Abstract
Authenticating the identity of users is a critical issue in information security. Biometrics is known for recognizing users based on their physiological or behavioral traits as identifiers and these cannot be easily stolen unlike passwords or ID cards. Biometrics could be employed as the primary means for authentication, called user identification, as well as a complementary (secondary) method for authentication, known as user verification. Biometric traits that cannot be easily forged and are supposedly unique for each user can form the basis of techniques for user identification. Biometric traits need not be unique for each user, but, can be used to validate whether a user is whom he/she claims to be form the basis for user verification techniques. The first half of the chapter describes several biometric techniques used for identification and verification and compares them with respect to different operating parameters. In addition, the different components (constituent blocks) of a biometric system and the performance metrics used to analyze the effectiveness of biometric systems are also discussed. The second half of the chapter focuses on the security aspects of biometric systems, especially spoofing attacks and a solution to enhance the security and effectiveness through multi-biometric systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chandra Murty, P. S. R., Sreenivasa Reddy, E., & Ramesh Babu, I. (2009). Iris recognition system using fractal dimensions of Haar patterns. International Journal of Signal Processing, Image Processing and Pattern Recognition, 2(3), 75–84.
Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125–143.
Sabena, F., Dehghantanha, A., & Seddon, A. P. (2010). A review of vulnerabilities in identity management using biometrics. In Proceedings of the 2nd international conference on future networks (pp. 42–49). Sanya, Hainan, China.
Feng, J., & Jain, A. K. (2009). FM model based fingerprint reconstruction from minutiae template. In Proceedings of the 3rd international conference on advances in biometrics (pp. 544–553). Alghero, Italy.
Li, S. Z., & Jain, A. K. (2015). Encyclopedia of biometrics (2nd ed.). New York: Springer.
Cao, K., & Jain, A. K. (2015). Learning fingerprint reconstruction: From minutiae to image. IEEE Transactions on Information Forensics and Security, 10(1), 104–117.
Solanke, S. B., & Deshmukh, R. R. (2016). Biometrics: Iris recognition system: A study of promising approaches for secured authentication. In Proceedings of the 3rd international conference on computing for sustainable global development (pp. 811–814). New Delhi, India.
Al-Khazzar, A., & Savage, N. (2011). Biometric identification using user interactions with virtual worlds. In Proceedings of the 11th international conference on trust, security and privacy in computing and communications (pp. 517–524). Changsha, China.
Zuo, J., & Schmid, N. A. (2013). Adaptive quality-based performance prediction and boosting for iris authentication: Methodology and its illustration. IEEE Transactions on Information Forensics and Security, 8(6), 1051–1060.
Chen, W.-K., Lee, J.-C., Han, W.-Y., Shih, C.-K., & Chang, K.-C. (2013). Iris recognition based on bi-dimensional empirical model decomposition and fractal dimension. Information Sciences, 221, 439–451.
Singh, Y. N., & Singh, S. K. (2013). A taxonomy of biometric system vulnerabilities and defenses. International Journal of Biometrics, 5(2), 137–159.
Sui, Y., Zou, X., Du, E. Y., & Li, F. (2014). Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Transactions on Computers, 63(4), 902–916.
Kostyuk, N., Cole, P., Meghanathan, N., Isokpehi, R., & Cohly, H. (2011). Gas discharge visualization: An imaging and modeling tool for medical biometrics. International Journal of Biomedical Imaging, 2011, 196460. 7 pages.
Yampolskiy, R. V. (2008). Mimicry attack on strategy-based behavioral biometric. In Proceedings of the 5th international conference on information technology: New generations (pp. 916–921). Las Vegas, NV, USA.
Akrivopoulou, C. M., & Garipidis, N. (2013). Digital democracy and the impact of technology on governance and politics: New globalized practices. Hershey, PA: IGI-Global.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Meghanathan, N. (2018). Biometric Systems for User Authentication. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-58424-9_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-58423-2
Online ISBN: 978-3-319-58424-9
eBook Packages: EngineeringEngineering (R0)