Skip to main content

Biometric Systems for User Authentication

  • Chapter
  • First Online:
Computer and Network Security Essentials

Abstract

Authenticating the identity of users is a critical issue in information security. Biometrics is known for recognizing users based on their physiological or behavioral traits as identifiers and these cannot be easily stolen unlike passwords or ID cards. Biometrics could be employed as the primary means for authentication, called user identification, as well as a complementary (secondary) method for authentication, known as user verification. Biometric traits that cannot be easily forged and are supposedly unique for each user can form the basis of techniques for user identification. Biometric traits need not be unique for each user, but, can be used to validate whether a user is whom he/she claims to be form the basis for user verification techniques. The first half of the chapter describes several biometric techniques used for identification and verification and compares them with respect to different operating parameters. In addition, the different components (constituent blocks) of a biometric system and the performance metrics used to analyze the effectiveness of biometric systems are also discussed. The second half of the chapter focuses on the security aspects of biometric systems, especially spoofing attacks and a solution to enhance the security and effectiveness through multi-biometric systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chandra Murty, P. S. R., Sreenivasa Reddy, E., & Ramesh Babu, I. (2009). Iris recognition system using fractal dimensions of Haar patterns. International Journal of Signal Processing, Image Processing and Pattern Recognition, 2(3), 75–84.

    Google Scholar 

  2. Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143.

    Article  Google Scholar 

  3. Sabena, F., Dehghantanha, A., & Seddon, A. P. (2010). A review of vulnerabilities in identity management using biometrics. In Proceedings of the 2nd international conference on future networks (pp. 42–49). Sanya, Hainan, China.

    Google Scholar 

  4. Feng, J., & Jain, A. K. (2009). FM model based fingerprint reconstruction from minutiae template. In Proceedings of the 3rd international conference on advances in biometrics (pp. 544–553). Alghero, Italy.

    Google Scholar 

  5. Li, S. Z., & Jain, A. K. (2015). Encyclopedia of biometrics (2nd ed.). New York: Springer.

    Book  Google Scholar 

  6. Cao, K., & Jain, A. K. (2015). Learning fingerprint reconstruction: From minutiae to image. IEEE Transactions on Information Forensics and Security, 10(1), 104–117.

    Article  Google Scholar 

  7. Solanke, S. B., & Deshmukh, R. R. (2016). Biometrics: Iris recognition system: A study of promising approaches for secured authentication. In Proceedings of the 3rd international conference on computing for sustainable global development (pp. 811–814). New Delhi, India.

    Google Scholar 

  8. Al-Khazzar, A., & Savage, N. (2011). Biometric identification using user interactions with virtual worlds. In Proceedings of the 11th international conference on trust, security and privacy in computing and communications (pp. 517–524). Changsha, China.

    Google Scholar 

  9. Zuo, J., & Schmid, N. A. (2013). Adaptive quality-based performance prediction and boosting for iris authentication: Methodology and its illustration. IEEE Transactions on Information Forensics and Security, 8(6), 1051–1060.

    Article  Google Scholar 

  10. Chen, W.-K., Lee, J.-C., Han, W.-Y., Shih, C.-K., & Chang, K.-C. (2013). Iris recognition based on bi-dimensional empirical model decomposition and fractal dimension. Information Sciences, 221, 439–451.

    Article  Google Scholar 

  11. Singh, Y. N., & Singh, S. K. (2013). A taxonomy of biometric system vulnerabilities and defenses. International Journal of Biometrics, 5(2), 137–159.

    Article  Google Scholar 

  12. Sui, Y., Zou, X., Du, E. Y., & Li, F. (2014). Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Transactions on Computers, 63(4), 902–916.

    Article  MathSciNet  MATH  Google Scholar 

  13. Kostyuk, N., Cole, P., Meghanathan, N., Isokpehi, R., & Cohly, H. (2011). Gas discharge visualization: An imaging and modeling tool for medical biometrics. International Journal of Biomedical Imaging, 2011, 196460. 7 pages.

    Article  Google Scholar 

  14. Yampolskiy, R. V. (2008). Mimicry attack on strategy-based behavioral biometric. In Proceedings of the 5th international conference on information technology: New generations (pp. 916–921). Las Vegas, NV, USA.

    Google Scholar 

  15. Akrivopoulou, C. M., & Garipidis, N. (2013). Digital democracy and the impact of technology on governance and politics: New globalized practices. Hershey, PA: IGI-Global.

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Natarajan Meghanathan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Meghanathan, N. (2018). Biometric Systems for User Authentication. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58424-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58423-2

  • Online ISBN: 978-3-319-58424-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics