometrics: meeting the performance requirements of the next generation biometric systems. In: 2011 IEEE World Congress on Services (SERVICES 2011), vol. 00, pp. 597–601 (2011) Sussman, A., Trost, J., Maurer, A., Kohlwey, E.: Leveraging the cloud for big data biometrics: meeting the performance requirements of the next generation biometric systems. In: 2011 IEEE World Congress on Services (SERVICES 2011), vol. 00, pp. 597–601 (2011)
30.
go back to reference Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation – Volume 6, OSDI’04, Berkeley, CA, USA, pp. 10–10. USENIX Association (2004) Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation – Volume 6, OSDI’04, Berkeley, CA, USA, pp. 10–10. USENIX Association (2004)
33.
go back to reference Shelly, Raghava, N.S.: Iris recognition on hadoop: a biometrics system implementation on cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 482–485, Sept 2011 Shelly, Raghava, N.S.: Iris recognition on hadoop: a biometrics system implementation on cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 482–485, Sept 2011
34.
go back to reference Alsolami, F.J.: Toward secure sensitive data in the cloud. Ph.D. thesis, University of Colorado at Colorado Springs (2015) Alsolami, F.J.: Toward secure sensitive data in the cloud. Ph.D. thesis, University of Colorado at Colorado Springs (2015)
35.
go back to reference Alsolami, F., Alzahrani, B., Boult, T.: Cloud-id-screen: secure fingerprint data in the cloud. In: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1–8, Jan 2018 Alsolami, F., Alzahrani, B., Boult, T.: Cloud-id-screen: secure fingerprint data in the cloud. In: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1–8, Jan 2018
Metadata
Title
Biometric System: Security Challenges and Solutions
Authors
Bayan Alzahrani
Fahad Alsolami
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-14070-0_17

Premium Partner